Cisco PIX 525 Dokumentacja Strona 423

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 466
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 422
B-19
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Appendix B Configuration Examples for Other Remote Access Clients
Using Cisco VPN Client Version 1.1
crypto ipsec transform-set strong-des esp-3des esp-sha-hmac
crypto dynamic-map cisco 4 set transform-set strong-des
crypto map partner-map 20 ipsec-isakmp dynamic cisco
crypto map partner-map client authentication partnerauth
crypto map partner-map interface outside
isakmp key cisco1234 address 0.0.0.0 netmask 0.0.0.0
isakmp enable outside
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption 3des
isakmp policy 8 hash md5
sysopt connection permit-ipsec
telnet timeout 5
terminal width 80
Configuring the Cisco Secure VPN Client Version 1.1
This section describes how to configure the Cisco Secure VPN Client for use with the PIX Firewall.
Refer to the Release Notes for the Cisco Secure VPN Client Version 1.1 or higher for the most current
information. Before performing the information in this section, install the VPN client as described in the
Cisco
Secure VPN Client release notes. You can find the Cisco Secure VPN Client release notes online
at the following website:
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csvpnc/index.htm
Follow these steps to configure the Cisco Secure VPN Client Version 1.1:
Step 1 Click Start>Programs>Cisco Secure VPN Client>Security Policy Editor.
Step 2 Click Options>Secure>Specified Connections.
Step 3 In the Network Security Policy window, click Other Connection and then click Non-Secure in the panel
on the right.
Step 4 Click File>New Connection. Rename New Connection. For example, ToSanJose.
Step 5 Under Connection Security, click Secure.
Step 6 Under Remote Party Identity and Addressing, set the following preferences in the panel on the right:
a. ID Type—Click IP address.
b. Enter the IP address of the internal host within the PIX Firewall unit’s internal network to which the
VPN client will have access. Enter
10.0.0.14.
c. Click Connect using Secure Gateway Tunnel.
d. ID Type—Click IP address.
e. Enter the IP address of the outside interface of the PIX Firewall. Enter 209.165.200.229.
Step 7 In the Network Security Policy window, click the plus sign beside the ToSanJose entry to expand the
selection, and click My Identity. Set the following preferences in the panel on the right:
a. Select Certificate—Click None.
b. ID Type—Click IP address.
c. Port—Click All.
d. Local Network Interface—Click Any.
e. Click Pre-Shared Key. When the Pre-Shared Key dialog box appears, click Enter Key to make the
key box editable. Enter
cisco1234 and click OK.
Przeglądanie stron 422
1 2 ... 418 419 420 421 422 423 424 425 426 427 428 ... 465 466

Komentarze do niniejszej Instrukcji

Brak uwag