Example 4: IPSec remote access

Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2/proposal 2> encryption_algorithm aes256-cbc

Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2/proposal 2> exit Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2> exit

Black Box1/configure/crypto> exit Black Box1/configure>

Step 8: Display the IPSec policies

Use the show crypto ipsec policy all command.

Step 9: Repeat steps 1 - 8 with suitable modifications on Black Box2 prior to passing bi-directional traffic.

Step 10: Test the IPSec tunnel between Black Box1 and Black Box2 by passing traffic from the 10.0.1.0 network to the 10.0.2.0 network

Step 11: After traffic is passed through the tunnel, display the IKE and IPSec SA tables.

Use the show crypto ike sa all and show crypto ipsec sa all commands.

4.5Example 4: IPSec remote access to corporate LAN using user group method

The following example demonstrates how to configure a Black Box router to be an IPSec VPN server using user group method with extended authentication (XAUTH) for remote VPN clients. The client could be any standard IPSec VPN client.

In this example, the client needs to access the corporate private network 10.0.1.0/24 through the VPN tunnel. The security requirements are as follows:

Phase 1: 3DES with SHA1, Xauth (Radius PAP)

Phase 2: IPSec ESP tunnel with AES256 and HMAC-SHA1

VPN Client 1

Local Address: Dynamic

Local ID:

david@tasmannetworksblackbox.com.

com

blackbox 1

 

NNEL

C TU

IPSE

 

IPSEC TUNNEL

Corporate

VPN Server 172.16.0.1

Headquarters

10.0.1.0/24

VPN Client 2

Local Address: Dynamic

Local ID:

mike@tasmannetworksblackbox.com .

com

Step 1: As in Step1 of Example 1

35

Page 33
Image 33
Black Box LR1114A-T1/E1, LR1112A-T1/E1, LR1104A-T1/E1, LR1102A-T1/E1 manual Example 4 IPSec remote access, As in of Example