Share the knowledge I say...
OK, this has been edited to protect my information, but other than that its
directly off of a PIX that has 2 lan 2 Lan tunnels and also allows VPN
remote access...
I think I got all the leftover junk cleaned out as well...
!
access-list 100 permit ip m.y.h.o u.s.e.! 10.0.0.0 255.0.0.0
access-list 100 permit ip m.y.h.o u.s.e.! 172.16.0.0 255.240.0.0
access-list 100 permit ip m.y.h.o u.s.e.! 192.168.1.0 255.255.255.0
access-list 100 permit ip m.y.h.o u.s.e.! 192.168.2.0 255.255.255.0
access-list 120 permit ip m.y.h.o u.s.e.! 192.168.1.0 255.255.255.0
access-list 110 permit ip m.y.h.o u.s.e.! 10.0.0.0 255.0.0.0
access-list 110 permit ip m.y.h.o u.s.e.! 172.16.0.0 255.240.0.0
ip local pool REMOTEUSER 192.168.2.1-192.168.2.255
nat (inside) 0 access-list 100
crypto ipsec transform-set TRANSFORM esp-3des esp-md5-hmac
crypto dynamic-map DYNOMAP 30 set transform-set TRANSFORM
crypto map MYMAP 10 ipsec-isakmp
crypto map MYMAP 10 match address 110
crypto map MYMAP 10 set peer e.f.g.h
crypto map MYMAP 10 set transform-set TRANSFORM
crypto map MYMAP 30 ipsec-isakmp
crypto map MYMAP 30 match address 120
crypto map MYMAP 30 set peer a.b.c.d
crypto map MYMAP 30 set transform-set TRANSFORM
crypto map MYMAP 100 ipsec-isakmp dynamic DYNOMAP
crypto map MYMAP interface outside
isakmp enable outside
isakmp key ******** address a.b.c.d netmask 255.255.255.255
isakmp key ******** address e.f.g.h netmask 255.255.255.255
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 1
isakmp policy 10 lifetime 86400
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup DONTTHINK address-pool REMOTEUSER
vpngroup DONTTHINK dns-server 192.168.24.22
vpngroup DONTTHINK default-domain groupstudy.rocks
vpngroup DONTTHINK idle-time 1800
vpngroup DONTTHINK password ********

Thanks

Larry
 

-----Original Message-----
From: Edward Sohn [mailto:[EMAIL PROTECTED]] 
Sent: Monday, December 09, 2002 3:44 PM
To: [EMAIL PROTECTED]
Subject: more VPN fun... [7:58818]


anyone have any working configs of a PIX set up for a site-to-site IPSec
tunnel with another PIX (at a remote site), as well as set up for mobile
user VPN access (through dialup/dsl/cable/etc)?  the client will user secure
VPN client 3.0 for windows.

i have the docs from CCO, but someone told me that their config for the
remote user is wrong and does not work right.

appreciate your help.  please email me directly.

ed




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=58828&t=58818
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to