The OpenNET Project / Index page

[ новости /+++ | форум | теги | ]

форумы  правила/FAQ  поиск  регистрация  вход/выход  слежка  RSS
"Помогите, пожалуйста, с настройкой VPN Cisco"
Вариант для распечатки  
Пред. тема | След. тема 
Форум Маршрутизаторы CISCO и др. оборудование. (VPN, VLAN, туннель)
Изначальное сообщение [ Отслеживать ]

"Помогите, пожалуйста, с настройкой VPN Cisco"  +/
Сообщение от Dmitriy (??) on 21-Мрт-06, 14:54 
имеется киска 28-я с софтом 12.3(8r)T8 на наружнем интерфейсе пытаюсь сделать VPN, к этому интерфейсу должен коннектиться виндовый cisco VPN client v4.6. Клиент доходит до циски но соединения не происходит. Клиент в логах жалуется на Phase 1.
Цискин конфиг:

version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname admincis
!
boot-start-marker
boot system flash c2801-advsecurityk9-mz.124-7.bin
boot system flash c2801-spservicesk9-mz.124-4.T1.bin
boot-end-marker
!
logging buffered 51200 warnings
!
aaa new-model
!
!
!
aaa session-id common
!
resource policy
!
clock timezone Moscow 3
clock summer-time Moscow date Mar 30 2003 2:00 Oct 26 2003 3:00
ip cef
!
!
!
!
ip domain name yourdomain.com
!
!
!
crypto pki trustpoint TP-self-signed-501497454
subject-name cn=IOS-Self-Signed-Certificate-501497454
revocation-check none
rsakeypair TP-self-signed-501497454
!
!
username cisco privilege 15 secret 5 $1$eLk0$WATDDKrg/Fy3K2YUyKETV1

crypto isakmp policy 6
hash md5
authentication pre-share
group 2
!
crypto isakmp client configuration group cisco
key cisco
dns """myipdnsaddress"""
wins """myipwinsaddress"""
pool vpn1
acl 100
!
!
crypto ipsec transform-set aes128 esp-des esp-md5-hmac
!
crypto dynamic-map dynam 1
set transform-set aes128
crypto dynamic-map dynam 10
set transform-set aes128
!
!
crypto map aes128 client authentication list default
crypto map aes128 isakmp authorization list default
crypto map aes128 client configuration address respond
crypto map aes128 10 ipsec-isakmp dynamic dynam
!
!
!
interface FastEthernet0/0
description $ETH-SW-LAUNCH$$INTF-INFO-FE 0$$ETH-LAN$
ip address 172.16.2.92 255.255.255.248
duplex auto
speed auto
crypto map aes128
!
interface FastEthernet0/1
ip address 172.17.31.1 255.255.255.0
ip directed-broadcast
duplex auto
speed auto
!
ip local pool vpn1 192.168.15.250 192.168.15.251
ip route 0.0.0.0 0.0.0.0 172.16.2.89
ip flow-export version 5

ip flow-export destination 172.16.171.3 9996
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 5 life 86400 requests 10000
!
access-list 100 permit ip 172.17.31.0 0.0.0.255 172.16.2.96 0.0.0.7
access-list 100 permit ip 172.17.31.0 0.0.0.255 192.168.15.0 0.0.0.255
access-list 100 permit ip 172.16.2.88 0.0.0.7 192.168.15.0 0.0.0.255
access-list 100 permit ip 172.16.2.88 0.0.0.7 172.16.2.96 0.0.0.7
!
!
control-plane
!
banner login
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device.
This feature requires the one-time use of the username "cisco"
with the password "cisco".

Please change these publicly known initial credentials using SDM or the IOS CLI.
Here are the Cisco IOS commands.

username <myuser>  privilege 15 secret 0 <mypassword>
no username cisco

Replace <myuser> and <mypassword> with the username and password you want to use.

For more information about SDM please follow the instructions in the QUICK START
GUIDE for your router or go to http://www.cisco.com/go/sdm
-----------------------------------------------------------------------
!
line con 0
line aux 0
line vty 0 4
privilege level 15
transport input telnet ssh
line vty 5 15
privilege level 15
transport input telnet ssh
!
scheduler allocate 20000 1000
end

Ответить | Правка | Cообщить модератору

Оглавление

Сообщения по теме [Сортировка по времени | RSS]


1. "Помогите, пожалуйста, с настройкой VPN Cisco"  +/
Сообщение от sh_ email(??) on 21-Мрт-06, 15:17 

aaa authorization network default local
aaa authentication login default local

А на дебаги можно посмотреть?

