IPsec remote access VPNs enable teleworkers and other remote access users to access resources at a central site and experience a similar level of functionality that they would experience if they were physically present at that central site.
Figure 9-1 illustrates IPsec remote access VPNs.
Figure 9-1. IPsec Remote Access VPNs
IPsec remote access VPNs can be deployed in two ways:
It is worth noting that an IPsec remote access VPN deployment can make use of both software and hardware clients to establish VPN connections, depending on the particular requirements of remote access users.
This chapter discusses the design and configuration of IPsec remote access VPNs using both software and hardware clients.
Note
If you do not already have a good understanding of the operation of IPsec, it may be a good idea to read Chapter 6, "Deploying Site-to-Site IPsec VPNs," prior to reading this chapter.
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions