
7-3
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using Pre-Shared Keys
Step 4 Configure the supported IPSec transforms:
crypto ipsec transform-set strong esp-3des esp-sha-hmac
Step 5 Create an access list:
access-list 90 permit ip 192.168.12.0 255.255.255.0 10.0.0.0 255.0.0.0
This access list defines traffic from network 192.168.12.0 to 10.0.0.0. Both of these networks use
unregistered addresses.
Note Steps 5 and 6 are not required if you want to enable NAT for all traffic.
Step 6 Exclude traffic between the intranets from NAT:
nat 0 access-list 90
This excludes traffic matching access list 90 from NAT. The nat 0 command is always processed before
any other nat commands.
Step 7 Enable NAT for all other traffic:
nat (inside) 1 0 0
Step 8 Assign a pool of global addresses for NAT and PAT:
global (outside) 1 209.165.201.9-209.165.201.30
global (outside) 1 209.165.201.8
The pool of registered addresses are only used for connections to the public Internet.
Step 9 Define a crypto map:
crypto map toSanJose 20 ipsec-isakmp
crypto map toSanJose 20 match address 90
crypto map toSanJose 20 set transform-set strong
crypto map toSanJose 20 set peer 209.165.200.229
Step 10 Apply the crypto map to the outside interface:
crypto map toSanJose interface outside
Step 11 Specify that IPSec traffic be implicitly trusted (permitted):
sysopt connection permit-ipsec
Example 7-1 lists the configuration for PIX Firewall 1.
Example 7-1 PIX Firewall 1 VPN Tunnel Configuration
nameif ethernet0 outside security0
nameif ethernet1 inside security100
interface ethernet0 auto
interface ethernet1 auto
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname NewYork
domain-name example.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol smtp 25
Comentarios a estos manuales