The Complete Cisco VPN Configuration Guide

( 3 )


Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution

  • A complete resource for understanding VPN components and VPN design issues
  • Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and...
See more details below
Paperback (New Edition)
$68.31 price
(Save 24%)$90.00 List Price
Other sellers (Paperback)
  • All (15) from $29.24   
  • New (11) from $59.71   
  • Used (4) from $0.00   
Sending request ...


Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution

  • A complete resource for understanding VPN components and VPN design issues
  • Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients
  • Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience
  • Filled with relevant configurations you can use immediately in your own network

With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.

Part I, “VPNs,” introduces the topic of VPNs and discusses today’s main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, “Concentrators,” provides detail on today’s concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network.

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Read More Show Less

Product Details

  • ISBN-13: 9781587052040
  • Publisher: Cisco Press
  • Publication date: 12/23/2005
  • Series: Networking Technology Series
  • Edition description: New Edition
  • Pages: 1032
  • Sales rank: 1,455,647
  • Product dimensions: 7.40 (w) x 9.08 (h) x 2.21 (d)

Meet the Author

Richard A. Deal has nearly 20 years experience in the computing and networking industry including networking, training, systems administration, and programming. In addition to a bachelor’s of science degree in mathematics and computer science from Grove City College, Richard holds many certifications from Cisco. Since 1997, Richard has operated his own company, The Deal Group, Inc., located in Orlando, Florida. He also teaches Cisco security courses for Boson Training and writes preparation tests for them.

Read More Show Less

Table of Contents

Part I VPNs

Chapter 1 Overview of VPNs

Chapter 2 VPN Technologies

Chapter 3 IPsec

Chapter 4 PPTP and L2TP

Chapter 5 SSL VPNs

Part II Concentrators

Chapter 6 Concentrator Product Information

Chapter 7 Concentrator Remote Access Connections with IPsec

Chapter 8 Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN

Chapter 9 Concentrator Site-to-Site Connections

Chapter 10 Concentrator Management

Chapter 11 Verifying and Troubleshooting Concentrator Connections

Part III Clients

Chapter 12 Cisco VPN Software Client

Chapter 13 Windows Software Client

Chapter 14 3002 Hardware Client

Part IV IOS Routers

Chapter 15 Router Product Information

Chapter 16 Router ISAKMP/IKE Phase 1 Connectivity

Chapter 17 Router Site-to-Site Connections

Chapter 18 Router Remote Access Connections

Chapter 19 Troubleshooting Router Connections

Part V PIX Firewalls

Chapter 20 PIX and ASA Product Information

Chapter 21 PIX and ASA Site-to-Site Connections

Chapter 22 PIX and ASA Remote Access Connections

Chapter 23 Troubleshooting PIX and ASA Connections

Part VI Case Study

Chapter 24 Case Study

Read More Show Less

Customer Reviews

Average Rating 4.5
( 3 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Anonymous

    Posted July 11, 2006

    Swiss Army Knife of VPN Guides

    Richard Deal¿s book, The Complete Cisco VPN Configuration Guide, sets out to provide a comprehensive reference for networking professionals designing, deploying, and managing VPN solutions. This book covers the foundational information as well as step by step guides to configuring VPN solutions on Cisco VPN Concentrators, software and hardware clients, Cisco IOS routers, and Cisco PIX and ASA appliances. The book is broken down into 6 parts: VPNs, Concentrators, Clients, IOS Routers, PIX Firewalls, and a Case Study. The VPN chapters provide the reader with an excellent foundation in VPNs. These chapters cover topics such as VPN types and topologies, technologies used to establish VPNs, as well as VPN implementations, such as IPsec, PPTP, L2TP, SSL. The next section focuses on the Cisco VPN Concentrators. Mr. Deal provides information on the Cisco 3000 series of VPN concentrators as well as the features of various software releases. The next few chapters focus on different deployment scenarios. These scenarios include remote access with IPsec, Remote access with PPTP, L2TP, and WebVPN (SSL), and site-to-site. The final chapters of the concentrator section cover management and troubleshooting. The next section covers software (Cisco and Microsoft) and hardware (Cisco) VPN clients. The fourth section focuses on Cisco IOS Routers. This section follows a similar layout to the concentrator section providing details about site-to-site and remote access VPN connections as well as a troubleshooting chapter at the end. It does highlight the differences in the configuration as well. As with the concentrators, Mr. Deal include specific product information. While helpful in dealing with existing equipment, it quickly will become obsolete as Cisco EOS/EOL equipment and software from these lists. It might have been more practical to provide URL references to Cisco¿s website. The fifth section covers VPN deployments with the Cisco PIX and ASA security appliances. Again, the layout is consistent with the IOS Router and Concentrator sections. The final section is a case study which brings together most of the concepts covered in the book. This book is an excellent reference on VPNs. It should be in every networking professional¿s personal library who designs, deploys, and manages a VPN solution. The diagrams are clear and easy to follow. The troubleshooting chapters of each section provide excellent tools as well as common mistakes to help the networking professional deploy their solution successfully. The case study provides an invaluable example of a real world deployment. While the book is not advertised to be an exam preparation or certification guide, it could easily be used as a supplement towards those studies.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 25, 2006

