Cisco MX65W Cloud Managed Security Appliance Bruksanvisning

Cisco Brandvägg (hårdvara) MX65W Cloud Managed Security Appliance

Läs nedan 📖 manual på svenska för Cisco MX65W Cloud Managed Security Appliance (8 sidor) i kategorin Brandvägg (hårdvara). Denna guide var användbar för 9 personer och betygsatt med 4.5 stjärnor i genomsnitt av 2 användare

Sida 1/8
White Paper
Cisco Meraki Auto VPN
JU LY 2013
This white paper describes Auto VPN (Layer 3 site-to-site IPsec) and
how to deploy it between Cisco Meraki Security Appliances.
Copyright
© 2013 Cisco Systems, Inc. All rights reserved
Trademarks
Meraki® is a registered trademark of Cisco Systems, Inc.
Table of Contents Introduction
Cisco Meraki’s Solution
For More information
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com
2
Introduction
What is VPN?
Virtual Private Networks (VPNs) are used by most organizations seeking to provide teleworkers
with pseudo on-site access to core network resources or to connect branch oces to a core
network. VPNs are encrypted tunnels that allow for the secure, confidential transfer of data across
unsecured, public infrastructure — typically, the Internet.
What is site-to-site VPN?
One of the most common implementations of VPN is site-to-site VPN, where one location hosting
network resources is securely connected via VPN to another location (which may also be hosting
resources); usually the two locations are part of the same organization.
The diagram below shows a site-to-site VPN:
Site-to-site VPNs are deployed between the security appliances/firewalls at each location. The
client devices (such as laptops or workstations) behind these firewalls do not need software
installed or local settings configured to enable them to send or receive data with the other sites.
In a site-to-site VPN (also known as spoke-to-spoke”), all of an organization’s individual mesh
networks are connected to one another via VPN. In a topology, all of the satellite hub-and-spoke
branch oce networks (“spokes”) tunnel back to a central oce (“hub”) over VPN; the spokes do
not exchange data directly with one another.
Why is VPN hard?
With traditional architectures, the configuration and management complexity of multi-site VPN
can become prohibitive as the number of distributed sites increases. This is because both ends of
each VPN tunnel need to be manually created and tuned, often through a complex command line
interface. This is a time-consuming and error-prone process: variables such as the IP addresses of
both security appliance interfaces, a pre-shared key or certificate, authentication and encryption
protocols, a list of exportable subnets, and more need to be manually specified and configured
twice for each tunnel. Imagine: if a primary WAN uplink fails over to a 3G/4G link and the external
IP address of the VPN changes, all of these settings would need to be re-established for the new
address for VPN functionality to resume.
INTERNET
Encrypted IPsec VPN tunnel
Network A
LOCATION
1 L
OCATION 2
Client devices A1, A2,
and A3 on Network A
Client devices B1, B2,
and B3 on Network B
A1 A2 A3 B1 B2 B3
10.1.0/24
Network B
192.168.1.0/24
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com
3

Produktspecifikationer

Varumärke: Cisco
Kategori: Brandvägg (hårdvara)
Modell: MX65W Cloud Managed Security Appliance

Behöver du hjälp?

Om du behöver hjälp med Cisco MX65W Cloud Managed Security Appliance ställ en fråga nedan och andra användare kommer att svara dig