Cisco PIX 525 Especificaciones Pagina 407

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 466
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 406
B-3
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Appendix B Configuration Examples for Other Remote Access Clients
Xauth with RSA Ace/Server and RSA SecurID
PIX Firewall Configuration
Following is a sample configuration that is necessary for using token-based Xauth by the PIX Firewall
for the VPN clients using RSA ACE/Server and RSA SecurID as the AAA server to establish a secure
connection.
Step 1 Create a pool of IP addresses for your clients to use:
ip local pool mypool 3.3.48.100-3.3.48.200
Step 2 Create the RADIUS servers:
aaa-server partner-auth protocol radius
aaa-server partner-auth (inside) host 10.100.48.43 MYSECRET timeout 20
Note The word “partner-auth” in the aaa-server command in Step 2 is a keyword that needs to match
the keyword in the following crypto map command.
Step 3 Create an ISAKMP policy and define the hash algorithm:
crypto ipsec transform-set myset esp-des esp-sha-hmac
crypto dynamic-map mydynmap 10 set transform-set myset
crypto map newmap 10 ipsec-isakmp dynamic mydynmap
crypto map newmap client configuration address initiate
crypto map newmap client configuration address respond
crypto map newmap client token authentication partner-auth
Note The word “token” in the crypto map newmap client token authentication partner-auth
command is optional for the Cisco VPN Client Version 3.x, and the Cisco Secure VPN Client
Version 1.1.
crypto map newmap interface outside
isakmp enable outside
isakmp key mysecretkey address 0.0.0.0 netmask 0.0.0.0
isakmp identity hostname
isakmp client configuration address-pool local mypool outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash sha
isakmp policy 10 group 1
isakmp policy 10 lifetime 86400
Step 4 For the Cisco VPN Client Version 3.x, you may need to change the existing IKE/ISAKMP policy or add
another policy depending on the requirements, using the following command:
isakmp policy policy number vpngroup 2
Step 5 For the Cisco VPN 3000 Client Version 2.5 and the Cisco VPN Client Version 3.x, the vpngroup
command configuration is also required:
vpngroup Cisco address-pool mypool
vpngroup Cisco dns-server 10.100.48.44
vpngroup Cisco wins-server 10.100.48.45
vpngroup Cisco default-domain Cisco.com
vpngroup Cisco split-tunnel myaccesslist
vpngroup Cisco password mysecretkey
Vista de pagina 406
1 2 ... 402 403 404 405 406 407 408 409 410 411 412 ... 465 466

Comentarios a estos manuales

Sin comentarios