Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

Introduction
Design Overview
Starting Assumptions
Design Components
Comparing DVTI with other VPN Topologies
Understanding Scalability Results
Best Practices and Known Limitations
Best Practices Summary
General Best Practices
Headend Best Practices
Branch Office Best Practices
Known Limitations Summary
General Limitations
Headend Limitations
Branch Office Limitations
Design and Implementation
Overview
Design Considerations
Virtual Tunnel Interface
Virtual Template Interface Service
Per-Tunnel Features
Encapsulation
QoS Service Policy
VTI encapsulation
Easy VPN with Dynamic Virtual Tunnel Interface Support
EZVPN Remote Client—Mode Network-Plus
ISAKMP DSCP Value
Trustpoints
ISAKMP Policy
IPsec Profile
Headend Router Configuration
Branch Router Configuration
Dynamic VTI for EZVPN Remote and Server—Dual Tunnel Support
IP Multicast
EIGRP Headend Router Configuration
EIGRP Branch Router Configuration
OSPF and PIM Headend Router Configuration
OSPF and PIM Branch Router Configuration
Caveats
Address Conservation
Overview of IP Unnumbered
Loopback versus Inside Ethernet/FastEthernet
Examples
High Availability
Interaction with other Networking Functions
Network Address Translation and Port Address Translation
Dynamic Host Configuration Protocol
Firewall Considerations
Common Configuration Mistakes
Transform Set Matching
ISAKMP Policy Matching
Scalability Considerations
QoS Configuration for Performance Testing
Policy Map for Branch and Headend
Branch Configuration
Headend using Virtual Template Interface
Target-Shaped Rate
Scalability Test Results (Unicast Only)
Scalability Test Methodology
Scalability Results
Scalability Conclusion
Software Releases Evaluated and Caveats
Scalability Test Bed Configuration Files
Cisco 7200VXR Headend Configuration
Branch Office Configuration
Appendix A—Additional Test Result Data
Caveats and DDTS of Interest
Line Protocol
Appendix B—Peer has IPsec Interface Support
Appendix C—Output for debug crypto ipsec client ezvpn Command
Appendix D—Output for show crypto session detail Command
Appendix D—References
Appendix E—Acronyms and Definitions
0 of .
Results for:
No results containing your search query
P. 1
91802107 Virtual Tunnel Interface Design Guide

91802107 Virtual Tunnel Interface Design Guide

Ratings: (0)|Views: 703|Likes:
Published by nvlongjvc

More info:

Published by: nvlongjvc on Sep 20, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/23/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 23 are not shown in this preview.
You're Reading a Free Preview
Pages 27 to 66 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->