• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 945
  • Last Modified:

VPN cisco router

Please can anyone give me some direction over replacing a juniper router with a cisco 2901.
I am having issues with a cloud partner router and want to bypass this with a cisco.

I need some advise on how to set up ipsec tunnel to the provider and static routes to point there for hosts desktops.  also will this affect NATing of protocols for my voice and data ?

the vpn detail are :

VPN Details
VPN Name
flexvpn
Hosted End-Point IP
109.8.32.99
On-premise End-Point IP Address
146.25.16.101
On-Premise Network
192.168.10.0
On-Premise Subnet Mask
255.255.254.0
Pre-Shared Key
f08fF*KT*ZlD
IKE Phase 1
Encryption
AES-256/AES-128/3DES
Hash
SHA-1
Authentication
Pre-Share Diffie-Hellman Group 2
Lifetime
86400s (1 day)
IKE Phase 2
Encryption
AES-256/AES-128/3DES
Hash
SHA-1
Lifetime
3600s (1 hour)
PFS
Optional


any help would be muchly appreciated. Thank you for your time
0
Maphew
Asked:
Maphew
  • 3
  • 2
1 Solution
 
asavenerCommented:
Well, that's all the info you need to configure the VPN, so you should be good.  Are you looking for the exact commands to enter?
0
 
MaphewAuthor Commented:
Hello and thank you for repsonding

yes and also knowing where to create this .....


is it on the sub interface of the data vlan as its for users to connect to a hosted desktop provider and do not need the voice vlan to utilise this route etc

i hope i make sense , its just the  leasedline supplier will not give us a wires only service and we are having issues with their router esp for voip....  sorry for going on
0
 
asavenerCommented:
You apply the crypto map to the outside interface.
0
 
asavenerCommented:
Looks like you still need the off-premises network information.

crypto isakmp policy 10
encryption aes 256
hash sha1
authentication pre-share
group 2
lifetime 86400

crypto isakmp policy 20
encryption aes 128
hash sha1
authentication pre-share
group 2
lifetime 86400

crypto isakmp policy 30
encryption 3des
hash sha1
authentication pre-share
group 2
lifetime 86400

crypto isakmp key f08fF*KT*ZlD address 109.8.32.99

ip access-list extended Tunnel1
permit ip 192.168.10.0 0.0.15.255 <destination subnet> <destination wildcard mask>

crypto ipsec transform-set aes256 esp-aes-256 esp-sha-hmac
crypto ipsec transform-set aes128 esp-aes-128 esp-sha-hmac
crypto ipsec transform-set 3des esp-3des esp-sha-hmac

crypto map Tunnels 10 ipsec-isakmp
set peer 109.8.32.99
set transform-set aes256 aes128 3des
match address Tunnel1

interface <outside interface>
crypto map Tunnels
0
 
MaphewAuthor Commented:
Thank you very much for your time and support
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now