BETA DRAFT - CISCO CONFIDENTIAL
6-10
Cisco1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Chapter6 Configuring a VPN Using Easy VPN and an IPSec Tunnel
Verifying Your Easy VPN Configuration
Verifying Your Easy VPN Configuration
Router# show crypto ipsec client ezvpn
Tunnel name :ezvpnclient
Inside interface list:vlan 1
Outside interface:fastethernet 0
Current State:IPSEC_ACTIVE
Last Event:SOCKET_UP
Address:8.0.0.5
Mask:255.255.255.255
Default Domain:cisco.com
Configuration Example
The following configuration example shows a portion of the configuration file for the VPN and IPSec
tunnel described in this chapter.
!
aaa new-model
!
aaa authentication login rtr-remote local
aaa authorization network rtr-remote local
aaa session-id common
!
username Cisco password 0 Cisco
Step5 exit
Example:
Router(config-crypto-ezvpn)# exit
Router(config)#
Returns to global configuration mode.
Step6 interface type number
Example:
Router(config)# interface fastethernet 0
Router(config-if)#
Enters interface configuration mode.
Note For routers with an ATM WAN interface,
this command would be interface atm 0.
Step7 crypto ipsec client ezvpn name [outside | inside]
Example:
Router(config-if)# crypto ipsec client
ezvpn ezvpnclient outside
Router(config-if)#
Assigns the Cisco Easy VPN remote configuration
to the WAN interface, causing the router to
automatically create the NAT or PAT and access
list configuration needed for the VPN connection.
Step8 exit
Example:
Router(config-crypto-ezvpn)# exit
Router(config)#
Returns to global configuration mode.
Command or Action Purpose