Cisco Router 850 Series Software Configuration Guide
Here you can view all the pages of manual Cisco Router 850 Series Software Configuration Guide. The Cisco manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 71
CH A P T E R 6-1 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel The Cisco 870 series routers support the creation of Virtual Private Networks (VPNs). Cisco routers and other broadband devices provide high-performance connections to the Internet, but many applications also require the security of VPN connections which perform a high level of authentication and which encrypt the data between two...
Page 72
6-2 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Figure 6-1 Remote Access VPN Using IPSec Tunnel 2 1 121782 Internet 34 5 6 1Remote, networked users 2VPN client—Cisco 870 series access router 3Router—Providing the corporate office network access 4VPN server—Easy VPN server; for example, a Cisco VPN 3000 concentrator with outside interface address 210.110.101.1 5Corporate office...
Page 73
6-3 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel NoteThe Cisco Easy VPN client feature supports configuration of only one destination peer. If your application requires creation of multiple VPN tunnels, you must manually configure the IPSec VPN and Network Address Translation/Peer Address Translation (NAT/PAT) parameters on both the client and the server. Configuration Tasks Perform...
Page 74
6-4 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Configure the IKE Policy Configure the IKE Policy Perform these steps to configure the Internet Key Exchange (IKE) policy, beginning in global configuration mode: Command or ActionPurpose Step 1crypto isakmp policy priority Example: Router(config)# crypto isakmp policy 1Router(config-isakmp)# Creates an IKE policy th at is used...
Page 75
6-5 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Configure Group Policy Information Configure Group Policy Information Perform these steps to configure the group policy, beginning in global configuration mode: Command or ActionPurpose Step 1crypto isakmp client configuration group { group-name | default } Example: Router(config)# crypto isakmp client configuration group...
Page 76
6-6 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Apply Mode Configura tion to the Crypto Map Apply Mode Configuration to the Crypto Map Perform these steps to apply mode configuration to the crypto map, beginning in global configuration mode: Command or ActionPurpose Step 1crypto map map-name isakmp authorization list list-name Example: Router(config)# crypto map dynmap isakmp...
Page 77
6-7 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Configure IPSec Transforms and Protocols Configure IPSec Transforms and Protocols A transform set represents a certain combination of security protocols and algorithms. During IKE negotiation, the peers agree to use a particular transform set for protecting data flow. During IKE negotiations, the peers search in multiple transform sets...
Page 78
6-8 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Configure the IPSec Crypto Method and Parameters Perform these steps to specify the IPSec transform se t and protocols, beginning in global configuration mode: Command or ActionPurpose Step 1crypto ipsec transform-set transform-set-name transform1 [transform2 ] [transform3 ] [ transform4 ] Example: Router(config)# crypto ipsec...
Page 79
6-9 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Apply the Crypto Map to the Physical Interface Apply the Crypto Map to the Physical Interface The crypto maps must be applied to each interface through which IP Security (IPSec) traffic flows. Applying the crypto map to the physical interface instructs the router to evaluate all the traffic against the security associations database....
Page 80
6-10 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide OL-5332-01 Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Create an Easy VPN Remote Configuration Create an Easy VPN Remote Configuration The router acting as the IPSec remote router must create an Easy VPN remote configuration and assign it to the outgoing interface. Perform these steps to create the remote configuration, beginning in global configuration mode: Step 2crypto map map-name...