This chapter covers the following subjects:
• Plan a Cisco IOS Software VTI-based site-to-site VPN: Introduces the virtual tunnel interface (VTI) and discusses pre-deployment tasks for VTI-based VPNs.
• Configure basic IKE peering using pre-shared keys: Presents the essential parameters to successfully configure Internet Key Exchange (IKE) between two peers.
• Configure and verify static point-to-point IPsec VTI tunnels: Learn how to configure static, point-to-point VPNs.
• Configure and verify dynamic point-to-point IPsec VTI tunnels: Learn how to configure dynamic, point-to-point VPNs.
IP Security (IPsec) virtual tunnel interfaces (VTI) greatly simplify the configuration process that is ...