
7-2
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using Pre-Shared Keys
Note If you do not need to do VPN tunneling for intranet traffic, you can use this example without the
access-list or the nat 0 access-list commands. These commands disable NAT for traffic that matches the
access list criteria.
If you have a limited number of registered IP addresses and you cannot use PAT, you can configure
PIX
Firewall to use NAT for connections to the public Internet, but avoid NAT for traffic between the
two intranets. This configuration might also be useful if you were replacing a direct, leased-line
connection between two intranets.
Figure 7-1 VPN Tunnel Network
209.165.201.8
192.168.12.2
192.168.12.1
New York
Router Router
PIX Firewall 1
33351
209.165.200.229
209.165.201.7 209.165.200.228
10.0.0.2
10.0.0.1
San Jose
PIX Firewall 2
Internet
The configuration shown for this example uses an access list to exclude traffic between the two intranets
from NAT. The configuration assigns a global pool of registered IP addresses for use by NAT for all other
traffic. By excluding intranet traffic from NAT, you need fewer registered IP addresses.
Configuring PIX Firewall 1 with VPN Tunneling
Follow these steps to configure PIX Firewall 1:
Step 1 Define a host name:
hostname NewYork
Step 2 Configure an ISAKMP policy:
isakmp enable outside
isakmp policy 9 authentication pre-share
isakmp policy 9 encrypt 3des
Step 3 Configure a pre-shared key and associate with the peer:
crypto isakmp key cisco1234 address 209.165.200.229
Comentários a estes Manuais