
7-27
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Connecting to a Catalyst 6500 and Cisco 7600 Series IPSec VPN Services Module
Step 4 Define your Internet Security Association and Key Management Protocol (ISAKMP) policy proposals:
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
Step 5 In this example, pre-shared keys are used and defined by issuing the following command:
crypto isakmp key cisco address 209.165.200.225
Step 6 Define your IPSec proposals:
crypto ipsec transform-set cisco esp-des esp-md5-hmac
Step 7 Create your crypto map statement:
crypto map cisco 10 ipsec-isakmp
set peer 209.165.200.225
set transform-set cisco
match address 100
Step 8 Apply the crypto map to the VLAN 100 interface:
interface vlan100
crypto map cisco
Example 7-7 shows the complete configuration for the VPNSM.
Example 7-7 VPNSM Configuration
!--- Define Phase 1 policy.
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
crypto isakmp key cisco address 209.165.200.225
!
!
!--- Define the encryption policy for this setup.
crypto ipsec transform-set cisco ESP-Des esp-md5-hmac
!
!--- Define a static crypto map entry for the peer
!--- with mode ipsec-isakmp.
!--- This indicates that Internet Key Exchange (IKE)
!--- will be used to establish the IPSec
!--- Security Associations (SAs) for protecting the traffic
!--- specified by this crypto map entry.
crypto map cisco 10 ipsec-isakmp
set peer 209.165.200.225
set transform-set cisco
match address 100
!
!
no spanning-tree vlan 100
!
!
!
interface GigabitEthernet1/1
no ip address
shutdown
snmp trap link-status
switchport
Kommentare zu diesen Handbüchern