Ответить | Правка | ^ к родителю #0 | Наверх | Cообщить модератору

2. "Помогите, пожалуйста, с настройкой VPN Cisco"  +/
Сообщение от Dmitriy (??) on 21-Мрт-06, 15:23 
>
>aaa authorization network default local
>aaa authentication login default local
>
>А на дебаги можно посмотреть?

Конечно можно

*Mar 20 13:52:38.502: ISAKMP (0:0): received packet from 172.16.2.99 dport 500 sport 500 Global (N) NEW SA
*Mar 20 13:52:38.502: ISAKMP: Created a peer struct for 172.16.2.99, peer port 500
*Mar 20 13:52:38.502: ISAKMP: New peer created peer = 0x63E8BAC0 peer_handle = 0x80000016
*Mar 20 13:52:38.502: ISAKMP: Locking peer struct 0x63E8BAC0, IKE refcount 1 for crypto_isakmp_process_block
*Mar 20 13:52:38.502: ISAKMP:(0:0:N/A:0):Setting client config settings 63E8FCF0
*Mar 20 13:52:38.502: ISAKMP:(0:0:N/A:0):(Re)Setting client xauth list  and state
*Mar 20 13:52:38.502: ISAKMP/xauth: initializing AAA request
*Mar 20 13:52:38.502: ISAKMP: local port 500, remote port 500
*Mar 20 13:52:38.502: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 63192708
*Mar 20 13:52:38.502: ISAKMP:(0:0:N/A:0): processing SA payload. message ID = 0
*Mar 20 13:52:38.502: ISAKMP:(0:0:N/A:0): processing ID payload. message ID = 0
*Mar 20 13:52:38.502: ISAKMP (0:0): ID payload
       next-payload : 13
       type         : 11
       group id     : cisco
       protocol     : 17
       port         : 500
       length       : 13
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):: peer matches *none* of the profiles
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): processing vendor id payload
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): vendor ID seems Unity/DPD but major 215 mismatch
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): vendor ID is XAUTH
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): processing vendor id payload
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): vendor ID is DPD
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): processing vendor id payload
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): vendor ID is Unity
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0): Authentication by xauth preshared
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 1 against priority 6 policy
*Mar 20 13:52:38.506: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.506: ISAKMP:      hash SHA
*Mar 20 13:52:38.506: ISAKMP:      default group 2
*Mar 20 13:52:38.506: ISAKMP:      auth XAUTHInitPreShared
*Mar 20 13:52:38.506: ISAKMP:      life type in seconds
*Mar 20 13:52:38.506: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.506: ISAKMP:      keylength of 256
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 2 against priority 6 policy
*Mar 20 13:52:38.506: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.506: ISAKMP:      hash MD5
*Mar 20 13:52:38.506: ISAKMP:      default group 2
*Mar 20 13:52:38.506: ISAKMP:      auth XAUTHInitPreShared
*Mar 20 13:52:38.506: ISAKMP:      life type in seconds
*Mar 20 13:52:38.506: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.506: ISAKMP:      keylength of 256
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 3 against priority 6 policy
*Mar 20 13:52:38.506: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.506: ISAKMP:      hash SHA
*Mar 20 13:52:38.506: ISAKMP:      default group 2
*Mar 20 13:52:38.506: ISAKMP:      auth pre-share
*Mar 20 13:52:38.506: ISAKMP:      life type in seconds
*Mar 20 13:52:38.506: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.506: ISAKMP:      keylength of 256
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.506: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 4 against priority 6 policy
*Mar 20 13:52:38.510: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.510: ISAKMP:      hash MD5
*Mar 20 13:52:38.510: ISAKMP:      default group 2
*Mar 20 13:52:38.510: ISAKMP:      auth pre-share
*Mar 20 13:52:38.510: ISAKMP:      life type in seconds
*Mar 20 13:52:38.510: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.510: ISAKMP:      keylength of 256
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 5 against priority 6 policy
*Mar 20 13:52:38.510: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.510: ISAKMP:      hash SHA
*Mar 20 13:52:38.510: ISAKMP:      default group 2
*Mar 20 13:52:38.510: ISAKMP:      auth XAUTHInitPreShared
*Mar 20 13:52:38.510: ISAKMP:      life type in seconds
*Mar 20 13:52:38.510: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.510: ISAKMP:      keylength of 128
