Cisco PIX 525 Especificaciones Pagina 290

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 466
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 289
8-10
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 8 Managing VPN Remote Access
Using an Easy VPN Remote Device with Pre-Shared Keys
Configuring the PIX Firewall
Follow these steps to configure the PIX Firewall to interoperate with the Cisco Easy VPN Remote device
using Xauth, IKE Mode Config, AAA authorization with RADIUS, and a wildcard, pre-shared key:
Step 1 Define AAA related parameters:
aaa-server radius protocol radius
aaa-server partnerauth protocol radius
aaa-server partnerauth (dmz) host 192.168.101.2 abcdef timeout 5
Step 2 Configure the IKE policy:
isakmp enable outside
isakmp policy 8 encr 3des
isakmp policy 8 hash md5
isakmp policy 8 authentication pre-share
Note To configure the Cisco VPN Client Version 3.x, include the isakmp policy 8 group 2 command
in this step.
Step 3 Configure a wildcard, pre-shared key:
isakmp key cisco1234 address 0.0.0.0 netmask 0.0.0.0
Step 4 Configure the pool of local addresses to be assigned to remote VPN clients:
ip local pool dealer 10.1.1.1-10.1.1.254
Note To configure the Cisco VPN 3000 Client Version 2.5, include the crypto map partner-map
client configuration address initiate command in this step.
Step 5 Exempt inside hosts from using NAT when communicating with VPN clients:
access-list 80 permit ip 10.0.0.0 255.255.255.0 10.1.1.0 255.255.255.0
nat (inside) 0 access-list 80
Step 6 Create access lists that define the services the VPN clients are authorized to use. The RADIUS server
returns this access list ID to enable authorization.
access-list 100 permit tcp 10.1.1.0 255.255.255.0 10.0.0.0 255.255.255.0 eq telnet
access-list 100 permit tcp 10.1.1.0 255.255.255.0 10.0.0.0 255.255.255.0 eq ftp
access-list 100 permit tcp 10.1.1.0 255.255.255.0 10.0.0.0 255.255.255.0 eq http
Note Configure the authentication server with the vendor-specific acl=acl_ID identifier to specify the
access-list ID. In this example, the access-list ID is 100. The entry in the authentication server
would then be acl=100.
Step 7 Configure a transform set that defines how the traffic will be protected:
crypto ipsec transform-set strong-des esp-3des esp-sha-hmac
Step 8 Create a dynamic crypto map:
crypto dynamic-map cisco 4 set transform-set strong-des
Vista de pagina 289
1 2 ... 285 286 287 288 289 290 291 292 293 294 295 ... 465 466

Comentarios a estos manuales

Sin comentarios