[c-nsp] VPN Configuration

Kaj Niemi kajtzu at basen.net
Tue Apr 22 08:41:59 EDT 2008


Hi,


I'm not sure how well Easy VPN and VTIs play together but in very  
general terms - with an old fashioned crypto map on your "outside"  
interface - you want to do something like the following; associate the  
dynamic map with your RA VPNs (vpn-users in this case) to the crypto  
map applied on the interface (map-outbound in this case).

- aaa lines as needed

- crypto isakmp policy as needed

crypto ipsec transform-set trans-default [something sane]
crypto ipsec transform-set trans-vpn-users [something sane]

crypto dynamic-map vpn-users 200
  set transform-set trans-vpn-users
  reverse-route

! assuming you have aaa in place
crypto map map-inbound client authentication list vpn-users
crypto map map-inbound client accounting list vpn-users
crypto map map-inbound isakmp authorization list vpn-users
crypto map map-inbound client configuration address respond
crypto map map-inbound 200 ipsec-isakmp dynamic vpn-users

crypto map map-outbound 100 ipsec-isakmp
  description somewhere
  set peer 1.2.3.4
  set transform-set trans-default
  match address match-whatever

interface FastEthernet0/0
  crypto map map-outbound

The Cisco VPN Client (IPSec) does work on both OS X and XP/Vista (not  
64 bit Vista, though) fine. It also works on Linux.


On Apr 22, 2008, at 15:21, Paul Stewart wrote:

> Hi folks... if there is a better place to ask than here please let me
> know...;)
>
> I have a Cisco 871 at a client site with a 2 meg connection.  We  
> built a
> site to site VPN (config below) which works perfectly... now the  
> client
> would like 4-5 remote access VPN sessions to be possible.  I'm  
> asking the
> list before I dive too much into docs on the easiest simple way to  
> setup a
> remote access VPN when you already have a site to site  
> configured.... we'd
> like to adopt a "cookie cutter" approach for some other client sites  
> in the
> near future....  this particular customer has remote computers  
> running Mac
> OS/X and PC's running XP/Vista which I understand the Cisco VPN  
> client runs
> on both....?
>
> Can someone tell me a good way to configure both on the same router?
> Thanks in advance..
>
> Paul
>
> Config:
>
> crypto isakmp policy 10
> encr aes 256
> authentication pre-share
> crypto isakmp key XXXXXXXXXXX address xx.xx.xx.xxx
> !
> !
> crypto ipsec transform-set ts1 ah-sha-hmac esp-aes 256
> !
> crypto ipsec profile VPN
> set transform-set ts1
>
> interface Tunnel0
> description xxxxxxxxxxx
> ip address 172.16.1.1 255.255.255.252
> tunnel source FastEthernet4
> tunnel destination xx.xx.xx.xxx
> tunnel protection ipsec profile VPN
>
> interface FastEthernet4
> description Nexicom Cable
> ip address dhcp
> ip nat outside
> ip virtual-reassembly
> duplex auto
> speed auto
> no cdp enable
> !
> interface Vlan1
> description Internal LAN
> ip address 10.241.41.193 255.255.255.192
> ip nat inside
> ip virtual-reassembly
>
> ip route 10.241.175.64 255.255.255.192 Tunnel0
>
> ip nat inside source list 102 interface FastEthernet4 overload
>
> access-list 102 deny   ip 10.241.41.192 0.0.0.63 10.241.175.64  
> 0.0.0.63
> access-list 102 permit ip 10.241.41.192 0.0.0.63 any
>
>
>
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/




HTH

Kaj
-- 
Kaj J. Niemi
<kajtzu at basen.net>
+358 45 63 12000





More information about the cisco-nsp mailing list