
Copyright © 1999 Cisco Systems, Inc. All Rights Reserved.
Page 11 of 16
Virtual Private Network (VPN) Access and Firewall Protection
Many companies have begun to use Virtual Private networks
(VPNs) to reduce WAN costs by deploying secure tunneled
connections via the Internet. VPNs can be rapidly set up and torn
downto provide extranet links to customers, business partners and
remote employees. With extra performance required to support
advanced Cisco IOS security features such as IPSec encryption,
the Cisco 2600 Series can support multiple encrypted tunnels and
provide the advanced security features at the Cisco IOS Firewall
feature set. In this example the Cisco 2610 router in the branch
office provides secure privileged access to business partners while
also supporting another connection to the Cisco 2621 in the main
office. The dual-LAN architecture of the Cisco 2621 allows the
customer to create an external subnet or “DMZ” for a public Web
server outside the firewall while providing security for the internal
network. Cisco IOS features such as intrusion detection,
tunneling, data encryption, and termination of Remote Access
WANs via IPSec, Layer 2 Forwarding (L2F) and Layer 2
Tunneling Protocols (L2TP) make the Cisco 2600 an ideal
platform for building virtual private networks or outsourced dial
solutions.
Figure 9 Virtual Private Network
Cisco
AS5300
Cisco 2610
Cisco 2610
Cisco 2621
Cisco IOS
Firewall
Web
Server
Internet
Branch Office
Main Office
Vendor
Office
Service
Provider POP
Encrypted Tunnel A
Encrypted Tunnel B
Encrypted Tunnel C
Komentarze do niniejszej Instrukcji