Sie sind auf Seite 1von 3

Tunnel Interface Details:

Interface: Virtual-Template1
Type: Tunnel
Mode: IPSec-IPv4
IP Address: Unnumbered to Loopback0

IKE Policies:
___________________________________________________
Hash DH Group Authentication Encryption
-----------------------------------------------------------------------------------------
SHA_1 group2 PRE_SHARE 3DES
-----------------------------------------------------------------------------------------
Transform Set:
Name: ESP-3DES-SHA
ESP Encryption: ESP_3DES
ESP Integrity: ESP_SHA_HMAC
Mode: TUNNEL

Group Policy Lookup Method List : Local


User Authentication Method List : Local
Idle Timer : <NONE>

Number of Group Policies :1


--------------------------------------------------------------------------
Group Policy Name : choice
--------------------------------------------------------------------------
Key : *******
Pool : SDM_POOL_1
DNS Servers : 192.168.1.50
Domain Name : <NONE>
WINS Servers : <NONE>
Split ACL : 102
Split DNS : <NONE>
Group Lock : Disabled
Save password : Disabled
Firewall Are-U-There : Disabled
Include-local-lan : Disabled
Subnet Mask : 255.25.255.0
Backup Servers : <NONE>
Maximum connections : 10
PFS : Disabled
Maximum logins per user :5
XAuth Banner : YOU ARE ABOUT TO ENTER A SECURE ZONE. ALL DATA SENT
WILL BE ENCRYPTED.
Browser Proxy Name : <NONE>
Configuration Push : Disabled
Auto Update : Not Configured
--------------------------------------------------------------------------

ROUTER EASY VPN CONFIG

aaa authentication login ciscocp_vpn_xauth_ml_1 local


aaa authorization network ciscocp_vpn_group_ml_1 local
access-list 102 remark CCP_ACL Category=4
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
no access-list 101
access-list 101 remark auto generated by SDM firewall configuration
access-list 101 remark CCP_ACL Category=1
access-list 101 permit udp any host 10.0.4.90 eq non500-isakmp
access-list 101 permit udp any host 10.0.4.90 eq isakmp
access-list 101 permit esp any host 10.0.4.90
access-list 101 permit ahp any host 10.0.4.90
access-list 101 deny ip 192.168.1.0 0.0.0.255 any
access-list 101 permit icmp any host 10.0.4.90 echo-reply
access-list 101 permit icmp any host 10.0.4.90 time-exceeded
access-list 101 permit icmp any host 10.0.4.90 unreachable
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip host 255.255.255.255 any
access-list 101 deny ip host 0.0.0.0 any
access-list 101 deny ip any any log
no access-list 100
access-list 100 remark auto generated by SDM firewall configuration
access-list 100 remark CCP_ACL Category=1
access-list 100 permit udp any host 192.168.1.1 eq non500-isakmp
access-list 100 permit udp any host 192.168.1.1 eq isakmp
access-list 100 permit esp any host 192.168.1.1
access-list 100 permit ahp any host 192.168.1.1
access-list 100 deny ip 10.0.4.0 0.0.0.255 any
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
ip local pool SDM_POOL_1 10.0.4.10 10.0.4.20
crypto ipsec transform-set ESP-3DES-SHA esp-sha-hmac esp-3des
mode tunnel
exit
crypto isakmp profile ciscocp-ike-profile-1
isakmp authorization list ciscocp_vpn_group_ml_1
client authentication list ciscocp_vpn_xauth_ml_1
match identity group choice
client configuration address respond
exit
crypto ipsec profile CiscoCP_Profile1
set transform-set ESP-3DES-SHA
set isakmp-profile ciscocp-ike-profile-1
exit
interface Loopback0
exit
default interface Loopback0
interface Loopback0
no shutdown
ip address 192.168.2.1 255.255.255.0
exit
interface Virtual-Template1 type tunnel
exit
default interface Virtual-Template1
interface Virtual-Template1 type tunnel
no shutdown
ip unnumbered Loopback0
tunnel protection ipsec profile CiscoCP_Profile1
tunnel mode ipsec ipv4
exit
crypto isakmp client configuration group choice
key 0 *****
pool SDM_POOL_1
acl 102
dns 192.168.1.50
max-logins 5
max-users 10
netmask 255.25.255.0
banner ~YOU ARE ABOUT TO ENTER A SECURE ZONE. ALL DATA SENT WILL BE ENCRYPTED.~
exit
crypto isakmp policy 1
authentication pre-share
encr 3des
hash sha
group 2
lifetime 86400
exit
crypto isakmp profile ciscocp-ike-profile-1
virtual-template 1
exit
! IP address / user account command
username dade privilege 15 secret 0 ********

Das könnte Ihnen auch gefallen