The 2620 is using bootstrap ver 11.3(2)XA4. The 3640 has bootstrap 11.1(20)AA2. The 2620 IOS version is 12.0(7)T and the 3640 is version 12.1(3a).
I don't want to have to rebuild configurations on either of these routers. I'd upgrade the software if I were sure it wouldn't wipe out the current configs. I tried setting up gre tunnels with a shared key and failed. Any advice would be greatly appreciated.
Requires Free Membership to View
There are lots of alternatives in the market including small network appliances like NetScreen, SonicWall and WatchGuard and low cost VPN services from companies like E-tunnels, Imperito and OpenReach.
For about $500 street price, you can get a VPN appliance that will do everything you want and not mess with your Cisco configuration. If you're just trying to connect two or three sites, this should work fine. You can use shared secrets for authentication and you won't need any kind of global management.
Alternatively, the low cost service providers may be more efficient if you're going beyond just a few locations or looking to add remote access services. These companies provide everything you need for the premises, but also offer authentication capabilities, configuration management, monitoring and alerting. One nice part about using these types of services is that they allow you to set up VPNs in environments where every location is on a broadband circuit with a variable address served up via DHCP. In some cases, the cost savings there more than pay for the VPN.
In either case, I would avoid messing around with my legacy gear. The processors are simply to slow to do all the packet and encryption processing at even T1 rates and in some instances, we've seen systems capable of high speed routing (more than 10Mbps) slow down to less than 100Kbps when the VPN was enabled. I've talked to many folks who started with a simple config change and ended up purchasing software upgrades, then more memory and then crypto processors only to chuck it all and pursue one of these other routes. We refer these folks as VPN burn victims.
This was first published in December 2002
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation