Chapter 17. Configuring Site-to-Site VPNs

This chapter covers the following topics:

Site-to-Site IPsec VPNs

IPsec VPN Negotiation Steps

Planning an IPsec VPN

Cipher Suite Options

Configuring IOS Site-to-Site VPNs

Verifying the VPN Tunnel

Configuring a Site-to-Site IPsec VPN Using IOS Example

Configuring a Site-to-Site IPsec VPN Using CCP Example

Generating a Mirror Configuration Using CCP

Testing and Monitoring IPsec VPNs

Monitoring Established IPsec VPN Connections Using CCP

Site-to-Site IPsec VPNs

Organizations of all kinds often deploy site-to-site virtual private networks (VPNs) when implementing a corporate network across public and private networks. Internet-based VPN environments and Multiprotocol Label Switching (MPLS) ...

Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.