There are some small office brunches needing both remote access to the office itself,
The remote access clients, like configured HERE and a permanent connection to another SITE (to the HQ for example).
Here is a quick guide for configuring multiple VPN types on a Cisco Router.
In this case I have configured a tunnel to a Fortinet FW (1.1.1.1),
For the authentication I used 3DES and SHA1 for the hashing.
Cisco Lan 10.100.100.0/24, Forti Lan 192.168.0.0/24
Here is my configuration:
Set a password for the tunnel ( may use a certificate instead )
crypto keyring Site-KeyConfigure VPN Phase 1 Policy
pre-shared-key address 1.1.1.1 key 0 Cisco2Forti
crypto isakmp policy 1Configure VPN Phase 2
encr 3des
hash sha
authentication pre-share
group 2
lifetime 28800
crypto isakmp profile Site-PH1
keyring Site-Key
match identity address 1.1.1.1 255.255.255.255
crypto ipsec transform-set Site_Set esp-3des esp-sha-hmacSet Split-tunnel - what will be routed through
IP access-list Extended Site_ACLcombine all the Settings to a VPN Tunnel :
permit ip 10.100.100.0 0.0.0.255 192.168.0.0 0.0.0.255
crypto map clientmap 10 ipsec-isakmpAlmost same thing for the Client access
set peer 1.1.1.1
set transform-set Site_Set
set isakmp-profile Site-PH1
match address Site_ACL
crypto isakmp policy 2Client to site VPN will also require configuring an ip pool - Basically DHCP for VPN
encr 3des
authentication pre-share
group 2
crypto isakmp client configuration group Client-Access
key Client2Site
pool ippool
acl Client_ACL
crypto isakmp profile Client
match identity group alicenet
client authentication list auth
isakmp authorization list auth
client configuration address respond
crypto ipsec transform-set Client_Set esp-3des esp-sha-hmac
crypto dynamic-map dynmap 10
set transform-set Client_Set
set isakmp-profile Client
IP access-list Extended Client_ACL
permit ip 10.100.100.0 0.0.0.255 172.16.0.0 0.0.0.3
crypto map clientmap 100 ipsec-isakmp dynamic dynmap
ip local pool ippool 172.16.0.0 172.16.0.3For both of them to work we need to enable the Crypto (VPN) on the external interface,
in my case FastEthernet4
interface FastEthernet4And one last thing, in case there is NAT enabled – make sure to disable the NAT in the VPN
ip address 2.2.2.2 255.255.255.255
crypto map clientmap
for example:
ip access-list extended NAT
deny ip 10.100.100.0 0.0.0.255 172.16.0.0 0.0.0.3
deny ip 10.100.100.0 0.0.0.255 192.168.0.0 0.0.0.255
permit ip 10.100.100.0 0.0.0.255 any
Hope this post was helpful, If it was please consider a donation:
BTC Address: 1CnyMpjd1RntRDxSus2hu2aDMyzL4Kj29N
LTC Address: LUqrKbzGihTU2GEnL3EwsuuLHCsxCJMdtR
It's late finding this act. At least, it's a thing to be familiar with that there are such events exist. I agree with your Blog and I will be back to inspect it more in the future so please keep up your act. remote control computer
ReplyDelete