When designing a network solution, we often are faced with a myriad of parameters that influence the design process and the selection of the final solution. A network designer ideally would want to control as many parameters as possible apart from the business requirements, which is the basic set of requirements that guide us to the right solution. In this IP Corner article, Boštjan Šuštar describes how to design a network solution for an IPsec-based site-to-site virtual private network (VPN) by using crypto maps. This is the first in a series of articles describing various methods of implementing IPsec in Cisco IOS.

Read more in the attached document

‹ back