Trejjy
asked on
ASA 8.02 to Cisco 837 with RADIUS config
Hi all,
I need to know if this is technically possible and if so how, I have been tasked with configuring a VPN to an ASA appliance. This is already configured and running, using RADIUS for authentication. What I need to do is configure an 837 to talk to the ASA.
Thing is with the 837, it will not be handling the internet connection, it needs to plug in to a COTS router, get an IP from the router and just handle the VPN side of things, and the only ports to pass data are 1732 and 3389.
I will paste VPN config of the ASA
aaa-server windows-radius protocol radius
aaa-server windows-radius host 192.168.x.x
timeout 5
key PASSWORD
radius-common-pw PASSWORD
aaa authentication ssh console LOCAL
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto ipsec transfrom-set ESP-3DES-SHA esp-3des esp-she-hmac
crypto ipsec security-association lifetime seconds 3600
crypto ipsec df-bit clear-df outside
crypto dynamic-map RAS-DYN-MAP 10 set pfs group1
crypto dynamic-map RAS-DYN-MAP 10 set transform-set myset
crypto dynamic-map RAS-DYN-MAP 10 security-association lifetime seconds 86400
crypto dynamic-map RAS-DYN-MAP 10 set reverse-route
crypto dynamic-map RAS-DYN-MAP ipsec-isakmp dynamic RAS-DYN-MAP
crypto dynamic-map RAS-DYN-MAP interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre share
encryption 3des
hash sha
group 2
lifetime 43200
no cyrpto isakmp nat-traversal
crypto isakmp ipsec-ver-tcp port 10000
no vpn-addr-assign aaa
Thanks for your help
Trejjy
I need to know if this is technically possible and if so how, I have been tasked with configuring a VPN to an ASA appliance. This is already configured and running, using RADIUS for authentication. What I need to do is configure an 837 to talk to the ASA.
Thing is with the 837, it will not be handling the internet connection, it needs to plug in to a COTS router, get an IP from the router and just handle the VPN side of things, and the only ports to pass data are 1732 and 3389.
I will paste VPN config of the ASA
aaa-server windows-radius protocol radius
aaa-server windows-radius host 192.168.x.x
timeout 5
key PASSWORD
radius-common-pw PASSWORD
aaa authentication ssh console LOCAL
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto ipsec transfrom-set ESP-3DES-SHA esp-3des esp-she-hmac
crypto ipsec security-association lifetime seconds 3600
crypto ipsec df-bit clear-df outside
crypto dynamic-map RAS-DYN-MAP 10 set pfs group1
crypto dynamic-map RAS-DYN-MAP 10 set transform-set myset
crypto dynamic-map RAS-DYN-MAP 10 security-association lifetime seconds 86400
crypto dynamic-map RAS-DYN-MAP 10 set reverse-route
crypto dynamic-map RAS-DYN-MAP ipsec-isakmp dynamic RAS-DYN-MAP
crypto dynamic-map RAS-DYN-MAP interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre share
encryption 3des
hash sha
group 2
lifetime 43200
no cyrpto isakmp nat-traversal
crypto isakmp ipsec-ver-tcp port 10000
no vpn-addr-assign aaa
Thanks for your help
Trejjy
It sounds like what you're asking is that you have a remote-access VPN connecting to an ASA, and now you want to add an 837 to also talk to the ASA. This is fine, and can be configured to work. However, your commands don't look like they will work for this. You don't say what version of IOS you're running, but take a look at the following link showing a 12.4 example configuration, and pay particular attention to the configuration for Router B. http://www.cisco.com/en/US/products/sw/secursw/ps2308/products_configuration_example09186a008032b637.shtml
ASKER
Jmeggers,
Sorry for that....
The ASA is running 8.0(2) and the 837 is running a c837-k9o3y6-mz.123-2.xe3.b in IOS
The ASA is running a split tunnel also but I am hazy on that side of things...
Sorry for that....
The ASA is running 8.0(2) and the 837 is running a c837-k9o3y6-mz.123-2.xe3.b
The ASA is running a split tunnel also but I am hazy on that side of things...
The split tunnel just means that the configuration that's pushed to the client allows Internet-bound traffic to bypass the tunnel. I'm not very familiar with the specific code on the 837 but it shouldn't be much different from the example link I posted. The example is IOS to IOS but the 837 side should be about the same as in the example. There's another example at http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080808395.shtml
ASKER
Thanks mate,
I will have a play tonight with the 837, I guess my confusion came from the fact that the ASA has no pre shared key, so I have to introduce that in to the ASA and then configure that key on the 837? How does RADIUS come in to play with this?
I will have a play tonight with the 837, I guess my confusion came from the fact that the ASA has no pre shared key, so I have to introduce that in to the ASA and then configure that key on the 837? How does RADIUS come in to play with this?
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Mate, you are a champ.. I will give it a shot tonight and let you know how I go...
Thanks again.
Thanks again.
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.