|
|
This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer 2 Forwarding (L2F) as the tunneling protocol. L2F forwards Point-to-Point (PPP) sessions from one router to another router across a shared network infrastructure.
This case study is primarily intended for network administrators and operations teams working for ISPs who provide access VPN services to enterprise customers. This case study is also useful to enterprise customers who want to establish access VPNs.
This access VPN:
Figure 6 shows an enterprise customer with a specific business objective. The enterprise customer wants to give 500 users dial-up modem access to intranet resources through the public switched telephone network (PSTN). To do this, the enterprise customer contracts with an ISP who is responsible for the required dial hardware and wide-area network (WAN) services. The ISP and enterprise customer decide to use L2F, because it is a stable tunneling protocol supported by many vendors and client software applications.

The ISP:
The enterprise customer:
Figure 7 shows the specific network devices used to build the access VPN in this case study.
The L2F tunnel runs between the Cisco AS5300 and Cisco 7206. The L2F tunnel is forwarded across a Frame Relay network.

This case study does not describe how to configure the edge router, the Frame Relay data network, or the serial interfaces on the home gateway. Although these components are shown in Figure 7, they are not critical in understanding how to build an access VPN solution and are outside the scope of this case study. For more information about how to configure Frame Relay and serial interfaces, refer to the Wide-Area Networking Configuration Guide for Cisco IOS Release 12.0.
See "Overview of Access VPNs and Tunneling Technologies" earlier in this document for an overview of access VPN solutions.
Table 4 provides a more detailed description of the hardware and software components used in the case study.
| NAS | Home Gateway | CiscoSecure ACS UNIX Server | CiscoSecure ACS NT Server | Client | |
|---|---|---|---|---|---|
| Chassis type | Cisco AS5300 | Cisco 7206 | Sun workstation | PC workstation | PC laptop |
| Physical interfaces |
|
| 1 Ethernet interface | 1 Ethernet interface | 1 RJ-11 port |
| Hardware components |
|
| 1 Ethernet card | 1 Ethernet card | 1 internal modem |
| Software loaded |
|
|
|
| Windows 95 |
| Telephone number or username | 55509451 | N/A | N/A | N/A | jeremy@hgw.com password = subaru |
| Memory |
|
| 128 MB RAM | 128 MB RAM | 64 MB RAM |
| Ethernet IP Address | 172.22.66.23 255.255.255.192 | 172.22.66.25 255.255.255.192 | 172.22.66.18 | 172.22.66.13 | 172.30.2.12 |
To build the access VPN, the ISP and enterprise customer must perform three major tasks to build the access VPN in this case study:
Table 5 describes each task in more detail and identifies the devices related to each task.
A user named Jeremy with the username jeremy@hgw.com appears in many configurations, illustrations, and examples in this case study. The goal of the case study is to give Jeremy basic IP and modem services by forwarding his PPP session from the NAS to the home gateway. To help you understand how the various hardware and software components work together to forward the PPP session, follow Jeremy through the case study.
| Task | Description | Devices | ||
|---|---|---|---|---|
|
Performed by the ISP. | | ||
|
Performed by the ISP and the enterprise customer. | | ||
|
Performed by the ISP and the enterprise customer. | |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon May 3 11:59:41 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.