Solved

CISCO 1700 series IPSEC VPN setup

Posted on 2008-06-22
5
1,623 Views
Last Modified: 2008-08-18
Hi,
  I have a cisco 1750 router, running 12.3 IOS advanced security.

I need to setup a IPSEC remote access vpn so that clients can dial in to the office.
They will be using the cisco vpn client for windows.


Can someone give me a link that pertains to IPSEC vpn ?
0
Comment
Question by:anarine
  • 3
  • 2
5 Comments
 
LVL 28

Expert Comment

by:Jan Springer
Comment Utility
0
 

Author Comment

by:anarine
Comment Utility
The link you sent me says:

Prerequisites

The following conditions must exist in order to use the Cisco Easy VPN client feature on the Cisco 1700 series routers:

"The Cisco 1700 series router must be running Cisco IOS Release 12.2(4)XM or later, configured as an Easy VPN IPSec client.

"Another Cisco router or VPN concentrator that supports the Remote Access VPN Server Support feature or the Unity Client protocol must be configured as an IPSec server.


These cisco papers are very confusing. Does anyone have a simpler easy to follow link for what
I am trying to do:-  I only have one cisco 1750 router behind which is a windows server. Users
will access the vpn over the internet using the IPSEC protocol. Do I need any additional hardware?
0
 
LVL 28

Expert Comment

by:Jan Springer
Comment Utility
0
 

Author Comment

by:anarine
Comment Utility
Jesper, I am assuming that the section down to the bottom of http://www.trattz.com/cisco.php
 is what I am looking for ?  The section
is labelled  ":.Configure EASY VPN, client to router. (Optional NAT/PAT):"

Any other links or books on this subject would be helpful as well.

Regards
Anand Narine, IT specialist, Trinidad and Tobago
0
 
LVL 28

Accepted Solution

by:
Jan Springer earned 125 total points
Comment Utility
Look for the line:

#crypto isakmp client configuration group SALES

This is the dynamic map piece that you need for remote VPNs.

It has DES as the encryption.  Use at least 3DES.

Regarding NAT, you just have to be sure that the access-list that allows your private network to NAT, also has a deny statement between the IP addresses in the pool that you are assigning and your private network are denied NAT.

The pool needs to be different than your private network block.

If your private network is 192.168.0.0/24, then use something like 192.168.10.0/24 for the pool of IPs for remote VPN.

I would check out www.cisco.com.  Some keywords to search on would be "dynamic map isakmp".
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now