Cloud Native应用交付

  • 首页
  • 关于本站
  • 个人介绍
  • Downloads
  • Repo
    • Github
    • Container
  • F5
    • F5 Python SDK
    • F5-container
    • F5-LBaaS
  • 社交
    • 联系我
    • 微信/微博
    • 公众号
    • 打赏赞助
行至水穷处 坐看云起时
Cloud Native Application Services: cnadn.net
  1. 首页
  2. CISCO资源
  3. 正文

Cisco Easy VPN

2006年11月19日 8783点热度 0人点赞 0条评论

Cisco Easy VPN

Application Overview

When deploying VPNs for teleworkers and small branch offices, ease of deployment is critical when technical resources are not available for VPN configuration on remote site routers. It is now easier than ever to deploy VPNs as part of small/medium- business or large-enterprise networks with Cisco products. The Cisco Easy VPN Remote feature and the Cisco Easy VPN Server feature offer flexibility, scalability, and ease of use for site-to-site and remote-access VPNs.

The Cisco Easy VPN Remote feature allows Cisco routers running Cisco IOS Release 12.2(4)YA (or later releases), Cisco PIX firewalls, and Cisco hardware clients to act as remote VPN clients. The Cisco Easy VPN Remote feature is now available on Cisco800, uBR900, and 1700 series routers, as well as Cisco PIX 501 firewalls and the Cisco VPN 3002 hardware client. As such, these devices can receive predefined security policies and configuration parameters from the headquarters' VPN head-end, thus minimizing the VPN configuration required at the remote location. Parameters such as internal IP addresses, internal subnet masks, DHCP server addresses, WINS server addresses, and split-tunneling flags are all pushed to the remote device. This cost effective solution is ideal for remote offices with little IT support, or large CPE deployments where it is impractical to individually configure multiple remote devices. The Cisco Easy VPN Remote feature simplifies VPN configuration and can help companies reduce costs as the need for local IT support is minimized. The Cisco Easy VPN Remote feature is now available on Cisco 800, Cisco 1700, and Cisco uBR900 series routers, as well as Cisco PIX 501 firewalls and the Cisco VPN 3002 hardware client.

The Cisco Easy VPN Server feature, available in Cisco IOS Release 12.2(8)T or later releases, increases compatibility of Cisco VPN products, and allows Cisco VPN concentrators, Cisco PIX firewalls, or Cisco routers to act as VPN head-end evices in site-to-site or remote-access VPNs. Using this feature, security policies defined at the head-end can be pushed to the remote office devices running the Cisco Easy VPN Remote feature. In addition, an Easy-VPN-Server-enabled device can terminate VPN tunnels initiated by mobile and remote workers running Cisco VPN client software on PCs. This flexibility makes it possible for mobile and remote workers, such as sales people on the road or teleworkers, to access their small business, branch office, or headquarters intranet where critical data and applications exist. The Cisco Easy VPN Server feature is available on numerous Cisco IOS routers including Cisco uBR900, 1700, 2600, 3600, 7100 and 7200 series routers running Cisco IOS Release 12.2(8)T, or later releases, Cisco VPN 3000 series VPN concentrators, and Cisco PIX firewalls.

Small/Medium Business Deployment

A small/medium business using a Cisco Easy-VPN-Server-enabled Cisco router or Cisco security appliance at the main site, or head-end, can securely connect small branch offices, teleworkers, and mobile workers. The head-end router must have security policies configured, determining which VPN parameters, such as encryption algorithms and authentication algorithms, will be used to communicate with remote devices.

When the head-end security policies have been defined, Cisco devices running the Cisco Easy VPN Remote feature can be deployed to small branch offices. During VPN initialization the head-end router is prompted to push the security policies to the small branch office devices, eliminating the need for remote users to do ongoing configuration updates. Once the VPNs are established, voice, video, and data can be safely exchanged over reliable secure connections, and individuals at the small branch offices no longer need to run VPN client software on their PCs.

