Chapter 3 discussed IPsec VPNs, and Chapter 4 discussed PPTP and L2TP VPNs. All three of these VPN implementations provide network layer protection; they can protect traffic from the network layer and higher. However, one of their downsides is that they require special software to be installed on the client device, and possible user training on how to use the software.
Some companies want a solution that is more simple to use and more easy to maintain than the three I just mentioned. Secure Socket Layer (SSL) began as a protocol to protect web (HTTP) traffic between an end-user device and a web server. Normally, it is used to provide protection for online purchases and identity information at e-commerce sites such as Cisco Press and Cisco. However, many network vendors are leveraging SSL's capabilities and using SSL to implement VPN solutions. One main advantage that SSL VPNs have over the other three is that SSL VPNs require no VPN software, by default, to be installed on the user's desktop; a currently installed web browser is used. Using a web browser allows a user to access a central site securely from both corporate and non-corporate PCs. The remainder of this chapter will focus on the use of SSL for VPN implementations.
Part I: VPNs
Overview of VPNs
VPN Technologies
IPsec
PPTP and L2TP
SSL VPNs
Part II: Concentrators
Concentrator Product Information
Concentrator Remote Access Connections with IPsec
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Concentrator Site-to-Site Connections
Concentrator Management
Verifying and Troubleshooting Concentrator Connections
Part III: Clients
Cisco VPN Software Client
Windows Software Client
3002 Hardware Client
Part IV: IOS Routers
Router Product Information
Router ISAKMP/IKE Phase 1 Connectivity
Router Site-to-Site Connections
Router Remote Access Connections
Troubleshooting Router Connections
Part V: PIX Firewalls
PIX and ASA Product Information
PIX and ASA Site-to-Site Connections
PIX and ASA Remote Access Connections
Troubleshooting PIX and ASA Connections
Part VI: Case Study
Case Study
Index