
7-31
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Connecting to a Catalyst 6500 and Cisco 7600 Series IPSec VPN Services Module
interface GigabitEthernet3/2
no ip address
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,200,1002-1005
switchport mode trunk
Step 2 Add the VLAN 100 interface, and the interface where the tunnel will be terminated (in this case,
FastEthernet2/2):
interface Vlan100
ip address 209.165.201.1 255.255.255.0
interface FastEthernet2/2
no ip address
crypto connect vlan 100
Step 3 Create an ACL (in this case, ACL 100) defining the traffic from the inside network 10.10.10.0/24 to the
remote network 10.20.20.0/24:
access-list 100 permit ip 10.10.10.0 0.0.0.255 10.20.20.0 0.0.0.255
Step 4 Define your ISAKMP policy proposals:
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
Step 5 In this example, pre-shared keys are used and defined by issuing the following command:
crypto isakmp key cisco address 209.165.200.225
Step 6 Define your IPSec proposals:
crypto ipsec transform-set cisco esp-des esp-md5-hmac
Create your crypto map statement.
crypto map cisco 10 ipsec-isakmp
set peer 209.165.200.225
set transform-set cisco
match address 100
Step 7 Apply the crypto map to the VLAN 100 interface:
interface vlan100
crypto map cisco
Example 7-9 shows the complete configuration for the VPNSM.
Example 7-9 Catalyst 6500 Configuration
!--- Define Phase 1 policy.
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
crypto isakmp key cisco address 209.165.200.225
!
!
!--- Define the encryption policy for this setup.
crypto ipsec transform-set cisco ESP-Des esp-md5-hmac
Kommentare zu diesen Handbüchern