VPN types
VPN types are network connection categories that
-
provide secure, encrypted connections between remote locations and private networks
-
support deployment models including remote access and site-to-site configurations, and
-
use various protocols including SSL and IPsec for establishing secure tunnels.
Supported VPN connection types
The Cloud-Delivered Firewall Management Center supports these types of VPN connections:
-
Remote Access VPNs in Firewall Threat Defense devices.
Remote access VPNs provide secure, encrypted connections, or tunnels, between remote users and your company's private network. These connection use two devices: a VPN endpoint device, which is a workstation or mobile device with VPN client capabilities, and a VPN headend device, or secure gateway, at the edge of the corporate private network.
Secure Firewall Threat Defense devices can be configured to support Remote Access VPNs over SSL or IPsec IKEv2 by the Cloud-Delivered Firewall Management Center. When acting as secure gateways, these devices authenticate remote users, authorize access, and encrypt data to provide secure connections to your network. Only these devices support remote access VPN connections, managed by the Cloud-Delivered Firewall Management Center.
Secure Firewall Threat Defense secure gateways support the Secure Client full tunnel client. This client is required to provide secure SSL IPsec IKEv2 connections for remote users. This client automatically installs when a connection is established, so network administrators do not need to manually install or configure it on remote computers. It is the only client supported on endpoint devices.
-
Site-to-site VPNs in Firewall Threat Defense devices.
A site-to-site VPN connects networks in different geographic locations. You can create site-to-site IPsec connections between managed devices, and between managed devices and other Cisco or third-party peers. These peers can use either IPv4 and IPv6 addresses. Site-to-site tunnels are built using the Internet Protocol Security (IPsec) protocol suite and IKEv1 or IKEv2. After the VPN connection is established, the hosts behind the local gateway can connect to the hosts behind the remote gateway through the secure VPN tunnel.