xiii
Figure 10.4. Typical Intranet Network Diagram......................................................................................................97
Figure 10.5. Intranet VPN Policy Configuration on ISR1........................................................................................98
Figure 10.6. Intranet VPN Policy Configuration on ISR2........................................................................................99
Figure 10.7. Typical Extranet Network Diagram...................................................................................................101
Figure 10.8. Extranet Example –VPN Policy Configuration on ISR1..................................................................102
Figure 10.9. Extranet Example – Outgoing NAT Pool Configuration on ISR1...................................................103
Figure 10.10. Extranet Example – Incoming NAT Pool Configuration on ISR1.................................................103
Figure 10.11. Extranet Example – Outbound ACL Rule on ISR1........................................................................104
Figure 10.12. Extranet Example – Inbound ACL Rule on ISR1...........................................................................104
Figure 10.13. Extranet Example –VPN Policy Configuration on ISR2................................................................105
Figure 10.14. Extranet Example – Outgoing NAT Pool Configuration on ISR2.................................................105
Figure 10.15. Extranet Example – Incoming NAT Pool Configuration on ISR2.................................................106
Figure 10.16. Extranet Example – Outbound ACL Rule on ISR2........................................................................106
Figure 10.17. Extranet Example – Inbound ACL Rule on ISR2...........................................................................107
Figure 11.1. User Group Configuration Page........................................................................................................110
Figure 11.2. User Group and Users Configuration Example...............................................................................112
Figure 11.3. Goup ACL Configuration Page.........................................................................................................113
Figure 11.4. Login Console.....................................................................................................................................114
Figure 11.5. Login Status Screen...........................................................................................................................114
Figure 11.6. Network Diagram for Inbound Remote Access...............................................................................114
Figure 11.7. User and User Group Configuration Example.................................................................................115
Figure 11.8. Group ACL Configuration Example..................................................................................................115
Figure 11.9. VPN Virtual IP Configuration Page...................................................................................................116
Figure 11.10. Network Diagram for VPN Remote Access...................................................................................117
Figure 11.11. Main Mode Remote Access Example – Create a User Group and Add Two Users into the Group
..........................................................................................................................................................................118
Figure 11.12. Main Mode Remote Access Example – Configure the Virtual IP address..................................119
Figure 11.13. Main Mode Remote Access Example – Remote VPN Connection Setup for “RoadWarrior”
Group................................................................................................................................................................119
Figure 11.14. Aggressive Mode Remote Access Example – Create a User Group and Add Two Users into the
Group................................................................................................................................................................120
Figure 11.15. Aggressive Mode Remote Access Example – Configure the Virtual IP address........................120
Figure 11.16. Aggressive Mode Remote Access Example – Remote VPN Connection Setup for “RoadWarrior”
Group................................................................................................................................................................121
Figure 12.1. System Services Configuration Page...............................................................................................123
Figure 12.2. Password Configuration Page..........................................................................................................124
Figure 12.3. System Information Configuration Page...........................................................................................125
Figure 12.4. Date and Time Configuration Page..................................................................................................125