Teleworkers using Cisco Easy-VPN-Remote-enabled Cisco routers or Cisco security appliances can also access the Cisco Easy-VPN-Server-enabled router at the head-end through secure VPN connections. As with the small branch office scenario, the head-end security policies are pushed to the remote devices with minimal configuration.

Mobile workers running VPN client software on PCs can easily establish VPN connections with the Cisco Easy-VPN-Server- enabled device through their ISP. This connectivity allows business travelers to securely access critical data and applications almost any time, from their ISP's points of presence (POPs).

Figure 1:

Small to Medium Business Deployment

 

 

Large Enterprise Deployment

A large enterprise can connect branch offices, remote offices, and teleworkers to its network using a Cisco Easy-VPN- Server-enabled Cisco router or Cisco security appliance. The head-end router must have security policies configured, determining which VPN parameters, such as encryption algorithms and authentication algorithms, will be used to communicate with remote devices.

When the head-end security policies have been defined, branch offices can deploy Cisco Easy-VPN-Remote-enabled devices. During VPN initialization, the head-end device is prompted to push security policies to the small branch offices, eliminating the need for extensive local configuration. Voice, video, and data can be safely exchanged over reliable secure connections, and individuals at the branch offices no longer need to run VPN client software on their PCs.

Remote office workers and teleworkers using Easy-VPN-Remote-enabled devices can also access the Easy-VPN-Server-enabled enterprise head-end through secure VPN connections. As with the small branch office scenario, the head-end security policies are pushed to the remote devices with minimal configuration. Additionally, non technical users in remote sites can easily set up the VPN connections without the need for an on-site technician. The net effect is increased productivity, as remote workers spend less time configuring network devices.

Figure 2:

Enterprise Deployment

 

 

High Availability

Cisco Easy VPN is compatible wi

th Reverse Route Injection
(RRI) and Hot Standby Router Protocol (HSRP) with IPsec. When used together, these two features provide a more reliable network design for VPNs and reduce configuration complexity on remote peers.

RRI is a feature designed to simplify network design for VPNs in which there is a requirement for redundancy and routing. RRI works with both dynamic and static crypto maps. When routes are created, they are injected into any dynamic routing protocol and distributed to surrounding devices. This causes traffic flows requiring IPSec to be directed to the appropriate head-end VPN router for transport across the correct SAs to avoid IPSec policy mismatches and possible packet loss.

HSRP is designed to provide high network availability by routing IP traffic from hosts on Ethernet networks without relying on the availability of any single router. IPsec can use the HSRP virtual IP address as the local IPSec identity, or local tunnel endpoint. Remote VPN gateways connect to the local VPN router via the virtual IP address that belongs to the active device in the HSRP group. In the event of failover, the standby device takes over ownership of the standby IP address and begins to service remote VPN peers.

RRI and HSRP are only relevant to the server side of the connection in a client-server VPN model, when redundant head-ended VPN devices are deployed. RRI may also be used on its own in the case where traffic destined to remote VPN devices must be routed to the VPN head-end device. If you have a single head-end gateway through which all traffic flows, then RRI and HSRP are not necessary. RRI is not recommended for use with GRE/IPSec.

Figure 3:

High availability

 

 

 

Split Tunneling

Cisco Easy VPN supports split tunneling which allows Internet destined traffic to be sent unencrypted directly to the Internet. Without split tunneling all traffic is sent to the head-end device and then routed to destination resources (eliminating the corporate network from the path for web access). This functionality provides a more efficient use of corporate IT resources, freeing bandwidth for those who access mission-critical data and applications from remote locations.

Figure 4:

Split Tunneling

 

 

Summary

The Cisco Easy VPN features provide ease-of-use, scalability and reduce the need for individual PC-based client applications. Branch office workers can now share connectivity through a Cisco Easy-VPN-Remote-enabled Cisco router or Cisco security appliance, making use of a single VPN tunnel from the remote site, allowing the head-end device to connect more users with fewer tunnels. The Cisco Easy VPN Server feature provides greater flexibility when deploying head-end devices to terminate remote VPN tunnels at branch offices or small businesses. Together, the Cisco Easy VPN features expand the critical role of Cisco products in any small/medium-business or large-enterprise VPN.

