145
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Security Features
Configuring VPN
Configuration Example
The following configuration example shows a portion of the configuration file for the VPN and IPSec
tunnel described in this chapter.
!
aaa new-model
!
aaa authentication login rtr-remote local
aaa authorization network rtr-remote local
aaa session-id common
!
username username1 password 0 password1
!
crypto isakmp policy 1
encryption 3des
authentication pre-share
group 2
lifetime 480
!
crypto isakmp client configuration group rtr-remote
key secret-password
dns 10.50.10.1 10.60.10.1
domain company.com
pool dynpool
!
crypto ipsec transform-set vpn1 esp-3des esp-sha-hmac
!
crypto ipsec security-association lifetime seconds 86400
!
crypto dynamic-map dynmap 1
set transform-set vpn1
reverse-route
!
crypto map static-map 1 ipsec-isakmp dynamic dynmap
crypto map dynmap isakmp authorization list rtr-remote
crypto map dynmap client configuration address respond
Step 7
interface
type number
Example:
Router(config)# interface fastethernet 4
Router(config-if)#
Enters the interface configuration mode for the
interface to which you are applying the Cisco Easy
VPN remote configuration.
Note
For routers with an ATM WAN interface,
this command would be
interface atm 0
.
Step 8
crypto ipsec client ezvpn
name
[
outside
|
inside
]
Example:
Router(config-if)# crypto ipsec client
ezvpn ezvpnclient outside
Router(config-if)#
Assigns the Cisco Easy VPN remote configuration
to the WAN interface which causes the router to
automatically create the NAT or PAT
1
and the
access list configuration needed for the VPN
connection.
Step 9
exit
Example:
Router(config-crypto-ezvpn)# exit
Router(config)#
Returns to global configuration mode.
1.
PAT = port address translation
Command or Action
Purpose