

In our example below, only traffic between the two LAN subnets (192.168.10.0/24 and 192.168.20.0/24) will pass through the tunnel. NOTE: Policy-Based VPN is when a subset of traffic is selected (through a policy) for passing through the encrypted VPN tunnel.

Software Versions: Cisco 4.bin and Juniper 11.4R7.5įor easy understanding we will use a simple topology that covers Policy-Based IPSEC VPN between the two devices as shown on the diagram below. In this post we will cover the configuration of an IPSEC VPN Tunnel between Cisco and Juniper routers in order to create a site-to-site VPN network over the Internet.ĭevices used in this Lab: Cisco 891-k9 and Juniper SRX100H. Some VPN topics have already been discussed on this blog (such as vpn between ASA and pfsense, vpn between two Cisco ASA, VPN between routers with dynamic crypto maps, and other VPN scenarios). IPSEC is a standardized suit of protocols that is supported by all security vendors, therefore it offers the best option for interoperability. One requirement that you will find frequently in your work environment is to establish a secure VPN connection over the public internet between two different vendor devices.Īs a network engineer you need to know that the best VPN technology to use for multivendor communication is IPSEC VPN. In today’s network infrastructures, you will encounter multivendor devices that need to communicate and interoperate.
