This chapter covers the following subjects:
• Configuration Procedures, Deployment Strategies, and Information Gathering: This section reviews the common deployment methods and designs that are used for IPsec site-to-site VPNs and the information necessary for a basic VPN deployment.
• Configuring a Basic IKEv1 IPsec Site-to-Site VPN: This section discusses how to configure a successful deployment between two sites using the ASDM.
• Configuring a Basic IKEv2 IPsec Site-to-Site VPN: This section explains how to configure a new site-to-site tunnel with the ASDM and using IKEv2.
• Configuring Advanced Authentication for IPsec Site-to-Site VPNs: This section covers the role of PKI (instead of PSKs) when ...