This chapter is the first chapter on configuring routers for VPN implementations, where I'll focus on setting up ISAKMP/IKE Phase 1 to establish a management connection to a remote IPsec peer (site-to-site or remote access). I assume that you have a basic understanding of the Cisco IOS.
In this chapter, I'll discuss the commands that are used to create an ISAKMP/IKE Phase 1 policy for your management connection and the three types of supported device authentication: pre-shared keys, RSA encrypted nonces, and RSA signatures. I'll also briefly discuss how to manage and monitor your management connections. I'll wrap up the chapter discussing a new feature of the IOS, where you can have a Cisco IOS router perform the functions of a certificate authority (CA) or registration authority (RA).
Note
Even though I'll briefly discuss some show and debug commands in this chapter, I'll reserve most of this discussion for Chapter 19, "Troubleshooting Router Connections."
Part I: VPNs
Overview of VPNs
VPN Technologies
IPsec
PPTP and L2TP
SSL VPNs
Part II: Concentrators
Concentrator Product Information
Concentrator Remote Access Connections with IPsec
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Concentrator Site-to-Site Connections
Concentrator Management
Verifying and Troubleshooting Concentrator Connections
Part III: Clients
Cisco VPN Software Client
Windows Software Client
3002 Hardware Client
Part IV: IOS Routers
Router Product Information
Router ISAKMP/IKE Phase 1 Connectivity
Router Site-to-Site Connections
Router Remote Access Connections
Troubleshooting Router Connections
Part V: PIX Firewalls
PIX and ASA Product Information
PIX and ASA Site-to-Site Connections
PIX and ASA Remote Access Connections
Troubleshooting PIX and ASA Connections
Part VI: Case Study
Case Study
Index