Chapter 13. Monitoring IPsec VPNs

Introduction to Monitoring

Configuring IPsec VPNs can be seen by some as a cumbersome process. In many instances, once an IPsec VPN is configured it is monitored by the IP connectivity that runs within the overlay network, protected by the VPN. This isn’t the only method to determine if the VPN has been successfully created and is working correctly. This chapter describes the method to monitor each process that is performed when establishing an IPsec Security Association using IKEv2. This chapter is structured so that the method used to monitor each function that is used to establish an IPsec session is described in an ordered fashion. Each function builds on the previous one; for example, IP connectivity must ...

Get IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.