0% found this document useful (0 votes)
134 views

Easy-Vpn Conf

This document contains the configuration of an IPSec VPN tunnel interface using IKE and IPsec. Key details include: - The VPN uses interface Virtual-Template1 with IPsec encryption and IKE authentication. - IKE policy uses pre-shared key authentication, 3DES encryption, SHA hash, and DH group 2. - IPsec transform set uses ESP with 3DES encryption and SHA-HMAC integrity in tunnel mode. - One group policy "choice" is configured to pool addresses from 10.0.4.10-20 with ACL 102 access.

Uploaded by

Godfre Yohuno
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views

Easy-Vpn Conf

This document contains the configuration of an IPSec VPN tunnel interface using IKE and IPsec. Key details include: - The VPN uses interface Virtual-Template1 with IPsec encryption and IKE authentication. - IKE policy uses pre-shared key authentication, 3DES encryption, SHA hash, and DH group 2. - IPsec transform set uses ESP with 3DES encryption and SHA-HMAC integrity in tunnel mode. - One group policy "choice" is configured to pool addresses from 10.0.4.10-20 with ACL 102 access.

Uploaded by

Godfre Yohuno
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 3

Tunnel Interface Details:

Interface: Virtual-Template1
Type: Tunnel
Mode: IPSec-IPv4
IP Address: Unnumbered to Loopback0

IKE Policies:
___________________________________________________
Hash DH Group Authentication Encryption
-----------------------------------------------------------------------------------------
SHA_1 group2 PRE_SHARE 3DES
-----------------------------------------------------------------------------------------
Transform Set:
Name: ESP-3DES-SHA
ESP Encryption: ESP_3DES
ESP Integrity: ESP_SHA_HMAC
Mode: TUNNEL

Group Policy Lookup Method List : Local


User Authentication Method List : Local
Idle Timer : <NONE>

Number of Group Policies :1


--------------------------------------------------------------------------
Group Policy Name : choice
--------------------------------------------------------------------------
Key : *******
Pool : SDM_POOL_1
DNS Servers : 192.168.1.50
Domain Name : <NONE>
WINS Servers : <NONE>
Split ACL : 102
Split DNS : <NONE>
Group Lock : Disabled
Save password : Disabled
Firewall Are-U-There : Disabled
Include-local-lan : Disabled
Subnet Mask : 255.25.255.0
Backup Servers : <NONE>
Maximum connections : 10
PFS : Disabled
Maximum logins per user :5
XAuth Banner : YOU ARE ABOUT TO ENTER A SECURE ZONE. ALL DATA SENT
WILL BE ENCRYPTED.
Browser Proxy Name : <NONE>
Configuration Push : Disabled
Auto Update : Not Configured
--------------------------------------------------------------------------

ROUTER EASY VPN CONFIG

aaa authentication login ciscocp_vpn_xauth_ml_1 local


aaa authorization network ciscocp_vpn_group_ml_1 local
access-list 102 remark CCP_ACL Category=4
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
no access-list 101
access-list 101 remark auto generated by SDM firewall configuration
access-list 101 remark CCP_ACL Category=1
access-list 101 permit udp any host 10.0.4.90 eq non500-isakmp
access-list 101 permit udp any host 10.0.4.90 eq isakmp
access-list 101 permit esp any host 10.0.4.90
access-list 101 permit ahp any host 10.0.4.90
access-list 101 deny ip 192.168.1.0 0.0.0.255 any
access-list 101 permit icmp any host 10.0.4.90 echo-reply
access-list 101 permit icmp any host 10.0.4.90 time-exceeded
access-list 101 permit icmp any host 10.0.4.90 unreachable
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip host 255.255.255.255 any
access-list 101 deny ip host 0.0.0.0 any
access-list 101 deny ip any any log
no access-list 100
access-list 100 remark auto generated by SDM firewall configuration
access-list 100 remark CCP_ACL Category=1
access-list 100 permit udp any host 192.168.1.1 eq non500-isakmp
access-list 100 permit udp any host 192.168.1.1 eq isakmp
access-list 100 permit esp any host 192.168.1.1
access-list 100 permit ahp any host 192.168.1.1
access-list 100 deny ip 10.0.4.0 0.0.0.255 any
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
ip local pool SDM_POOL_1 10.0.4.10 10.0.4.20
crypto ipsec transform-set ESP-3DES-SHA esp-sha-hmac esp-3des
mode tunnel
exit
crypto isakmp profile ciscocp-ike-profile-1
isakmp authorization list ciscocp_vpn_group_ml_1
client authentication list ciscocp_vpn_xauth_ml_1
match identity group choice
client configuration address respond
exit
crypto ipsec profile CiscoCP_Profile1
set transform-set ESP-3DES-SHA
set isakmp-profile ciscocp-ike-profile-1
exit
interface Loopback0
exit
default interface Loopback0
interface Loopback0
no shutdown
ip address 192.168.2.1 255.255.255.0
exit
interface Virtual-Template1 type tunnel
exit
default interface Virtual-Template1
interface Virtual-Template1 type tunnel
no shutdown
ip unnumbered Loopback0
tunnel protection ipsec profile CiscoCP_Profile1
tunnel mode ipsec ipv4
exit
crypto isakmp client configuration group choice
key 0 *****
pool SDM_POOL_1
acl 102
dns 192.168.1.50
max-logins 5
max-users 10
netmask 255.25.255.0
banner ~YOU ARE ABOUT TO ENTER A SECURE ZONE. ALL DATA SENT WILL BE ENCRYPTED.~
exit
crypto isakmp policy 1
authentication pre-share
encr 3des
hash sha
group 2
lifetime 86400
exit
crypto isakmp profile ciscocp-ike-profile-1
virtual-template 1
exit
! IP address / user account command
username dade privilege 15 secret 0 ********

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy