Datasheet
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
VPN Planning Design (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Objective
Explain the use of VPNs in securing site-to-site connectivity in a small- to medium-sized business network.
Instructor Note: This activity is best completed in small groups. It can then be shared with another group, the
class, or the instructor (as a group project).
Scenario
Your small- to medium-sized business has received quite a few new contracts lately. This has increased the need
for teleworkers and workload outsourcing. The new contract vendors and clients will also need access to your
network as the projects progress.
As network administrator for the business, you recognize that VPNs must be incorporated as a part of your
network strategy to support secure access by the teleworkers, employees, and vendors or clients.
To prepare for implementation of VPNs on the network, you devise a planning checklist to bring to the next
department meeting for discussion.
Resources
World Wide Web access
Packet Tracer software
Word processing software
Step 1: Visit the VPN Discovery Tool, or any other Internet site with VPN-implementation, or
planning checklist examples.
Step 2: Use Packet Tracer to draw the current topology for your network; no device
configurations are necessary. Include:
Two branch offices: the Internet cloud and one headquarters location
Current network devices: servers, switches, routers/core routers, broadband ISR devices, and local user
workstations
Step 3: On the Packet Tracer topology, indicate:
a. Where you would implement VPNs?
b. What types of VPNs would be needed?
1) Site to site
2) Remote access