
7-16
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using PIX Firewall with an In-House CA
Step 9 Map a local IP address to a global IP address:
static (dmz, outside) 209.165.202.131 10.1.0.2 netmask 255.255.255.255
Step 10 Permit the host (PIX Firewall 2) to access the global host via LDAP, port 389:
access-list globalhost permit tcp 209.165.200.229 255.255.255.255 host 209.165.202.131 eq
389
Step 11 Permit the host (PIX Firewall 2) to access the global host via HTTP:
access-list globalhost permit tcp 209.165.200.229 255.255.255.255 host 209.165.202.131 eq
http
Step 12 Create an access group to bind the access list to an interface:
access-group globalhost in interface outside
Step 13 Configure an IKE policy:
isakmp enable outside
isakmp policy 8 auth rsa-sig
isakmp identity hostname
Step 14 Configure a transform set that defines how the traffic will be protected:
crypto ipsec transform-set strong esp-3des esp-sha-hmac
Step 15 Create a partial access list:
access-list 90 permit ip 192.168.12.0 255.255.255.0 10.0.0.0 255.0.0.0
Step 16 Define a crypto map:
crypto map toSanJose 20 ipsec-isakmp
crypto map toSanJose 20 match address 90
crypto map toSanJose 20 set transform-set strong
crypto map toSanJose 20 set peer 209.165.200.229
Step 17 Apply the crypto map to the outside interface:
crypto map toSanJose interface outside
Step 18 Tell the PIX Firewall to implicitly permit IPSec traffic:
sysopt connection permit-ipsec
Example 7-5 lists the configuration for PIX Firewall 1.
Example 7-5 PIX Firewall 1 VPN Tunnel Configuration
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname NewYork
domain-name example.com
Commentaires sur ces manuels