VPNs can be managed and deployed as:
IPsec is an IETF standard that defines how a VPN can be secured across IP networks. IPsec protects and authenticates IP packets between source and destination and provides these essential security functions:
A site-to-site VPN is terminated on VPN gateways. VPN traffic is only encrypted between the gateways. Internal hosts have no knowledge that a VPN is being used.
license boot module c1900 technology-package securityk9
access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
R1(config)# crypto isakmp policy 10
R1(config-isakmp)# encryption aes 256
R1(config-isakmp)# authentication pre-share
R1(config-isakmp)# group 5
R1(config-isakmp)# exit
R1(config)# crypto isakmp key vpnpa55 address 10.2.2.2
crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac
R1(config)# crypto map VPN-MAP 10 ipsec-isakmp
R1(config-crypto-map)# description VPN connection to R3
R1(config-crypto-map)# set peer 10.2.2.2
R1(config-crypto-map)# set transform-set VPN-SET
R1(config-crypto-map)# match address 110
R1(config-crypto-map)# exit
R1(config)# interface s0/0/0
R1(config-if)# crypto map VPN-MAP
license boot module c1900 technology-package securityk9
R3(config)# access-list 110 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
R3(config)# crypto isakmp policy 10
R3(config-isakmp)# encryption aes 256
R3(config-isakmp)# authentication pre-share
R3(config-isakmp)# group 5
R3(config-isakmp)# exit
R3(config)# crypto isakmp key vpnpa55 address 10.1.1.2
R3(config)# crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac
R3(config)# crypto map VPN-MAP 10 ipsec-isakmp
R3(config-crypto-map)# description VPN connection to R1
R3(config-crypto-map)# set peer 10.1.1.2
R3(config-crypto-map)# set transform-set VPN-SET
R3(config-crypto-map)# match address 110
R3(config-crypto-map)# exit
R3(config)# interface s0/0/1
R3(config-if)# crypto map VPN-MAP
A remote-access VPN is dynamically created to establish a secure connection between a client and a VPN terminating device.
license boot module c2900 technology-package securityk9
ip local pool poolVPN 192.168.2.100 192.168.2.115
aaa new-model
aaa authentication login userVPN local
aaa authorization network groupVPN local
username userVPN secret ciscoVPN
crypto isakmp policy 100
encryption aes 256
hash sha
authentication Pre-share
group 5
exit
crypto isakmp client configuration group groupVPN
key ciscogroupVPN
pool poolVPN
exit
crypto ipsec transform-set setVPN esp-aes esp-sha-hmac
crypto dynamic-map dynamicVPN 100
set transform-set setVPN
reverse-route
exit
crypto map staticMAP client configuration address respond
crypto map staticMAP client authentication list userVPN
crypto map staticMAP isakmp authorization list groupVPN
crypto map staticMAP 20 ipsec-isakmp dynamic dynamicVPN
interface s0/0/1
crypto map staticMAP
Test stage Configure Client With VPN parameterÂ