?
Solved

CISCO 1700 series IPSEC VPN setup

Posted on 2008-06-22
5
Medium Priority
?
1,639 Views
Last Modified: 2008-08-18
Hi,
  I have a cisco 1750 router, running 12.3 IOS advanced security.

I need to setup a IPSEC remote access vpn so that clients can dial in to the office.
They will be using the cisco vpn client for windows.


Can someone give me a link that pertains to IPSEC vpn ?
0
Comment
Question by:anarine
  • 3
  • 2
5 Comments
 
LVL 29

Expert Comment

by:Jan Springer
ID: 21841266
0
 

Author Comment

by:anarine
ID: 21841924
The link you sent me says:

Prerequisites

The following conditions must exist in order to use the Cisco Easy VPN client feature on the Cisco 1700 series routers:

"The Cisco 1700 series router must be running Cisco IOS Release 12.2(4)XM or later, configured as an Easy VPN IPSec client.

"Another Cisco router or VPN concentrator that supports the Remote Access VPN Server Support feature or the Unity Client protocol must be configured as an IPSec server.


These cisco papers are very confusing. Does anyone have a simpler easy to follow link for what
I am trying to do:-  I only have one cisco 1750 router behind which is a windows server. Users
will access the vpn over the internet using the IPSEC protocol. Do I need any additional hardware?
0
 
LVL 29

Expert Comment

by:Jan Springer
ID: 21841959
0
 

Author Comment

by:anarine
ID: 21843198
Jesper, I am assuming that the section down to the bottom of http://www.trattz.com/cisco.php
 is what I am looking for ?  The section
is labelled  ":.Configure EASY VPN, client to router. (Optional NAT/PAT):"

Any other links or books on this subject would be helpful as well.

Regards
Anand Narine, IT specialist, Trinidad and Tobago
0
 
LVL 29

Accepted Solution

by:
Jan Springer earned 375 total points
ID: 21845695
Look for the line:

#crypto isakmp client configuration group SALES

This is the dynamic map piece that you need for remote VPNs.

It has DES as the encryption.  Use at least 3DES.

Regarding NAT, you just have to be sure that the access-list that allows your private network to NAT, also has a deny statement between the IP addresses in the pool that you are assigning and your private network are denied NAT.

The pool needs to be different than your private network block.

If your private network is 192.168.0.0/24, then use something like 192.168.10.0/24 for the pool of IPs for remote VPN.

I would check out www.cisco.com.  Some keywords to search on would be "dynamic map isakmp".
0

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question