我期待在我们的思科路由器上设置一个相当简单的公路战士VPN配置。令人沮丧的是,我一直在寻找这个,但找不到一个简单的完整的指南。
我需要输入什么配置才能启用这个配置?
我正在寻找一个通用的答案,尽管我运行的是c2600-ik9o3s3-mz.123-26.bin,如果你需要知道的话。
发布于 2010-02-23 16:41:59
这里是我想出的,这应该是创建VPN配置的一个不错的起点。我不确定它本身是否是最小的,但是它应该让所有正在寻找它的人启动并运行。
Zypher所指出的思科安全VPN客户端解决方案指南对于创建这一点非常有用--如果您能够仔细筛选,其中有一些很好的示例。
aaa new-model
! Create a vpn-users DB that points to the local auth service
aaa authentication login vpn-users local
aaa authorization network vpn-users local
! any local user will be allowed to use the VPN
username fred secret 5 SECRET
! Create an ISAKMP policy that handles the ISAKMP negotiation process
crypto isakmp policy 1
encr aes
authentication pre-share
group 2
lifetime 3600
crypto isakmp keepalive 120 15
crypto isakmp xauth timeout 60
! Group policy for ISAKMP
crypto isakmp client configuration group default
key PLAINTEXT_KEY
dns LOCAL_DNS_SERVERS
domain LOCAL_DOMAIN
pool vpn-dynamic-pool
! VPN clients will be assigned addresses out of this pool
ip local pool vpn-dynamic-pool 192.168.2.1 192.168.2.254
! Create transform sets that specify how the actual IPSEC traffic will be encrypted
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA-LZS esp-aes esp-sha-hmac comp-lzs
! Create IPSEC policies - any negotiated transform scheme must be specified
! in the map below
crypto dynamic-map vpn-dynamic-map 1
set transform-set ESP-AES-128-SHA-LZS
crypto dynamic-map vpn-dynamic-map 2
set transform-set ESP-AES-128-SHA
!
crypto map vpn-dynamic client authentication list vpn-users
crypto map vpn-dynamic client configuration address respond
crypto map vpn-dynamic isakmp authorization list vpn-users
crypto map vpn-dynamic 1 ipsec-isakmp dynamic vpn-dynamic-map
! Apply the IPSEC map to the external interface
interface ExternalInterface/0
crypto map vpn-dynamic
发布于 2010-02-22 07:23:36
你在找一个远程访问VPN。Cisco Docs
另外,您可能应该看看思科安全VPN客户端解决方案指南
https://serverfault.com/questions/115291
复制相似问题