Cisco Systems C819HG4GVK9, C819GUK9 Configuration Examples, Configure a VPN over an IPSec Tunnel

Models: C819GUK9

1 196
Download 196 pages 51.42 Kb
Page 101
Image 101
Configuration Examples

Chapter 9 Configuring Security Features

Configuring VPN

Configuration Examples

Each example configures a VPN over an IPSec tunnel, using the procedure given in the “Configure a VPN over an IPSec Tunnel” section on page 9-7. Then, the specific procedure for a remote access configuration is given, followed by the specific procedure for a site-to-site configuration.

The examples shown in this chapter apply only to the endpoint configuration on the Cisco 819 ISRs. Any VPN connection requires both endpoints to be configured properly to function. See the software configuration documentation as needed to configure VPN for other router models.

VPN configuration information must be configured on both endpoints. You must specify parameters, such as internal IP addresses, internal subnet masks, DHCP server addresses, and Network Address Translation (NAT).

Configure a VPN over an IPSec Tunnel

Perform the following tasks to configure a VPN over an IPSec tunnel:

Configure the IKE Policy, page 9-7

Configure Group Policy Information, page 9-9

Apply Mode Configuration to the Crypto Map, page 9-10

Enable Policy Lookup, page 9-11

Configure IPSec Transforms and Protocols, page 9-12

Configure the IPSec Crypto Method and Parameters, page 9-12

Apply the Crypto Map to the Physical Interface, page 9-14

Where to Go Next, page 9-14

Configure the IKE Policy

To configure the Internet Key Exchange (IKE) policy, perform these steps, beginning in global configuration mode:

SUMMARY STEPS

1.crypto isakmp policy priority

2.encryption {des 3des aes aes 192 aes 256}

3.hash {md5 sha}

4.authentication {rsa-sig rsa-encr pre-share}

5.group {1 2 5}

6.lifetime seconds

7.exit

Cisco 819 Series Integrated Services Routers Software Configuration Guide

 

OL-23590-02

9-7

 

 

 

Page 101
Image 101
Cisco Systems C819HG4GVK9, C819GUK9 Configuration Examples, Configure a VPN over an IPSec Tunnel, Configure the IKE Policy