Cisco PIX 525 Spezifikationen Seite 297

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 466
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 296
8-17
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 8 Managing VPN Remote Access
Using an Easy VPN Remote Device with Digital Certificates
isakmp enable outside
isakmp policy 8 encr 3des
isakmp policy 8 hash md5
isakmp policy 8 authentication rsa-sig
Step 13 Create an access list that defines the local network(s) requiring IPSec protection:
access-list 90 permit ip 10.0.0.0 255.255.255.0 10.1.1.0 255.255.255.0
Step 14 Configure NAT 0:
nat (inside) 0 access-list 90
Step 15 Configure a transform set that defines how the traffic will be protected:
crypto ipsec transform-set strong-des esp-3des esp-sha-hmac
Step 16 Create a dynamic crypto map. Specify which transform sets are allowed for this dynamic crypto map
entry:
crypto dynamic-map cisco 4 set transform-set strong-des
Step 17 Add the dynamic crypto map into a static crypto map:
crypto map partner-map 20 ipsec-isakmp dynamic cisco
Step 18 Apply the crypto map to the outside interface:
crypto map partner-map interface outside
Step 19 Configure the firewall to permit IPSec traffic:
sysopt connection permit-ipsec
Step 20 Enable Xauth:
crypto map partner-map client authentication partnerauth
Step 21 Configure IKE Mode parameters:
ip local pool dealer 10.1.1.1-10.1.1.254
crypto map partner-map client configuration address initiate
Step 22 Configure Easy VPN Remote device policy attributes to download to the Easy VPN Remote device:
vpngroup superteam address-pool dealer
vpngroup superteam dns-server 10.0.0.15
vpngroup superteam wins-server 10.0.0.15
vpngroup superteam default-domain example.com
vpngroup superteam split-tunnel access-list 90
vpngroup superteam idle-time 1800
Note When configuring the VPN group name, make sure it matches the Organization Unit (OU) field in the
Easy VPN Remote device certificate. The PIX
Firewall uses the VPN group name to match a given VPN
client policy. For example, you would use the VPN group “superteam” if the OU field is “superteam.
Example 8-2 shows the command listing. PIX Firewall default configuration and certain CA commands
do not appear in configuration listings.
Seitenansicht 296
1 2 ... 292 293 294 295 296 297 298 299 300 301 302 ... 465 466

Kommentare zu diesen Handbüchern

Keine Kommentare