Avatar of puchito
puchito

asked on 

CISCO 2800 AS REMOTE ACCESS SERVER

Hi every body. Im lookin for a guide step by step to set up a router cisco 2800 configuration for remote access vpn. Im looking all the time but i only find "Easy vpn".
Any body have a guide step by step?
Thanks
VPNInternet Protocol Security

Avatar of undefined
Last Comment
John Meggers
Avatar of John Meggers
John Meggers
Flag of United States of America image

Sounds like that's what you want.  EZVPN is Cisco's remote access mechanism that works with computers or other routers / firewalls.  You want to set up the 2800 as an EZVPN server with IPSec clients connecting to it.  There are examples at http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html but most of those are probably more complicated than you need.  Start with the basic configuration guide (e.g. http://www.cisco.com/en/US/docs/ios/sec_secure_connectivity/configuration/guide/sec_easy_vpn_srvr_ps6350_TSD_Products_Configuration_Guide_Chapter.html).  The client configuration isn't hard but I can't put my hands on a config guide right now.  I'll try to find one.
Avatar of John Meggers
John Meggers
Flag of United States of America image

This is somewhat old but it hasn't changed a lot recently.  See http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800ef7ba.shtml
Avatar of puchito
puchito

ASKER

Im looking configuration for remote access with local authentication, very basic. :)
ASKER CERTIFIED SOLUTION
Avatar of John Meggers
John Meggers
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
VPN
VPN

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

26K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo