Configuring IPSec Router−to−Router with NAT Overload and Cisco Secure VPN Client pps

2 340 0
Configuring IPSec Router−to−Router with NAT Overload and Cisco Secure VPN Client pps

Đang tải... (xem toàn văn)

Thông tin tài liệu

Đây là một cấu hình từ CCO (not tested) 1. Yêu cầu: - Một pool các Ip address để gán cho các VPN clients. - Một nhóm có tên "3000client" có preshare key là 'cisco123" 2. Cấu hình: hostname HeadQuater ! To enable extended authentication (Xauth) for user authentication, ! enable the aaa authentication commands. ! "Group local" specifies local user authentication. username pc1 password cisco123 username 3000clients password cisco123 aaa authentication login userauthen group local aaa authorization network groupauthor group local ! Create an Internet Security Association and ! Key Management Protocol (ISAKMP) policy for Phase 1 negotiations. crypto isakmp policy 3 encr des authentication pre-share group 2 ! Create the Phase 2 policy for actual data encryption. crypto ipsec transform-set myset esp-des esp-sha-hmac ! ! Create a dynamic map and ! apply the transform set that was created above. crypto dynamic-map dynmap 10 set transform-set myset ! ! Create the actual crypto map, ! and apply the AAA lists that were created earlier. ! Create a group that will be used to specify the WINS, DNS servers' address ! to the client, along with the pre-shared key for authentication. crypto isakmp client configuration group 3000client key cisco123 dns 192.168.100.100 wins 192.168.100.100 domain cisco.com pool ippool crypto map clientmap client authentication list userauthen crypto map clientmap isakmp authorization list groupauthor crypto map clientmap client configuration address respond crypto map clientmap 10 ipsec-isakmp dynamic dynmap ! interface serial0/0 ip address 10.64.10.44 255.255.255.0 crypto map clientmap ! Create a pool of addresses to be assigned to the VPN Clients. ip local pool ippool 192.168.100.150 192.168.100.200 ip route 0.0.0.0 0.0.0.0 10.64.10.43 ! . authentication. crypto isakmp client configuration group 300 0client key cisco1 23 dns 192.168.100.100 wins 192.168.100.100 domain cisco. com pool ippool crypto map clientmap client authentication list. authentication list userauthen crypto map clientmap isakmp authorization list groupauthor crypto map clientmap client configuration address respond crypto map clientmap 10 ipsec- isakmp dynamic dynmap ! interface. tested) 1. Yêu cầu: - Một pool các Ip address để gán cho các VPN clients. - Một nhóm có tên "300 0client& quot; có preshare key là &apos ;cisco1 23" 2. Cấu hình: hostname HeadQuater ! To enable

Ngày đăng: 25/07/2014, 08:20

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan