Netband Project - IPSec/Gre

From Teknologisk videncenter
Revision as of 09:46, 14 April 2009 by Fatman (talk | contribs) (Configuration for the Head-End)
Jump to: navigation, search

<accesscontrol>NetBand</accesscontrol> This page is part of the Netband Project

Configuration for the Head-End

This configuration is for the "server" part of the tunnel, with the static IP.

crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 5
 lifetime 1000
!
crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0
!
crypto ipsec transform-set Netband-AES256-SHA esp-aes 256 esp-sha-hmac
!
crypto dynamic-map Netband-dynamic 10
 description Hmmm
 set transform-set Netband-AES256-SHA
!
crypto map Netband-crypto 10 ipsec-isakmp dynamic Netband-dynamic
!
interface Tunnel0
 ip address 10.255.254.1 255.255.255.252
 ip mtu 1420
 tunnel source Loopback0
 tunnel destination 10.0.0.21
!
interface Loopback0
 ip address 10.0.0.11 255.255.255.255
!
ip route 10.0.0.21 255.255.255.255 192.168.0.1

Configuration for the Branch

crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 5
 lifetime 1000
!
crypto isakmp key CiscoDisco address 192.168.0.11
!
crypto ipsec transform-set Netband-AES256-SHA esp-aes 256 esp-sha-hmac
!
crypto map crypto 10 ipsec-isakmp
 set peer 192.168.0.11
 set transform-set Netband-AES256-SHA
 match address Tunnel_to_HQ
!
interface Tunnel0
 ip address 10.255.254.2 255.255.255.252
 ip mtu 1420
 tunnel source Loopback0
 tunnel destination 10.0.0.11
!
interface Loopback0
 ip address 10.0.0.21 255.255.255.255
!
ip access-list extended Tunnel_to_HQ
 permit gre host 192.168.6.5 host 10.0.0.11
!
ip route 10.0.0.11 255.255.255.255 FastEthernet0/0