
B-20
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Appendix B Configuration Examples for Other Remote Access Clients
Using Cisco VPN Client Version 1.1
Step 8 In the Network Security Policy window, expand Security Policy and set the following preferences in the
panel on the right:
a. Under Select Phase 1 Negotiation Mode, click Main Mode.
b. Select the Enable Replay Detection check box.
Leave any other values as they were in the panel.
Step 9 Click Security Policy>Authentication (Phase 1)>Proposal 1 and set the following preferences in the
panel on the right:
a. Authentication Method—Click Pre-shared Key.
b. Encrypt Alg—Click Triple DES.
c. Hash Alg—Click MD5.
d. SA Life—Click Unspecified to accept the default values.
e. Key Group—Click Diffie-Hellman Group 1.
Step 10 Click Security Policy>Key Exchange (Phase 2)>Proposal 1 and select the following values in the
panel on the right:
a. Select the Encapsulation Protocol (ESP) check box.
b. Encryption Alg—Click Triple DES.
c. Hash Alg—Click SHA-1.
d. Encapsulation—Click Tunnel.
Step 11 Click File>Save Changes.
The VPN client is now activated.
You can view connection process by right-clicking the SafeNet/Soft-PK icon on the Windows taskbar.
Unless the taskbar is changed, this icon appears in lower right of the screen. Click Log Viewer to display
the View Log feature.
Example B-2 shows a typical View Log session.
Example B-2 View Log Session
time_stamp ToSanJose - Deleting IKE SA
time_stamp ToSanJose - SENDING>>>>ISAKMP OAK QM *(HASH, SA, NON, ID, ID)
time_stamp ToSanJose - RECEIVED<<<ISAKMP OAK TRANS *(HASH. ATTR)
time_stamp ToSanJose - Received Private IP Address = 192.168.15.3
time_stamp ToSanJose - SENDING>>>>ISAKMP OAK TRANS *(HASH, ATTR)
time_stamp ToSanJose - RECEIVED<<<ISAKMP OAK QM *(HASH, SA, NON, ID, ID,
NOTIFY:STATUS_RESP_LIFETIME)
time_stamp ToSanJose - SENDING>>>> ISAKMP OAK QM *(HASH)
time_stamp ToSanJose - Loading IPSec SA keys...
time_stamp
Comentários a estes Manuais