    Valuable Resources for Cisco VPN Implementation

    Richard Deal¿s ¿The Complete Cisco VPN Configuration Guide¿ provides a complete step by step guide on how to configure VPN on Cisco Concentrators, software (including Windows VPN client) and hardware client, IOS routers, PIX and ASA security appliances. The book also discusses what to look for to troubleshoot VPN connection, provides common real-life problems you will experience when setting up VPN and a case study at the end of the book to review all the concepts and configuration from previous chapters. The book does an excellent job in informing when and why to select certain Cisco VPN products over others. It also provides up to date information on VPN configuration guide for PIX. Both PIX FOS 6.0 and 7.0 VPN configurations are discussed. The book focuses about five chapters discussing concentrators. This is understandable as Cisco concentrators are more widely used for remote access than other Cisco VPN products. However, I would like to see the book to give equal weight to PIX and ASA appliances as more and more are adopting them as concentrators are gradually being phased out. The book will be more complete if it mentions other VPN configuration features such as SDM for IOS routers, ASDM for PIX and ASA and VPN Router Management Center for Cisco Works. The author has omitted these due to space constraints since the book is already almost 1,000 pages. In summary, this book will benefit any network administrators with intermediate to advance level of knowledge that need to use Cisco products for VPN implementation. This is the best ¿how-to¿ Cisco Press book for Cisco VPN and it fulfills its mission as a complete resource for understanding Cisco VPN implementation. You might also want to check other Richard Deal¿s well written security book titled ¿Cisco Router Firewall Security¿.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 29, 2006

    A useful read for security professionals, and maybe a valuable resource for Cisco security certification aspirants

    A thorough and complete review of VPN technologies, as implemented in Cisco infrastructure, Deal¿s `The Complete Cisco VPN Configuration Guide¿, is arranged as a twenty three chapter step by step technology review and one chapter of bonus case studies. The forty page Case study at the end of the book demonstrates the books material in a concise, simple and easy to follow way and its compactness will make it useful for an engineer who has general ideas about VPN , yet need to get a site running quickly. This chapter can be read without a full understanding of the remainder of the text, productively. The rest of the text is arranged into five parts, viz., VPNs, Concentrators, Clients, IOS routers and PIX firewall. The first part being a good attempt at VPN technology review. The presentation of the technologies in the part, of five chapters is generic enough to appeal to a wide audience of security professionals. The arrangement of the subject into chapter one on VPN overview, Chapter two on fundamental VPN technologies, Chapter three on IPSec, four on PPTP and L2TP and five on SSL VPN , is one of the better classification and treatments of VPN technologies I have seen lately. VPN concentrators are the core Cisco VPN infrastructure, and they get a fair treatment with ample configuration examples in the second part. Chapter 6, the first chapter in this section provides a broad treatment of the concentrator products available and the rest of section is devoted to concentrator configuration and troubleshooting. I am almost tempted to question why the author decided to devote a whole section of three chapters of more than one fifty pages, to VPN client software, but my experience with users and administrators alike, who have demonstrated some clumsiness with various VPN client solutions, refrained me. This indeed is a clear and concise guide that administrators can use a basis for developing an in-house user manual. It covers the Cisco VPN client software, the Microsoft VPN dialer software, the Cisco 3200 hardware client, but misses out on some alternative solutions. There was no talk of SSH VPN clients, such as putty, in this section as there were none on non-traditional, but evolving VPN solutions including secure remote desktop solutions. Cisco¿s integration of almost all its security technologies in IOS is demonstrated again in section four. This section discusses router capabilities and demonstrates them with some configuration examples. Another major Cisco Security technology, the PIX, which also serves as one the more popular Cisco VPN concentrator in deployment, is also given a fair treatment in this text. In all, this is a good text for newbie¿s and intermediate network or infrastructure professionals. A useful read for security professionals, and maybe a valuable resource for Cisco security certification aspirants. But don¿t loose your Cisco documentation manual, or your Cisco Technology handbooks yet.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)