
The example in this chapter illustrates the configuration of a remote access VPN that uses the Cisco Easy
VPN and an IP Security (IPSec) tunnel to configure and secure the connection between the remote client and
the corporate network. The figure below shows a typical deployment scenario.
Figure 18: Remote Access VPN Using IPSec Tunnel
Remote, networked users1
VPN client—Cisco 860 and Cisco 880 series ISRs
2
Router—Providing the corporate office network
access
3
VPN server—Easy VPN server
4
Corporate office with a network address of 10.1.1.15
IPSec tunnel6
Cisco Easy VPN
The Cisco Easy VPN client feature eliminates much of the tedious configuration work by implementing the
Cisco Unity Client protocol. This protocol allows most VPN parameters, such as internal IP addresses, internal
subnet masks, DHCP server addresses, WINS server addresses, and split-tunneling flags, to be defined at a
VPN server that is acting as an IPSec server.
An Easy VPN server-enabled device can terminate VPN tunnels initiated by mobile and remote workers who
are running Cisco Easy VPN Remote software on PCs. Easy VPN server-enabled devices allow remote routers
to act as Easy VPN Remote nodes.
The Cisco Easy VPN client feature can be configured in one of two modes—client mode or network extension
mode. Client mode is the default configuration and allows only devices at the client site to access resources
Cisco 800 Series Integrated Services Routers Software Configuration Guide
338 OL-31704-02
Configuring a VPN Using Easy VPN and an IPSec Tunnel
Configuring a VPN Using Easy VPN and an IPSec Tunnel
Comments to this Manuals