Sections:
Resources:
Overview:
IPsec VPN Fundamentals
Overview
Key Features and Components
Encryption
Authentication
Data Integrity
Tunneling
Security Associations (SA)
Protocols Used in IPsec
How IPsec VPN Works Via IKE Phases
IKE (Internet Key Exchange) Overview
Phase 1 (IKE - Internet Key Exchange)
Phase 2 (IPsec)
Types of IPsec VPN Configurations
Site-to-Site VPN
Remote Access VPN
DMVPN
FlexVPN
GetVPN
Benefits of IPsec VPN
Security
Scalability
Support for Multiple Platforms
Compatibility with IPv6
Potential Drawbacks
Complexity
NAT Traversal
IPsec VPN Configuration
Overview
IPsec VPN Topology
IPsec Configuration - Corporate Site LAN
IPsec Configuration - Branch Site LAN
IPsec VPN Firewall Rules
Overview
IPsec VPN Topology
Branch IPsec VPN Firewall Rule
Corporate IPsec VPN Firewall Rule
Device Access Administration
Overview
IPsec VPN Topology
Corporate Site - Device Access Administration
Branch Site - Device Access Administration
IPsec Routes for DHCP Relay Traffic (via Policy-based IPsec VPN)
Overview
IPsec Route Use Cases (via Policy-based IPsec Tunnels)
IPsec VPN Topology
Branch Site - IPsec Routes
IPsec VPN Verification & Testing
Overview
IPsec VPN Topology
DHCP Relay to Windows Server
Helpdesk VLAN 50 ICMP
IPsec VPN Custom Profiles
Overview
IPsec VPN Topology
Branch Site Custom IPsec Profile
Corporate Site Custom IPsec Profile