Summary

This chapter introduced you to configuring remote access sessions using IPsec. In regard to IPsec, I’ll spend more time on how to implement and troubleshoot it on the concentrator when I discuss troubleshooting in Chapter 11, “Verifying and Troubleshooting Concentrator Connections,” and the configuration of remote access clients in Part III.

Next up is Chapter 8, “Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN,” where I show you how to use your concentrator to terminate remote access sessions from PPTP, L2TP, L2TP/IPsec, and WebVPN clients.

Get The Complete Cisco VPN Configuration Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.