
7-25
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Connecting to a Catalyst 6500 and Cisco 7600 Series IPSec VPN Services Module
PIX Firewall 2 Configuration
Follow these steps to configure PIX Firewall 2:
Step 1 Clear the IPSec SAs:
clear ipsec sa
Step 2 Clear the ISAKMP SAs:
clear isakmp sa
Step 3 Create a partial access list:
access-list 80 permit ip 10.0.0.0 255.0.0.0 192.168.12.0 255.255.255.0
Step 4 Specify the authentication method of rsa-signatures for the IKE policy:
isakmp policy 8 auth rsa-sig
Connecting to a Catalyst 6500 and Cisco 7600 Series IPSec VPN
Services Module
This section describes how to create an IPSec site-to-site tunnel between a Cisco Catalyst 6500 series
switch with the Catalyst 6500 and Cisco 7600 Series IPSec VPN Services Module (VPNSM) and a
PIX
Firewall. It includes the following topics:
• Scenario Description, page 7-25
• Configuring IPSec Using a Trunk Port, page 7-26
• Configuring IPSec Using a Routed Port, page 7-30
• Verifying Your Configuration, page 7-35
Scenario Description
Figure 7-5 illustrates the network setup used in this example configuration.
Figure 7-5 VPN Tunnel Between PIX Firewall and Catalyst 6500 with VPNSM
10.10.10.0/24
10.10.10.0/24
209.165.200.225209.165.201.1
Catalyst 6500 with a VPN
Service Module
PIX Firewall
87350
The VPNSM has two Gigabit Ethernet (GE) ports with no externally visible connectors. These ports are
addressable for configuration purposes only. Port 1 is always the inside port. This port handles all traffic
from and to the inside network. The second port (port 2) handles all traffic from and to the WAN or
outside networks. These two ports are always configured in 802.1q trunking mode.
Kommentare zu diesen Handbüchern