Access VPN Solutions Using Tunneling Technology

Read or Download Access VPN Solutions Using Tunneling Technology PDF

Similar networking books

Network Calculus

Community Calculus is a suite of modern advancements that supply deep insights into circulation difficulties encountered within the web and in intranets. the 1st a part of the booklet is a self-contained, introductory path on community calculus. It provides the center of community calculus, and exhibits the way it will be utilized to the web to procure effects that experience actual interpretations of functional significance to community engineers.

MPLS and VPN Architectures, CCIP Edition

A pragmatic advisor to knowing, designing, and deploying MPLS and MPLS-enabled VPNs In-depth research of the Multiprotocol Label Switching (MPLS) architectureDetailed dialogue of the mechanisms and contours that represent the architectureLearn how MPLS scales to aid tens of millions of VPNsExtensive case experiences consultant you thru the layout and deployment of real-world MPLS/VPN networksConfiguration examples and instructions help in configuring MPLS on Cisco® devicesDesign and implementation recommendations assist you construct quite a few VPN topologiesMultiprotocol Label Switching (MPLS) is an cutting edge process for high-performance packet forwarding.

Additional info for Access VPN Solutions Using Tunneling Technology

Example text

46 Access VPN Solutions Using Tunneling Technology Verifying the Access VPN ENT_HGW(config-if)# ip unnumbered fastethernet0/0 Specify that the virtual-access interfaces use the Fast Ethernet 0/0 interface’s IP address. ENT_HGW(config-if)# ppp authentication chap Enable CHAP authentication using the local username database. ENT_HGW(config-if)# peer default ip address pool default Return an IP address from the default pool to the client. ENT_HGW(config-if)# encapsulation ppp Enable PPP encapsulation.

The tunnel authorization phase includes an authentication step. The tunnel must be authenticated before it can be authorized. 1 ISP_NAS(config)# interface group-async 1 ISP_NAS(config-if)# no peer default ip address pool default ISP_NAS(config-if)# exit Remove the local IP address pool from the NAS. ISP_NAS(config)# no username jeremy password subaru Remove the client’s username and password from the local AAA database. The client is assigned an IP address from the home gateway’s local IP address pool.

Remove the VPN1 group. All of the tunneling information will now be retrieved using RADIUS at the CiscoSecure UNIX server. ISP_NAS(config)# no vpdn-group 1 1. The Cisco IOS command syntax uses the more specific term virtual private dialup network (VPDN) instead of VPN. Step 2—Configuring the Home Gateway In this step, the enterprise customer: • Moves the responsibility for username authentication from the NAS to the remote CiscoSecure NT server • • Points the home gateway to the CiscoSecure NT server Removes the client’s username and password from the home gateways username database Use this command To do this ENT_HGW(config)# aaa authentication ppp default local radius Instruct AAA to first use the local database and then use the RADIUS server (CiscoSecure NT) for PPP and VPN authentication.

Download PDF sample

Rated 4.98 of 5 – based on 24 votes