Changes

no edit summary
Line 17: Line 17:  
There will be two IPsec configuration schemes presented. Although the second scheme is only an extension of the first one. Therefore, to configure the second scheme, you will have to configure the first as well.
 
There will be two IPsec configuration schemes presented. Although the second scheme is only an extension of the first one. Therefore, to configure the second scheme, you will have to configure the first as well.
   −
'''Configuration scheme 1''':
+
'''configuration scheme 1''':
    
[[File:Configuration examples ipsec scheme 1.png]]
 
[[File:Configuration examples ipsec scheme 1.png]]
Line 23: Line 23:  
The figure above above depicts two RUTxxx routers (RUT1 and RUT2) connected by an IPsec tunnel via the Internet.
 
The figure above above depicts two RUTxxx routers (RUT1 and RUT2) connected by an IPsec tunnel via the Internet.
 
----
 
----
'''Configuration scheme 2''':
+
'''configuration scheme 2''':
    
[[File:Configuration examples ipsec scheme.png]]
 
[[File:Configuration examples ipsec scheme.png]]
   −
For the sake of better understanding, lets look at sche
+
As mentioned earlier,''configuration scheme 2'' (figure above) is an extension of ''configuration scheme 1''. While ''configuration scheme 1'' only depicts a connection between two IPsec instances, you can see that in ''configuration scheme 2'' additionally contains two end devices ('''END1''' and '''END2'''), each connected to a separate router's LAN. When this scheme is realized, not only will the two routers be able to communicate with each other, the end devices will also be reachable to one another and from each router.
    
==Router configuration==
 
==Router configuration==

Navigation menu