background image
xiii
Figure 10.4. Typical Intranet Network Diagram ...................................................................................................... 97
Figure 10.5. Intranet VPN Policy Configuration on ISR1........................................................................................ 98
Figure 10.6. Intranet VPN Policy Configuration on ISR2........................................................................................ 99
Figure 10.7. Typical Extranet Network Diagram ................................................................................................... 101
Figure 10.8. Extranet Example
–VPN Policy Configuration on ISR1 .................................................................. 102
Figure 10.9. Extranet Example
– Outgoing NAT Pool Configuration on ISR1 ................................................... 103
Figure 10.10. Extranet Example
– Incoming NAT Pool Configuration on ISR1 ................................................. 103
Figure 10.11. Extranet Example
– Outbound ACL Rule on ISR1........................................................................ 104
Figure 10.12. Extranet Example
– Inbound ACL Rule on ISR1........................................................................... 104
Figure 10.13. Extranet Example
–VPN Policy Configuration on ISR2 ................................................................ 105
Figure 10.14. Extranet Example
– Outgoing NAT Pool Configuration on ISR2 ................................................. 105
Figure 10.15. Extranet Example
– Incoming NAT Pool Configuration on ISR2 ................................................. 106
Figure 10.16. Extranet Example
– Outbound ACL Rule on ISR2........................................................................ 106
Figure 10.17. Extranet Example
– Inbound ACL Rule on ISR2........................................................................... 107
Figure 11.1. User Group Configuration Page........................................................................................................ 110
Figure 11.2. User Group and Users Configuration Example ............................................................................... 112
Figure 11.3. Goup ACL Configuration Page ......................................................................................................... 113
Figure 11.4. Login Console..................................................................................................................................... 114
Figure 11.5. Login Status Screen........................................................................................................................... 114
Figure 11.6. Network Diagram for Inbound Remote Access ............................................................................... 114
Figure 11.7. User and User Group Configuration Example ................................................................................. 115
Figure 11.8. Group ACL Configuration Example .................................................................................................. 115
Figure 11.9. VPN Virtual IP Configuration Page ................................................................................................... 116
Figure 11.10. Network Diagram for VPN Remote Access ................................................................................... 117
Figure 11.11. Main Mode Remote Access Example
– Create a User Group and Add Two Users into the Group
.......................................................................................................................................................................... 118
Figure 11.12. Main Mode Remote Access Example
– Configure the Virtual IP address .................................. 119
Figure 11.13. Main Mode Remote Access Example
– Remote VPN Connection Setup for “RoadWarrior”
Group................................................................................................................................................................ 119
Figure 11.14. Aggressive Mode Remote Access Example
– Create a User Group and Add Two Users into the
Group................................................................................................................................................................ 120
Figure 11.15. Aggressive Mode Remote Access Example
– Configure the Virtual IP address........................ 120
Figure 11.16. Aggressive Mode Remote Access Example
– Remote VPN Connection Setup for “RoadWarrior”
Group................................................................................................................................................................ 121
Figure 12.1. System Services Configuration Page............................................................................................... 123
Figure 12.2. Password Configuration Page .......................................................................................................... 124
Figure 12.3. System Information Configuration Page........................................................................................... 125
Figure 12.4. Date and Time Configuration Page .................................................................................................. 125