Up until this point, we’ve discussed major deployments and best practice design fundamentals for IPsec VPN deployments. Situations may arise in which IPsec network architectures are forced to vary somewhat. In this chapter, we will explore the forces that cause this variation in the fundamentals of IPsec VPN designs and some of the strategies that can be used to address these variations:
IPsec VPN Tunnel Termination “On-a-Stick”
In-Path vs. Out-of-Path Encryption
Separate Termination of IPsec ...