Page 2 - Figures
Figures................................................................................................................... 3
Contents
Introduction........................................................................................................... 4
General................................................................................................................................... 4
Further Reading.............................................................................................................................. 4
Overview of IPSec and L2TP Technologies ....................................................... 5
General................................................................................................................................... 5
IPSec .............................................................................................................................................. 6
L2TP ............................................................................................................................................... 7
Overview of Secure VPN Implementation .......................................................... 9
IPSec Implementation............................................................................................................. 9
L2TP Implementation............................................................................................................ 11
Guidelines..................................................................................................................................................11
Logical LAN Implementation................................................................................................. 13
Typical VPN Deployment...................................................................................................... 15
Public Access Networks ............................................................................................................... 16
Guidelines..................................................................................................................................................16
Further Reading............................................................................................................................ 16
Public Interface ............................................................................................................................. 17
Guidelines..................................................................................................................................................17
Internal LAN.................................................................................................................................. 18
Client VPN .................................................................................................................................... 18
Guidelines..................................................................................................................................................18
VPN and VoIP............................................................................................................................... 19
Bandwidth Calculation Variables...............................................................................................................20
Bandwidth Requirement Calculation............................................................................................. 21
Example 1..................................................................................................................................................21
Example 2..................................................................................................................................................22
Guidelines..................................................................................................................................................22
Maximum Load ............................................................................................................................. 23
Configuration ...................................................................................................... 24
IPSec Configuration.............................................................................................................. 24
The IP Security Menu ................................................................................................................... 24
Guidelines - Local and Remote IP Address/Mask configuration...............................................................26
Guidelines - Local and Remote Gateway..................................................................................................26
IKE and IPSec Policies Tabs ........................................................................................................ 27
IKE Policies tab .........................................................................................................................................28
IPSec Policies tab......................................................................................................................................29
L2TP Configuration............................................................................................................... 30
L2TP/Tunnel tab ........................................................................................................................... 30
L2TP/L2TP tab.............................................................................................................................. 31
L2TP/PPP tab ............................................................................................................................... 32
Guidelines..................................................................................................................................................32
Logical LAN Menu ........................................................................................................................ 33
Guidelines..................................................................................................................................................33
Page 2 - Figures
Virtual Private Networking
40DHB0002UKER Issue 3 (4th February 2005)