|
|
Virtual private dialup networks allow separate and autonomous protocol domains to share common access infrastructure including modems, access servers, and ISDN routers. VPDN uses the Layer 2 Forwarding protocol (L2F) which permits the tunneling of link level frames.
L2F passes protocol-level packets through the virtual tunnel between endpoints of a point-to-point connection.
Cisco routers fast switch Layer 2 Forwarding traffic. In stack group environments in which some L2F traffic is offloaded to a powerful router, fast switching provides improved scalability.
For a complete description of the commands mentioned in this chapter, refer to the "Virtual Private Dialup Network Commands" chapter in the Dial Solutions Command Reference. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.
Virtual private dialup networking enables users to configure secure networks that take advantage of Internet Service Providers that tunnel the company's remote access traffic through the ISP cloud.
Remote offices or mobile users can connect to their home network using local dialup services of third parties. The dialup service provider agrees to forward the company's traffic from the ISP POP to a company-run home gateway. Network configuration and security remains in the control of the client. The dialup service provider provides a virtual pipe between the company's sites.
A VPDN connection between a remote user and the home LAN is accomplished in the following steps:
Figure 129 illustrates a VPDN connection from a remote user, who makes a local call, to the corporate network, through an end-to-end L2F tunnel (shown by the dotted line). The user can even be sent directly to a restricted part or a restricted set of servers on the corporate based on the user's authentication. In Figure 129, the restriction placed on this user is suggested by the arc isolating a part of the corporate network cloud.

For more information, see the draft RFC Level Two Forwarding (Protocol) "L2F," which describes the proposed implementation of L2F.
To configure a virtual template for interfaces on a home gateway access server, perform the following tasks beginning in global configuration mode:
| Task | Command |
|---|---|
| Step 1 Create a virtual template interface, and enter interface configuration mode. | interface virtual-template number |
| Step 2 Identify the virtual template interface type and number on the LAN. | ip unnumbered ethernet 0 |
| Step 3 Enable PPP encapsulation on the virtual template interface. | encapsulation ppp |
| Step 4 Enable PPP authentication on the virtual template interface. | ppp authentication chap |
To configure virtual private dialup networking on a home gateway router or access server, perform the following tasks in global configuration mode:
| Task | Command |
|---|---|
| Enable virtual private networking. | vpdn enable |
| Specify the remote host (the network access server), the local name (the home gateway) to use for authenticating, and the virtual template to use. | vpdn incoming nas-name hgw-name virtual-template number |
You can configure the network access to authenticate users before forwarding each connection to the home gateway. This allows you to detect unauthorized users and possibly to lessen the amount of traffic sent over the tunnels. To enable the network access server to authenticate users, complete the following task in global configuration mode:
| Task | Command |
|---|---|
| Enable the network access server to authenticate users. | vpdn local-authentication |
To configure a network access server to make outgoing L2F connections to a home gateway based on domain name, complete the following tasks in global configuration mode:
| Task | Command |
|---|---|
| Enable virtual private networking. | vpdn enable |
| Specify the remote host that is to accept L2F connections. | vpdn outgoing domain-name local-name ip ip-address |
With this feature, a corporation--which might have only one domain name--can provide multiple specific phone numbers for users to dial in to the network access server at the service provider's point of presence. The service provider can select the tunnel to the appropriate services or portion of the corporate network based on the dialed number.
To configure a network access server to select outgoing L2F tunnel connections based on DNIS information for virtual private dialup networking, perform the following tasks in global configuration mode:
| Task | Command |
|---|---|
| Enable virtual private networking. | vpdn enable |
| Enable tunnel selection based on DNIS and specify the number to be dialed. | vpdn outgoing dnis number local-name ip ip-address |
To provide more flexibility, service providers can now configure the network access server to perform tunnel authorization searches by domain name only, by DNIS only, or by both in a specified order.
To configure the network access server's tunnel authorization searches, perform one of the following tasks in global configuration mode:
| Task | Command |
|---|---|
| Search first on the Dialed Number Information Service (DNIS) information provided on ISDN lines and then search on the domain name. | vpdn search-order dnis domain |
| Search first on the domain name and then search on the DNIS information. | vpdn search-order domain dnis |
| Search on the domain name only. | vpdn search-order domain |
| Search on the DNIS information only. | vpdn search-order dnis |
To monitor and maintain VPDN virtual interfaces, perform the following task in EXEC mode:
| Task | Command |
|---|---|
| Display information about the active L2F tunnels and the L2F message identifiers. | show vpdn |
In the following example, the network access server is configured to select tunnels based on the dialed number of incoming calls:
vpdn enable vpdn outgoing dnis 4592367 spartan ip 172.34.16.244
In the following example, the network access server is configured to select tunnels based on the dialed number of incoming calls and to perform tunnel authorization searches on DNIS only:
vpdn enable vpdn outgoing dnis 4592367 spartan ip 172.34.16.244 vpdn search-order dnis
|
|