
4-4
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 4 Using PIX Firewall in SOHO Networks
Using PIX Firewall as an Easy VPN Remote Device
Establishing Network Connectivity
Before you can connect the PIX Firewall Easy VPN Remote device to the Easy VPN Server, you must
establish network connectivity between both devices through your Internet service provider (ISP). After
connecting your PIX
Firewall to the DSL or Cable modem, you should follow the instructions provided
by your ISP to complete the network connection. Basically, there are three methods of obtaining an IP
address when establishing connectivity to your ISP:
• PPPoE client—Refer to “Using the PIX Firewall PPPoE Client” section on page 4-12.
• DHCP client—Refer to “Using the PIX Firewall DHCP Client” section on page 4-22.
• Static IP address configuration—Refer to the “Assigning an IP Address and Subnet Mask” section
on page 2-5, in Chapter 2, “Establishing Connectivity.”
Basic Configuration Procedure
The Easy VPN Server controls the policy enforced on the PIX Firewall Easy VPN Remote device.
However, to establish the initial connection to the Easy VPN Server, you must complete some
configuration locally.
You can perform this configuration by using Cisco PIX Device Manager (PDM) or by using the
command-line interface as described in the following steps:
Step 1 If you are using pre-shared keys, enter the following command:
vpnclient vpngroup {groupname} password {preshared_key}
Note This command is not required if you are using X.509 certificates.
Replace groupname with an alphanumeric identifier for the VPN group. Replace preshared_key with the
encryption key to use for securing communications to the Easy VPN Server.
Step 2 (Optional) If the Easy VPN Server uses extended authentication (Xauth) to authenticate the PIX Firewall
client, enter the following command:
vpnclient username {xauth_username} password {xauth_password}
Replace xauth_username with the username assigned for Xauth. Replace xauth_password with the
password assigned for Xauth.
Note If the Easy VPN Server is configured for prompting for Xauth on rekey, the prompt is not
displayed on the PIX
Firewall acting as the Easy VPN remote device, and the connection is
terminated.
Step 3 Identify the remote Easy VPN Server by entering the following command:
vpnclient server {ip_primary} [ip_secondary_n]
Replace ip_primary with the IP address of the primary Easy VPN Server. Replace ip_secondary_n with
the IP address of one or more Easy VPN Servers. A maximum of eleven Easy VPN Servers are supported
(one primary and up to ten secondary).
Step 4 Set the Easy VPN Remote device mode by entering the following command:
Comentários a estes Manuais