1. Phase 1: 1.1 IKE SetupAn example of a IKE setup is as follows. You can have many versions of the policies, each is numbered (this one is numbered "2 "), and the lower the number the higher the priority (first) to be used or matched against.crypto isakmp policy 2 hash md5 authentication rsa-sig group 5 lifetime 14400 crypto isakmp enable outside ! crypto isakmp identity auto crypto isakmp nat-traversal 3600 crypto isakmp disconnect-notify Review of the IKE commands are
access-list 101 permit ip 10.0.0.0 255.255.255.0 10.1.1.0 255.255.255.0 1.3 Create the Crypto Transform Sets:crypto ipsec transform-set myset1 esp-des esp-sha-hmac crypto ipsec transform-set myset2 esp-3des esp-sha-hmac crypto ipsec transform-set aes_set esp-md5-hmac esp-aes-256 3.4 IPSEC Client Setupcrypto dynamic-map dyn1 10 match address 101 crypto dynamic-map dyn1 10 set transform-set myset1 myset2 crypto dynamic-map dyn1 10 set security-association lifetime seconds 2700 crypto dynamic-map dyn1 10 set pfs group5 crypto map mymap 200 ipsec-isakmp dynamic dyn1
3.5 Object Groupobject network SITENET subnet 10.50.0.0 255.255.0.0 description Entire office network ! object network VPN_IP_POOL subnet 10.50.10.0 255.255.255.0 description IP's given to vpn clients 3.6 VPN Poolip local pool VPNPOOL1 10.50.10.32-10.50.10.223 mask 255.255.255.0 3.7 Access List for Accounts:access-list VPN_2_ALL extended permit ip object VPN_IP_POOL object SITENET 3.8 Access List for VPN Policy:access-list INTERNAL_NETS standard permit 10.50.0.0 255.255.0.0 3.9 Group Policygroup-policy FULL_ACCESS internal group-policy FULL_ACCESS attributes dns-server value 10.50.81.28 10.50.81.29 vpn-filter value VPN_2_ALL vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value INTERNAL_NETS 3.10 Tunnel Grouptunnel-group VPNGROUP1 type remote-access tunnel-group VPNGROUP1 general-attributes address-pool VPNPOOL1 default-group-policy FULL_ACCESS tunnel-group VPNGROUP1 ipsec-attributes pre-shared-key q4wdEf36XZr845 3.11 User Accountsusername dude password abc123! privilege 1 username dude attributes vpn-group-policy FULL_ACCESS vpn-filter value VPN_2_ALL vpn-tunnel-protocol IPSec 3.12 Double Nat Statements for VPN Poolnat (any,n0-trans) source static SITE SITE destination static VPNPOOL1 VPNPOOL1 3.3.x Viewing the Pre shared key in the config file Normaly if you do a sh run, you will only view the stared out version of the keys. pixfirewall#show running-config [...] tunnel-group mytunnel ipsec-attributes pre-shared-key * [...] To see the keys, you need to view the config with the "more system" command: pixfirewall#more system:running-config [...] tunnel-group mytunnel ipsec-attributes pre-shared-key cisco [...] 3.4 Cisco Client Setup:(what do you enter where in the client software)3.5 Debugging3.5.1 Monitoring VPN Sessionssh vpn-sessiondb sh vpn-sessiondb remote (IPSec Remote VPN Clients) sh vpn-sessiondb l2l (L2L Tunnels) sh vpn-sessiondb svc (SSL VPN / Anyconnect Clients) 3.5.2 Monitoring SSH Sessionssh ssh sessions (show users connected to ASA via SSH) References: |