Home To Know Networking Remote VPN

Remote VPN

Remote VPN

Remote VPN allow secure access to corporate resources by establishing an encrypted tunnel across the Internet. The ubiquity of the Internet, combined with today’s VPN technologies, allows organizations to cost-effectively and securely extend the reach of their networks to anyone, anyplace, anytime.

VPNs have become the logical solution for remote-access connectivity for the following reasons:

  • Provides secure communications with access rights tailored to individual users, such as employees, contractors, or partners.
  • Enhances productivity by extending corporate network and applications.
  • Reduces communications costs and increases flexibility.

Example Configuration of Remote VPN

Configuration Topology of Remote VPN
Configuration Topology of Remote VPN

(Note: R1 able to reach R3.)

R3 (Server)

crypto isakmp policy 1
authentication pre-share
encryption 3des
group 2
hash sha
lifetime 1800

crypto ipsec transform-set tset esp-sha-hmac esp-3des

ip local pool pool1

crypto isakmp client configuration group Test
key cisco
domain cisco.com
pool pool1

crypto dynamic-map DMAP 10
set transform-set tset

crypto map CMAP 10 ipsec-isakmp dynamic DMAP
crypto map CMAP isakmp authorization list default
crypto map CMAP client authentication list defualt

aaa new-model
aaa authentication login default local
aaa authorization network default local

username cisco password cisco

int f0/0
crypto map CMAP

R1 (Client)

crypto ipsec client ezvpn EZvpn
mode client
connect auto
group Test key cisco
username cisco password cisco

int f0/0
crypto ipsec client ezvpn Ezvpn outside

int f0/1
crypto ipsec client ezvpn Ezvpn inside


  1. Thanks for the sensible critique. Me & my neighbor were just preparing to do some research on this. We got a grab a book from our area library but I think I learned more clear from this post. I’m very glad to see such fantastic info being shared freely out there.

Leave a Reply