aaa authentication login vpn local
3 F% B. t! ?7 W* \, @" q1 eaaa authorization network vpn local ( w- a; q7 ~# S
!& m' Y- ^; A8 h5 a2 }
aaa session-id common
' q. k f8 c6 [9 i2 Q7 U9 Zmemory-size iomem 5! E' E q" K* }+ @
!
* f$ n( b0 ^- f! C( I9 D% k!
6 H. O% W3 p6 U4 E( Tip cef( p, n9 ~/ p/ q- X
no ip domain lookup3 J. K, N5 k- ?* p! y
!
u ~2 k9 u( Tusername cisco password 0 cisco( n) S/ ]) m* V
!
" N. d3 A8 x, N9 V( }- v!
' B2 G8 G# ~+ a& G7 k1 |3 V!
! V7 Z8 o! c+ a7 t& T2 d9 j" M9 y! / L* \) ?, H3 D1 D3 H* ]+ |* t
crypto isakmp policy 19 q+ o$ {0 _- O0 Y
encr 3des
2 _7 ?' j: L8 P! @! x) Q4 w hash md5- p# }0 T) z4 {5 S; H4 e# a
authentication pre-share2 R) q( U* ^* ~3 [$ \
group 22 s: [4 }$ l0 i1 @/ L3 S
!4 P4 T( c5 \4 Y
crypto isakmp client configuration group cisco* Z8 C. }5 w, q: h
key cisco
" c0 p0 r* l* F- y5 W9 f- A pool pool
: D a3 G1 ^/ S acl 100
4 B- D `% V& x& m!
8 V' t, c2 C1 _( U!& B1 O/ @" G9 \+ x9 [' D
crypto ipsec transform-set SET esp-3des esp-md5-hmac # u6 P% f: F0 \$ A0 c
!
- ?! S3 {. N% ~ T9 C7 i7 s" @crypto dynamic-map dymap 19 @' Y& d: _6 @3 f+ S! K% X
set transform-set SET 1 @( W h( I8 z( J# J& T
reverse-route
% b$ y+ g% u; W$ E" X# h!' q4 B3 N# `" [" j" W
!- T7 D9 v% H- @2 V) d9 p t
crypto map test client authentication list vpn( m8 |& o% m' J8 ~
crypto map test isakmp authorization list vpn9 b2 a2 j6 F7 d( P% o% Y( J3 q
crypto map test client configuration address respond
' X# ^2 ~! }6 N1 f9 ~; Z7 [5 W+ j" C& a. \' Q7 A, G
crypto map test 1 ipsec-isakmp dynamic dymap
8 r$ R y0 t0 n- ]+ h$ b6 o!$ K7 s" H$ a# K+ g! t# M
!. Q. m% Y. U+ ?
!0 n) d- a; V7 E9 \/ h7 C
!
& v0 a& e' a/ b5 ]% i) rinterface Loopback0$ d- D& L. y+ H3 J5 x
ip address 1.1.1.1 255.255.255.0
! C5 {* z- l" `5 z4 P0 v+ f1 X# C; G!
$ J- g7 g2 n0 P4 e8 M$ [interface FastEthernet0/02 x2 j& `0 f5 U+ S9 X8 c
ip address 192.168.110.70 255.255.255.0' k2 g" t2 B8 C- C* t1 @
duplex auto7 g E9 ^( i- l! y
speed auto
% J! N4 G* [8 X& e: K% g crypto map test' l2 U6 @& C7 n" |
!
' _% P ^" j. I1 x4 M& m Dip local pool pool 10.1.1.1 10.1.1.58 j- K% v: l" k1 `5 K9 m8 s. k
ip http server
+ T6 f3 n, P, z( _no ip http secure-server
6 k8 B2 k. V$ u!1 t; _5 P% c) l4 z6 ?
access-list 100 permit ip 1.1.1.0 0.0.0.255 any6 J4 }5 @" Y& z8 u; x' N% |
!# r( C7 a. c. }" v3 n
在客户端上装一个VPN的软件测试一下就可以了 |