Solved

How to set up Site to Site VPN on Cisco PIX Ver. 6.3 (4)

Posted on 2013-01-21
4
853 Views
Last Modified: 2013-01-21
How do I set up a Site to Site VPN

Peer IP Address:  9.9.9.9  
IKE Version 2
Local Network:   4.3.2.1/29
Remote Network:  17vp2.20.1.0/29
Preshared Key:  CCA-VPN-123
Encryption Alg IPSEC ESP-3DES-SHA
NO PFS
Traffic should be Exempt
SA Time = 8:0:0
SA Traffic 4608000
Bidirectional.  


Looking for the commands to enter step by step to accomplish this.
Thanks
0
Comment
Question by:marchopkins
  • 2
4 Comments
 
LVL 11

Expert Comment

by:Giladn
ID: 38801958
you can find it very clean in this link:

http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/sit2site.html

looks simple, post back if you are having problems..

G
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 38802946
PIX version 6 does not support IKE version 2 :(

Pete
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 500 total points
ID: 38802990
But IKE v1.................

access-list 101 permit ip 4.3.2.1 255.255.255.248 172.20.1.0 255.255.255.248
access-list 102 permit ip 4.3.2.1 255.255.255.248 172.20.1.0 255.255.255.248
nat (inside) 0 access-list 101
sysopt connection permit-ipsec
crypto ipsec transform-set USEME esp-3des esp-sha-hmac
crypto map sitevpn 10 ipsec-isakmp
crypto map sitevpn 10 10 match address 102
crypto map sitevpn 10 10 set pfs group2
crypto map sitevpn 10 10 set peer 9.9.9.9
crypto map sitevpn 10 10 set transform-set USEME
crypto map sitevpn 10 interface outside
isakmp enable outside
isakmp key CCA-VPN-123 address 9.9.9.9 netmask 255.255.255.225
isakmp identity address
isakmp keepalive 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400

Cisco PIX 500 - IPSEC Site to Site VPNs (v6)


Pete
0
 

Author Closing Comment

by:marchopkins
ID: 38803066
Just what i asked for ...you da man!!!
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

For a while, I have wanted to connect my HTC Incredible to my corporate network to take advantage of the phone's powerful capabilities. I searched online and came up with varied answers from "it won't work" to super complicated statements that I did…
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now