- AZURE POINT TO SITE VPN IOS HOW TO
- AZURE POINT TO SITE VPN IOS SERIAL
- AZURE POINT TO SITE VPN IOS SOFTWARE
- AZURE POINT TO SITE VPN IOS PC
- AZURE POINT TO SITE VPN IOS SERIES
The configuration steps in the following sections are for the headquarters router, unless noted otherwise.
AZURE POINT TO SITE VPN IOS PC
Fast Ethernet interface 0/0 of the remote office router is connected to a PC client.įigure 3-2 Site-to-Site VPN Scenario Physical Elements Fast Ethernet interface 0/0 of the headquarters router is connected to a corporate server and Fast Ethernet interface 0/1 is connected to a web server.
AZURE POINT TO SITE VPN IOS SERIAL
The GRE tunnel is configured on the first serial interface in chassis slot 1 (serial 1/0) of the headquarters and remote office routers.
AZURE POINT TO SITE VPN IOS SERIES
Note VPN Acceleration Module (VAM) information for your Cisco 7200 series router can be found at. Both the headquarters and remote office are using a Cisco IOS VPN gateway (a Cisco 7200 series with an Integrated Service Adaptor (ISA) or VAM (VAM, VAM2, or VAM2+), a Cisco 2600 series router, or a Cisco 3600 series router). The Internet provides the core interconnecting fabric between the headquarters and remote office routers. Note Although the site-to-site VPN scenario in this chapter is configured with GRE tunneling, a site-to-site VPN can also be configured with IPSec only tunneling.įigure 3-1 Site-to-Site VPN Business Scenarioįigure 3-2 shows the physical elements of the scenario. Employees in the remote office are able to access internal, private web pages and perform various IP-based network tasks. In this scenario, the headquarters and remote office are connected through a secure GRE tunnel that is established over an IP infrastructure (the Internet).
AZURE POINT TO SITE VPN IOS HOW TO
For information on how to access the publications, see "Related Documentation" section on page xi.
AZURE POINT TO SITE VPN IOS SOFTWARE
For up-to-date Cisco IOS security software features documentation, refer to the Cisco IOS Security Configuration Guide and the Cisco IOS Security Command Reference publications for your Cisco IOS Release. Some Cisco IOS security software features not described in this document can be used to increase performance and scalability of your VPN. This chapter describes basic features and configurations used in a site-to-site VPN scenario. Note In this Guide, the term `Cisco 7200 series router' implies that an Integrated Service Adaptor (ISA) or a VAM (VAM, VAM2, or VAM2+) is installed in the Cisco 7200 series router. Basic security, Network Address Translation (NAT), Encryption, Cisco IOS weighted fair queuing (WFQ), and extended access lists for basic traffic filtering are configured. This chapter explains the basic tasks for configuring IP-based, site-to-site and extranet Virtual Private Networks (VPNs) on a Cisco 7200 series router using generic routing encapsulation (GRE) and IPSec tunneling protocols. Site-to-Site and Extranet VPN Business Scenarios Verifying Extended Access Lists Are Applied Correctly.Creating Extended Access Lists Using Access List Numbers.
Verifying Crypto Map Interface Associations.Verifying Transform Sets and IPSec Tunnel Mode.Defining Transform Sets and Configuring IPSec Tunnel Mode.Configuring IPSec and IPSec Tunnel Mode.Configuring the Cisco 7200 Series Router for Digital Certificate Interoperability.Additional Configuration Required for IKE Policies.Step 3-Configuring Encryption and IPSec.Verifying Static Inside Source Address Translation.Configuring Static Inside Source Address Translation.Step 2-Configuring Network Address Translation.Verifying the Tunnel Interface, Source, and Destination.Configuring the Tunnel Interface, Source, and Destination.