
7-35
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Manual Configuration with NAT
Verifying Your Configuration
You can use the following commands to confirm that your configuration is working properly.
To display the settings used by the current IPSec SAs, enter the following command:
show crypto ipsec sa
To display all the current IKE SAs at a peer, enter the following command:
show crypto isakmp sa
To display the VLAN associated with the crypto configuration, enter the following command:
show crypto vlan
To display the VPNSM statistics, enter the following command:
show crypto eli
Manual Configuration with NAT
In this example, two PIX Firewall units are used to create a Virtual Private Network (VPN) between the
networks on each PIX
Firewall unit’s inside interface. This section includes the following topics:
• PIX Firewall 1 Configuration, page 35
• PIX Firewall 2 Configuration, page 7-37
This network is part of an intranet. In this example, the VPN is created without the use of IKE or a CA
and pre-shared keys are used.
PIX Firewall 1 Configuration
Follow these steps to program the PIX Firewall 1 unit for IPSec:
Step 1 Create a crypto map command statement.
Step 2 Create the access-list command entries to select traffic for this policy.
Note For manual keying, only one access-list permit command statement is permitted in the
configuration.
Step 3 Create the transform set for the crypto command statement entry.
Step 4 Define cryptographic state informations. These include SPI, and the necessary keys for manual keying
and policy negotiation for ISAKMP.
Step 5 Repeat Steps 1-4 for each group of policies.
Step 6 Associate the crypto map command statement with an interface.
Commentaires sur ces manuels