Tunnel IPSEC
U
SER
G
UIDE
242
set ipsec phase1 NewYork_Plant local-end atm0
set ipsec phase1 NewYork_Plant remote-end 85.64.166.18
set ipsec phase1 NewYork_Plant encryption-algorithm 3des
set ipsec phase1 NewYork_Plant hash-algorithm sha1
set ipsec phase1 NewYork_Plant dh-group 2
set ipsec phase1 NewYork_Plant authentication-method pre_shared_key
set ipsec phase1 Portland_Plant exchange-mode main
set ipsec phase1 Portland_Plant local-end atm0
set ipsec phase1 Portland_Plant remote-end 88.45.34.5
set ipsec phase1 Portland_Plant encryption-algorithm aes
set ipsec phase1 Portland_Plant hash-algorithm md5
set ipsec phase1 Portland_Plant dh-group 5
set ipsec phase1 Portland_Plant authentication-method pre_shared_key
set ipsec phase2 NewYork_Lan match-phase1 NewYork_Plant
set ipsec phase2 NewYork_Lan encryption-algotithm aes
set ipsec phase2 NewYork_Lan authentication-algorithm hmac_sha256
set ipsec phase2 NewYork_Lan pfs-group 5
set ipsec phase2 NewYork_Lan mode tunnel
set ipsec phase2 NewYork_Lan security esp
set ipsec phase2 NewYork_Lan level unique
set ipsec phase2 NewYork_Lan local-subnet 192.168.1.0/24
set ipsec phase2 NewYork_Lan remote-subnet 192.168.100.0/24
set ipsec phase2 Portland_Lan match-phase1 Portland_Plant
set ipsec phase2 Portland_Lan encryption-algotithm 3des
set ipsec phase2 Portland_Lan authentication-algorithm hmac_md5
set ipsec phase2 Portland_Lan pfs-group 2
set ipsec phase2 Portland_Lan mode tunnel
set ipsec phase2 Portland_Lan security esp
set ipsec phase2 Portland_Lan level unique1
set ipsec phase2 Portland_Lan local-subnet 192.168.1.0/24
set ipsec phase2 Portland_Lan local-subnet 192.168.200.0/24
set ipsec pre-shared-key 85.64.166.18 N3w10RK_pwd
set ipsec pre-shared-key 88.45.34.5 P0R714N0_pwd
set ipsec on
It is important to remember that VPN starts only if the activation command is entered:
set ipsec on
In the same way, to stop VPN IPSec activity you must use the command:
set ipsec off
If you want the
ipsec
service to start according to the availability of other service, you can type: