
4-5
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 4 Using PIX Firewall in SOHO Networks
Using PIX Firewall as an Easy VPN Remote Device
vpnclient mode {client-mode | network-extension-mode}
• Client mode applies NAT to all IP addresses of clients connected to the inside (higher security)
interface of the PIX
Firewall.
• Network extension mode—This option does not apply NAT to any IP addresses of clients on the
inside (higher security) interface of the PIX
Firewall.
Step 5 Enable the Easy VPN Remote device by entering the following command:
vpnclient enable
Step 6 (Optional) To display the current status and configuration of Easy VPN Remote device, enter the
following command:
show vpnclient
Viewing Downloaded Configuration
There are two different flash memory areas for saving configuration information. The downloaded
configuration is stored in a separate area that is only visible when using the show vpn detail command.
To view all the configuration (static, dynamic, flash-private storage area FPSA-related) associated with
the Easy VPN Remote device, enter the following command:
remotepix(config)#show vpnclient detail
The output from this command after the Easy VPN Remote device is connected to the Easy VPN Server
includes the following (this output has been abridged and annotated for clarity):
LOCAL CONFIGURATION
vpnclient server 80.0.0.1
vpnclient mode client-mode
vpnclient vpngroup unity password ********
vpnclient username maruthitacacs password ********
vpnclient management tunnel 10.0.0.0 255.255.255.0
vpnclient enable
DOWNLOADED DYNAMIC POLICY
Current Server : 80.0.0.1
NAT addr : 90.0.0.10
Primary DNS : 10.0.0.21
Default Domain : example.com
PFS Enabled : Yes
Secure Unit Authentication Enabled : No
User Authentication Enabled : Yes
User Authentication Server : 10.0.0.3
User Authentication Server Port : 1645
User Authentication Idle Timeout : 2:46:40
Device Pass Through Enabled : Yes
Split Networks : 10.0.0.0/255.255.255.0 110.0.0.0/255.255.255.0
Split DNS : example.com
Backup Servers : None
STORED POLICY
Secure Unit Authentication Enabled : No
Split Networks : 10.0.0.0/255.255.255.0 110.0.0.0/255.255.255.0
Backup Servers : 80.0.0.30
Kommentare zu diesen Handbüchern