VPN Sample Configuration with Network Extension Mode
Create user(s), specify an IP from virtual subnet, and assign a password:
XSR(config)#aaa user
XSR(config)#password welcome
XSR(config)#aaa user jeffb
XSR(config)#password welcome
Check to make sure the transforms and proposals were created properly:
XSR#show crypto ipsec | ESP | AH | IPCOMP | ||
Name | PFS | ||||
Modp768 | 3DES | None | None | ||
Disabled | 3DES | None | None | ||
Modp768 | 3DES | None | None | ||
Disabled | 3DES | None | None | ||
Modp768 | AES | None | None | ||
Disabled | AES | None | None | ||
Modp768 | AES | None | None | ||
Disabled | AES | None | None |
XSR#show crypto isakmp proposal | Encrypt | Integrity | Group | Lifetime | |
Name | Authentication | ||||
3DES | Modp1024 | 28800 | |||
3DES | Modp1024 | 28800 | |||
3DES | Modp1024 | 28800 | |||
RSASignature | 3DES | Modp1024 | 28800 |
Create the ISAKMP IKE global peer:
XSR#crypto isakmp peer 0.0.0.0 0.0.0.0
XSR#proposal
Create the ACL for trusted subnet of the XSR and virtual subnet of XSR:
Create crypto map statements for each ACL entry with the more protective tunnel mode set by default. Match statements render the associated ACLs
XSR(config)#crypto map test 101
XSR(config)#set
XSR(config)#match address 101
XSR(config)#crypto map test 102
XSR(config)#set
XSR(config)#match address 102
XSR(config)#crypto map test 103
XSR(config)#set
XSR(config)#match address 103