
18
Cisco VPN 3000 Series Concentrators Interoperability Profile
Configuring a LAN-to-LAN IPSec Connection
Step 1 In the Name field, enter a unique, descriptive name for this LAN-to-LAN connection. The maximum
length is 32 characters. Since the created rules and SA use this name, we recommend that you keep it
short. In this example, the name is A to B.
Step 2 In the Interface field, make sure that the interface that displays is the configured public interface on the
VPN Concentrator for this end of the LAN-to-LAN connection, 14.15.16.17. If not, from the Interfaces
drop-down menu, choose this IP address. The list shows all interfaces that have the Public Interface
parameters enabled.
Step 3 In the Peer field, enter the IP address of the remote peer in the LAN-to-LAN connection, 22.23.24.25.
This is the IP address of the public or WAN interface on the peer IPSec VPN device.
Step 4 In the Preshared Key field, enter the shared secret for this VPN connection, hr5xb8416aa9r6.
Step 5 From the Authentication drop-down menu, select ESP/SHA/HMAC-160.
Step 6 In the Encryption field, verify that the entry is 3DES-168. If not, from the Encryption drop-down menu,
choose this value.
Step 7 In the IKE Proposal field, verify that the entry is VPNC IKE A to B. If not, from the IKE Proposal
drop-down menu choose this value.
Step 8 Skip the following fields:
–
Filter
–
IPSec NAT-T
–
Bandwidth Policy
–
Routing
Step 9 In the Local Network section, in the IP Address field, enter 10.5.6.0. In the Wildcard Mask field, enter
0.0.0.255.
Step 10 In the Remote Network section, in the IP Address field, enter 172.23.9.0. In the Wildcard Mask field,
enter 0.0.0.255.
Note You must configure either a default gateway or a static route from Gateway A to Gateway B.
Step 11 Click Add. The Manager displays the Configuration | System | Tunneling Protocols
IPSec | LAN-to-LAN | Done screen.
Comentarios a estos manuales