This chapter showed you the basics of troubleshooting IPsec sessions on Cisco security appliances. The commands and processes used are very similar to those on IOS-based routers, reducing your learning curve if you already have experience with IPsec tunnels on IOS-based routers. Remember that in FOS 7.0, the debug commands have a level qualifier which affects the amount of debug output the command generates.
This chapter completes the configuration and troubleshooting part of this book. Next up is Part VI, "Case Study," where I pull many of the important elements together from this book and apply them to an example company's VPN implementation.
Part I: VPNs
Overview of VPNs
VPN Technologies
IPsec
PPTP and L2TP
SSL VPNs
Part II: Concentrators
Concentrator Product Information
Concentrator Remote Access Connections with IPsec
Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Concentrator Site-to-Site Connections
Concentrator Management
Verifying and Troubleshooting Concentrator Connections
Part III: Clients
Cisco VPN Software Client
Windows Software Client
3002 Hardware Client
Part IV: IOS Routers
Router Product Information
Router ISAKMP/IKE Phase 1 Connectivity
Router Site-to-Site Connections
Router Remote Access Connections
Troubleshooting Router Connections
Part V: PIX Firewalls
PIX and ASA Product Information
PIX and ASA Site-to-Site Connections
PIX and ASA Remote Access Connections
Troubleshooting PIX and ASA Connections
Part VI: Case Study
Case Study
Index