相关文章

  • 温故知新
  • 终于解决PIX与checkpoint互联VPN的怪问题
  • CISCO 防火墙建立穿越NAT的VPN几种解决方法
  • Cisco 2800 Series Integrated Services Routers Configuration Examples and TechNotes
  • 无线+ACS认证(本地或域认证)
本作品采用 知识共享署名-非商业性使用 4.0 国际许可协议 进行许可
标签: IPSec VPN
最后更新:2006年11月19日

纳米

linjing.io

打赏 点赞
< 上一篇
下一篇 >

文章评论

razz evil exclaim smile redface biggrin eek confused idea lol mad twisted rolleyes wink cool arrow neutral cry mrgreen drooling persevering
取消回复

这个站点使用 Akismet 来减少垃圾评论。了解你的评论数据如何被处理。

页面AI聊天助手
文章目录
  • Cisco Easy VPN
  • Application Overview
  • Small/Medium Business Deployment
  • Large Enterprise Deployment
  • High Availability
  • Split Tunneling
  • Summary

纳米

linjing.io

☁️迈向Cloud Native ADC ☁️

认证获得:
TOGAF: ID 152743
Kubernetes: CKA #664
Microsoft: MCSE MCDBA
Cisco: CCNP
Juniper: JNCIS
F5:
F5 Certified Solution Expert, Security
F5 Certified Technology Specialist, LTM/GTM/APM/ASM
F5 Certified BIG-IP Administrator
  • 点击查看本博技术要素列表
  • 归档
    分类
    • AI
    • Automation
    • Avi Networks
    • Cisco ACI
    • CISCO资源
    • F5 with ELK
    • F5-Tech tips
    • F5技术
    • Juniper
    • Linux
    • NGINX
    • SDN
    • ServiceMesh
    • WEB编程
    • WINDOWS相关
    • 业界文章
    • 交换机技术
    • 化云为雨/Openstack
    • 协议原理
    • 容器/k8s
    • 我的工作
    • 我的生活
    • 网站技术
    • 路由器技术
    • 项目案例
    标签聚合
    gtm bigip docker envoy k8s nginx flannel openstack neutron irule DNS F5 istio network api
    最近评论
    汤姆 发布于 8 个月前(09月10日) 嗨,楼主,里面的json怎么下载啊,怎么收费啊?
    汤姆 发布于 8 个月前(09月09日) 大佬,kib的页面可以分享下吗?谢谢
    zhangsha 发布于 1 年前(05月12日) 资料发给我下,谢谢纳米同志!!!!lyx895@qq.com
    李成才 发布于 1 年前(01月02日) 麻烦了,谢谢大佬
    纳米 发布于 1 年前(01月02日) 你好。是的,因为以前下载系统插件在一次升级后将所有的下载生成信息全弄丢了。所以不少文件无法下载。DN...
    浏览次数
    • Downloads - 183,766 views
    • 联系我 - 118,966 views
    • 迄今为止最全最深入的BIGIP-DNS/GTM原理及培训资料 - 116,497 views
    • Github - 103,659 views
    • F5常见log日志解释 - 79,774 views
    • 从传统ADC迈向CLOUD NATIVE ADC - 下载 - 74,623 views
    • Sniffer Pro 4 70 530抓包软件 中文版+视频教程 - 74,320 views
    • 迄今为止最全最深入的BIGIP-DNS/GTM原理及培训资料 - 67,770 views
    • 关于本站 - 60,905 views
    • 这篇文档您是否感兴趣 - 55,493 views
    链接表
    • F5SE创新
    • Jimmy Song‘s Blog
    • SDNlab
    • Service Mesh社区
    • 三斗室
    • 个人profile
    • 云原生社区

    COPYRIGHT © 2023 Cloud Native 应用交付. ALL RIGHTS RESERVED.

    Theme Kratos Made By Seaton Jiang

    京ICP备14048088号-1

    京公网安备 11010502041506号