
7-5
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using Pre-Shared Keys
Configuring PIX Firewall 2 for VPN Tunneling
Follow these steps to configure PIX Firewall 2:
Step 1 Define a host name:
hostname SanJose
Step 2 Define the domain name:
domain-name example.com
Step 3 Configure the ISAKMP policy:
isakmp enable outside
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption 3des
Step 4 Configure a pre-shared key and associate it with the peer:
crypto isakmp key cisco1234 address 209.165.201.8
Step 5 Configure IPSec supported transforms:
crypto ipsec transform-set strong esp-3des esp-sha-hmac
Step 6 Create an access list:
access-list 80 permit ip 10.0.0.0 255.0.0.0 192.168.12.0 255.255.255.0
This access list defines traffic from network 10.0.0.0 to 192.168.12.0. Both of these networks use
unregistered addresses.
Note Step 7 and Step 8 are not required if you want to enable NAT for all traffic.
Step 7 Exclude traffic between the intranets from NAT:
nat 0 access-list 80
This excludes traffic matching access list 80 from NAT. The nat 0 command is always processed before
any other nat commands.
Step 8 Enable NAT for all other traffic:
nat (inside) 1 0 0
Step 9 Assign a pool of global addresses for NAT and PAT:
global (outside) 1 209.165.200.240-209.165.200.250
global (outside) 1 209.165.202.251
The pool of registered addresses are only used for connections to the public Internet.
Step 10 Define a crypto map:
crypto map newyork 10 ipsec-isakmp
crypto map newyork 10 match address 80
crypto map newyork 10 set transform-set strong
crypto map newyork 10 set peer 209.165.201.8
Komentarze do niniejszej Instrukcji