Difference between revisions of "Netband Project - IPSec/Gre"
From Teknologisk videncenter
(→Configuration for the Head-End) |
(→Configuration for the Head-End) |
||
Line 34: | Line 34: | ||
ip route 10.0.0.21 255.255.255.255 192.168.0.1 | ip route 10.0.0.21 255.255.255.255 192.168.0.1 | ||
</pre> | </pre> | ||
+ | |||
+ | ==Configuration for the Branch== |
Revision as of 08:36, 14 April 2009
<accesscontrol>NetBand</accesscontrol>
Netband Project - IPSec/GRE
This page is part of the Netband Project
Configuration for the Head-End
This configuration is for the "server" part og the tunnel, with the static IP.
crypto isakmp policy 10 encr aes 256 authentication pre-share group 5 lifetime 1000 ! crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0 ! crypto ipsec transform-set Netband-AES256-SHA esp-aes 256 esp-sha-hmac ! crypto dynamic-map Netband-dynamic 10 description Hmmm set transform-set tset-AES256-SHA tset-TDES-SHA ! crypto map Netband-crypto 40 ipsec-isakmp dynamic test-dynamic ! interface Tunnel0 ip address 10.255.0.9 255.255.255.252 ip mtu 1420 tunnel source Loopback0 tunnel destination 10.0.0.21 ! interface Loopback0 ip address 10.0.0.11 255.255.255.255 ! ip route 10.0.0.21 255.255.255.255 192.168.0.1