36-2
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 36 Configuring LAN-to-LAN IPSec VPNs
Configuring Interfaces
Configuring Interfaces
A security appliance has at least two interfaces, referred to here as outside and inside. Typically, the
outside interface is connected to the public Internet, while the inside interface is connected to a private
network and is protected from public access.
To begin, configure and enable two interfaces on the security appliance. Then, assign a name, IP address
and subnet mask. Optionally, configure its security level, speed, and duplex operation on the security
appliance.
To configure interfaces, perform the following steps, using the command syntax in the examples:
Step 1
To enter Interface configuration mode, in global configuration mode enter the
interface
command with
the default name of the interface to configure. In the following example the interface is ethernet0.
hostname(config)#
interface ethernet0
hostname(config
-
if)#
Step 2
To set the IP address and subnet mask for the interface, enter the
ip address
command. In the following
example the IP address is 10.10.4.100 and the subnet mask is 255.255.0.0.
hostname(config-if)#
ip address 10.10.4.100 255.255.0.0
hostname(config-if)#
Step 3
To name the interface, enter the
nameif
command, maximum of 48 characters. You cannot change this
name after you set it. In the following example the name of the ethernet0 interface is outside.
hostname(config-if)#
nameif outside
hostname(config-if)#
#
Step 4
To enable the interface, enter the
no
version of the
shutdown
command. By default, interfaces are
disabled.
hostname(config-if)#
no shutdown
hostname(config-if)#
Step 5
To save your changes, enter the
write memory
command.
hostname(config-if)#
write memory
hostname(config-if)#
Step 6
To configure a second interface, use the same procedure.
Configuring ISAKMP Policy and Enabling ISAKMP on the
Outside Interface
The Internet Security Association and Key Management Protocol, also called IKE, is the negotiation
protocol that lets two hosts agree on how to build an IPSec security association. Each ISAKMP
negotiation is divided into two sections called Phase1 and Phase 2.
Phase 1 creates the first tunnel, which protects later ISAKMP negotiation messages. Phase 2 creates the
tunnel that protects data travelling across the secure connection.
To set the terms of the ISAKMP negotiations, you create an ISAKMP policy, which includes the
following:
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......