Cisco-Pix515e-r-IKE configuration example

Source: Internet
Author: User
Tags snmp

The specific configuration is as follows:

PIX Version 6.3 (1) // OS I use Version 6.3, which supports IPSec VPN with NAT

Interface ethernet0 auto

Interface ethernet1 auto

Ameif ethernet0 outside security0

Ameif ethernet1 inside security100

Enable password 8Ry2YjIyt7RRXU24 encrypted

Asswd 2KFQnbNIdI. 2 KYOU encrypted

Hostname ISSC-PIX515E-R

Fixup protocol ftp 21

Fixup protocol h323 h225 1720

Fixup protocol h323 ras 1718-1719

Fixup protocol http 80

Fixup protocols ils 389

Fixup protocol rsh 514

Fixup protocol rtsp 554

Fixup protocol sip 5060

Fixup protocol sip udp 5060

Fixup protocol skinny 2000

Fixup protocol smtp 25

Fixup protocol sqlnet 1521

Ames

Access-list 101 permit ip 192.168.10.0 255.255.255.0 192.168.32.0 255.255.255.0

Access-list 102 permit ip 192.168.10.0 255.255.255.0 192.168.32.0 255.255.255.0

Access-list 104 permit icmp any

Ager lines 24

Mtu outgoing side 1500

Mtu inside 1500

Ip address outside 10.0.0.1 255.255.255.0

Ip address inside 192.168.10.252 255.255.255.0

Ip audit info action alarm

Ip audit attack action alarm

Ip local pool pccw 192.168.32.1-192.168.32.10

Ip local pool pccw02 192.168.32.50

Dm history enable

Arp timeout 14400

Global (outside) 1 interface

At (inside) 0 access-list 102 // The user connected to the VPN does not go through NAT. Here, 102 corresponds to the access-list 102 above.

At (inside) 1 192.168.10.0 255.255.255.0 0 0

Access-group 104 in interface outside

Route outside 0.0.0.0 0.0.0.0 202.108.48.181 1

Timeout xlate 3:00:00

Timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

Timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

Timeout uauth 0:05:00 absolute

Aaa-server TACACS + protocol tacacs +

Aaa-server RADIUS protocol radius

Aaa-server LOCAL protocol local

Aaa-server partnerauth protocol radius

Aaa-server partnerauth (inside) host 192.168.10.110 cisco123 timeout 10 // specify the Radius server IP address and key

Aaa-server parnerauth protocol tacacs +

O snmp-server location

O snmp-server contact

Mp-server community public

O snmp-server enable traps

Floodguard enable

Ysopt connection permit-ipsec

Crypto ipsec transform-set myset esp-des esp-md5-hmac

Crypto dynamic-map dynmap 10 set transform-set myset

Crypto map mymap 10 ipsec-isakmp dynamic dynmap

Crypto map mymap client configuration address initiate

Crypto map mymap client configuration address respond

Crypto map mymap client authentication partnerauth // you can use Radius to authenticate your identity.

Crypto map mymap interface outside

Isakmp enable outside

Isakmp identity address

Isakmp nat-traversal 10 // This is a feature that allows NAT users to pass through the PIX and is added in section 6.3, for example, to solve the nat vpn dialing problem in the LAN.

Isakmp policy 10 authentication pre-share

Isakmp policy 10 encryption des

Isakmp policy 10 hash md5

Isakmp policy 10 group 2

Isakmp policy 10 lifetime 86400

Vpngroup vpn3000 address-pool pccw // I have created two groups below. To assign a fixed IP address to each Group, only one Group is created for each user, the customers who make such requests are simply suffering :(

Vpngroup vpn3000 dns-server 202.96.134.small

Vpngroup vpn3000 split-tunnel 102

Vpngroup vpn3000 idle-time 1800

Vpngroup vpn3000 password ********

Vpngroup link address-pool pccw02

Vpngroup link split-tunnel 102

Vpngroup link idle-time 1800

Vpngroup link password ********

Telnet 192.168.32.0 255.255.255.0 outside

Telnet 192.168.10.0 255.255.255.0 inside

Telnet timeout 5

H timeout 5

Console timeout 0

Terminal width 80

Cryptochecksum: 81630e6f8040b488f6c2e6c6ff872804

: End

Article entry: csh responsible editor: csh

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.