Cisco RV042 Administration Guide - Page 172

VPN Mesh Topology, Configuring a Gateway-to-Gateway VPN Tunnel Between RV0xx Series Routers,

Page 172 highlights

Configuring a Gateway-to-Gateway VPN Tunnel Between RV0xx Series Routers Topology Options D VPN Mesh Topology In a VPN mesh topology, each VPN router can communicate securely with all other VPN routers. Multiple secured tunnels extend from each site to all other sites. In the following example, four sites are connected in a VPN mesh topology. Three VPN tunnels extend from each site, providing secure communications with all other sites. Data can travel directly between any two sites. Figure 2 Mesh Site 1 Site 2 VPN Tunnel VPN Tunnel VPN Tunnel VPN Tunnel Internet VPN Tunnel VPN Tunnel Site 3 Site 4 This topology requires much more configuration on each router. However, it works well in a complicated network with data traveling between multiple sites. Because all devices have direct peer relationships with one another, this design prevents the bottlenecks that can occur with a hub-and-spoke topology. This design also ensures that if one site is down, the other sites can continue to exchange data. NOTE When the number of nodes in a full mesh topology increases, scalability may become an issue-the limiting factor being the number of tunnels that the devices can support at a reasonable CPU utilization. 284287 Cisco Small Business RV0xx Series Routers Administration Guide 172

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199

Configuring a Gateway-to-Gateway VPN Tunnel Between RV0xx Series Routers
Topology Options
Cisco Small Business RV0xx Series Routers Administration Guide
172
D
VPN Mesh Topology
In a VPN mesh topology, each VPN router can communicate securely with all other
VPN routers. Multiple secured tunnels extend from each site to all other sites.
In the following example, four sites are connected in a VPN mesh topology. Three
VPN tunnels extend from each site, providing secure communications with all
other sites. Data can travel directly between any two sites.
Figure 2
Mesh
This topology requires much more configuration on each router. However, it works
well in a complicated network with data traveling between multiple sites. Because
all devices have direct peer relationships with one another, this design prevents
the bottlenecks that can occur with a hub-and-spoke topology. This design also
ensures that if one site is down, the other sites can continue to exchange data.
NOTE
When the number of nodes in a full mesh topology increases, scalability may
become an issue—the limiting factor being the number of tunnels that the devices
can support at a reasonable CPU utilization.
Site 1
Site 2
Site 3
Site 4
VPN Tunnel
VPN Tunnel
VPN
Tunnel
VPN
Tunnel
284287
VPN
Tunnel
VPN
Tunnel
Internet