y Authentication Inbound with IPSec and VPN Client Configurati

..........................................3 Related Information............................................................................................................................................................................................................................................1 debug and show Commands.....................................................1 Hardware and Software Versions............................................................................................................................4 i .....................................................................................................................................................................................................................................Cisco − Auth−proxy Authentication Inbound with IPSec and VPN Client Configuration with NAT and CBAC Table of Contents Auth−proxy Authentication Inbound with IPSec and VPN Client Configuration with NAT and CBAC......................................................................................................1 Configuration......................1 Introduction..........................1 Network Diagram ..........................................................................................

13.18.1.1 service timestamps debug uptime service timestamps log uptime no service password−encryption Cisco − Auth−proxy Authentication Inbound with IPSec and VPN Client Configuration with NAT and CBAC . A PC at 99.7.1.3.124.0.97).T.121−2.1 (shown as 2.98.99.1. after the user authentication succeeds.X network. The 3640 Router requests authentication. the IPSec tunnel is built and the PC gets the IP address out of the pool called "ourpool" (since we're doing mode−configuration).1 to get to the 10.T • Cisco 3640 router (c3640−jo3s56i−mz.5 brings up the web browser to access content on the server at 10. Hardware and Software Versions This configuration was developed and tested using the software and hardware versions below.99.5. the access list passed down from the server gets added to access list 117.99.0.0 (shown as 2. After the user enters a username and password (stored on the TACACS+ server at 172.99. Since the VPN Client on the PC is configured to go through tunnel end−point 99.Auth−proxy Authentication Inbound with IPSec and VPN Client Configuration with NAT and CBAC Introduction This sample configuration allows a VPN Client to access a server on another network through an IPSec tunnel.12 in the IRE client Help | About menu) Network Diagram Configuration Cisco 3640 Router Configuration Current configuration: ! version 12.T) • Cisco Secure VPN Client 1.0.7 in the IRE client Help | About menu) or Cisco Secure VPN Client 1.13. Note: The ip auth−proxy command was introduced in Cisco IOS® Software Release 12. • Cisco IOS Software Release 12.

1.255.1.255.1 255.0 crypto isakmp client configuration address−pool local ourpool ! crypto ipsec transform−set mypolicy esp−des esp−md5−hmac ! crypto dynamic−map dyna 10 set transform−set mypolicy ! crypto map test client configuration address initiate crypto map test client configuration address respond crypto map test 5 ipsec−isakmp dynamic dyna ! interface Loopback0 ip address 1.1.255.13.0.0 ip nat inside ip inspect myfw in ip route−cache policy no ip mroute−cache ip policy route−map nonat no mop enabled ! interface TokenRing0/0 no ip address shutdown ring−speed 16 ! interface Ethernet2/0 Cisco − Auth−proxy Authentication Inbound with IPSec and VPN Client Configuration with NAT and CBAC .48 255.255.0.0 ! interface Ethernet0/0 ip address 10.0.0.0 0.! hostname carter ! aaa new−model aaa authentication login default group tacacs+ none aaa authorization exec default group tacacs+ none aaa authorization auth−proxy default group tacacs+ enable secret 5 $1$cSvL$F6VxA7kBFAGHvhBbRlNS20 enable password ww ! ip subnet−zero ! ip inspect name myfw cuseeme timeout 3600 ip inspect name myfw ftp timeout 3600 ip inspect name myfw http timeout 3600 ip inspect name myfw rcmd timeout 3600 ip inspect name myfw realaudio timeout 3600 ip inspect name myfw smtp timeout 3600 ip inspect name myfw sqlnet timeout 3600 ip inspect name myfw streamworks timeout 3600 ip inspect name myfw tftp timeout 30 ip inspect name myfw udp timeout 15 ip inspect name myfw tcp timeout 3600 ip inspect name myfw vdolive ip auth−proxy auth−proxy−banner ip auth−proxy auth−cache−time 10 ip auth−proxy name list_a http ip audit notify log ip audit po max−events 100 cns event−service server ! crypto isakmp policy 10 hash md5 authentication pre−share crypto isakmp key cisco1234 address 0.

0 ip access−group 117 in ip nat outside ip auth−proxy list_a no ip route−cache no ip mroute−cache no mop enabled crypto map test ! interface TokenRing2/0 no ip address shutdown ring−speed 16 ! ip local pool ourpool 10.0 0.1 no ip http server ! access−list 110 deny ip 10.99. along with other troubleshooting information.0 255.124.254 ip nat pool outsidepool 99.1.255 any access−list 117 permit esp any any access−list 117 permit udp any any eq isakmp access−list 120 permit ip 10.0 ip nat inside source route−map rmap pool outsidepool ip classless ip route 0.255 access−list 110 permit ip 10.0.255 10.2.255.99.13.0.99.20 ip route 172.1.255.124.99.99.1.0 0.255.0 0.1.0.18.0. please see Important Information on Debug Commands.60 netmask 255.99.2.99.0. Cisco − Auth−proxy Authentication Inbound with IPSec and VPN Client Configuration with NAT and CBAC .2.0 99.1 10.1.255.1 255. see Troubleshooting Authentication Proxy.18.1.0.0 0.13.1.0.0 0.255 10.1.99.50 99.0.255.1.0 10.2.255 dialer−list 1 protocol ip permit dialer−list 1 protocol ipx permit route−map rmap permit 10 match ip address 110 ! route−map nonat permit 10 match ip address 120 set ip next−hop 1.13.255.0.13.0.0.ip address 99.0.0 0.2 ! route−map nonat permit 20 ! tacacs−server host 172.0. For these commands.97 tacacs−server key cisco ! line con 0 transport input none line aux 0 line vty 0 4 password ww ! end debug and show Commands Before issuing debug commands.1.0.

Inc. All contents are Copyright © 1992−−2003 Cisco Systems. Cisco − Auth−proxy Authentication Inbound with IPSec and VPN Client Configuration with NAT and CBAC . Important Notices and Privacy Statement.Related Information • Check Technical Support − Cisco IOS Firewall. All rights reserved.

Sign up to vote on this title
UsefulNot useful