Chapter
Configuring Security Features
Command or Action
Step 7
interface type number
Example:
Router(config)# interface fastethernet 4
Router(config-if)#
Step 8
crypto ipsec client ezvpn name [outside | inside]
Example:
Router(config-if)# crypto ipsec client
ezvpn ezvpnclient outside
Router(config-if)#
Step 9
exit
Example:
Router(config-crypto-ezvpn)# exit
Router(config)#
1. PAT = port address translation
Configuration Example
The following configuration example shows a portion of the configuration file for the VPN and IPSec
tunnel described in this chapter.
!
aaa new-model
!
aaa authentication login rtr-remote local
aaa authorization network rtr-remote local
aaa session-id common
!
username username1 password 0 password1
!
crypto isakmp policy 1
!
crypto isakmp client configuration group rtr-remote
!
crypto ipsec transform-set vpn1 esp-3des esp-sha-hmac
!
crypto ipsec security-association lifetime seconds 86400
!
crypto dynamic-map dynmap 1
!
crypto map static-map 1 ipsec-isakmp dynamic dynmap
crypto map dynmap isakmp authorization list rtr-remote
crypto map dynmap client configuration address respond
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
encryption 3des
authentication pre-share
group 2
lifetime 480
key secret-password
dns 10.50.10.1 10.60.10.1
domain company.com
pool dynpool
set transform-set vpn1
reverse-route
Purpose
Enters the interface configuration mode for the
interface to which you are applying the Cisco Easy
VPN remote configuration.
For routers with an ATM WAN interface,
Note
this command would be interface atm 0.
Assigns the Cisco Easy VPN remote configuration
to the WAN interface which causes the router to
automatically create the NAT or PAT
access list configuration needed for the VPN
connection.
Returns to global configuration mode.
Configuring VPN
1
and the
145