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 6 against priority 6 policy
*Mar 20 13:52:38.510: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.510: ISAKMP:      hash MD5
*Mar 20 13:52:38.510: ISAKMP:      default group 2
*Mar 20 13:52:38.510: ISAKMP:      auth XAUTHInitPreShared
*Mar 20 13:52:38.510: ISAKMP:      life type in seconds
*Mar 20 13:52:38.510: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.510: ISAKMP:      keylength of 128
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 7 against priority 6 policy
*Mar 20 13:52:38.510: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.510: ISAKMP:      hash SHA
*Mar 20 13:52:38.510: ISAKMP:      default group 2
*Mar 20 13:52:38.510: ISAKMP:      auth pre-share
*Mar 20 13:52:38.510: ISAKMP:      life type in seconds
*Mar 20 13:52:38.510: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.510: ISAKMP:      keylength of 128
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 8 against priority 6 policy
*Mar 20 13:52:38.510: ISAKMP:      encryption AES-CBC
*Mar 20 13:52:38.510: ISAKMP:      hash MD5
*Mar 20 13:52:38.510: ISAKMP:      default group 2
*Mar 20 13:52:38.510: ISAKMP:      auth pre-share
*Mar 20 13:52:38.510: ISAKMP:      life type in seconds
*Mar 20 13:52:38.510: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.510: ISAKMP:      keylength of 128
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.510: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 9 against priority 6 policy
*Mar 20 13:52:38.514: ISAKMP:      encryption 3DES-CBC
*Mar 20 13:52:38.514: ISAKMP:      hash SHA
*Mar 20 13:52:38.514: ISAKMP:      default group 2
*Mar 20 13:52:38.514: ISAKMP:      auth XAUTHInitPreShared
*Mar 20 13:52:38.514: ISAKMP:      life type in seconds
*Mar 20 13:52:38.514: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 10 against priority 6 policy
*Mar 20 13:52:38.514: ISAKMP:      encryption 3DES-CBC
*Mar 20 13:52:38.514: ISAKMP:      hash MD5
*Mar 20 13:52:38.514: ISAKMP:      default group 2
*Mar 20 13:52:38.514: ISAKMP:      auth XAUTHInitPreShared
*Mar 20 13:52:38.514: ISAKMP:      life type in seconds
*Mar 20 13:52:38.514: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 11 against priority 6 policy
*Mar 20 13:52:38.514: ISAKMP:      encryption 3DES-CBC
*Mar 20 13:52:38.514: ISAKMP:      hash SHA
*Mar 20 13:52:38.514: ISAKMP:      default group 2
*Mar 20 13:52:38.514: ISAKMP:      auth pre-share
*Mar 20 13:52:38.514: ISAKMP:      life type in seconds
*Mar 20 13:52:38.514: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 12 against priority 6 policy
*Mar 20 13:52:38.514: ISAKMP:      encryption 3DES-CBC
*Mar 20 13:52:38.514: ISAKMP:      hash MD5
*Mar 20 13:52:38.514: ISAKMP:      default group 2
*Mar 20 13:52:38.514: ISAKMP:      auth pre-share
*Mar 20 13:52:38.514: ISAKMP:      life type in seconds
*Mar 20 13:52:38.514: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Encryption algorithm offered does not match policy!
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):atts are not acceptable. Next payload is 3
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 13 against priority 6 policy
*Mar 20 13:52:38.514: ISAKMP:      encryption DES-CBC
*Mar 20 13:52:38.514: ISAKMP:      hash MD5
*Mar 20 13:52:38.514: ISAKMP:      default group 2
*Mar 20 13:52:38.514: ISAKMP:      auth XAUTHInitPreShared
*Mar 20 13:52:38.514: ISAKMP:      life type in seconds
*Mar 20 13:52:38.514: ISAKMP:      life duration (VPI) of  0x0 0x20 0xC4 0x9B
*Mar 20 13:52:38.514: ISAKMP:(0:0:N/A:0):atts are acceptable. Next payload is 3
*Mar 20 13:52:38.570: ISAKMP:(0:15:SW:1): processing KE payload. message ID = 0
*Mar 20 13:52:38.634: ISAKMP:(0:15:SW:1): processing NONCE payload. message ID = 0
*Mar 20 13:52:38.638: ISAKMP (0:134217743): Unknown Input IKE_MESG_FROM_PEER, IKE_AM_EXCH:  state = IKE_READY
*Mar 20 13:52:38.638: ISAKMP:(0:15:SW:1):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Mar 20 13:52:38.638: ISAKMP:(0:15:SW:1):Old State = IKE_READY  New State = IKE_READY

*Mar 20 13:52:38.638: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Aggressive mode failed with peer at 172.16.2.99
*Mar 20 13:52:44.022: ISAKMP (0:134217743): received packet from 172.16.2.99 dport 500 sport 500 Global (R) AG_NO_STATE
*Mar 20 13:52:44.022: ISAKMP:(0:15:SW:1): processing SA payload. message ID = 0
*Mar 20 13:52:44.022: ISAKMP:(0:15:SW:1): already processed SA payload!
*Mar 20 13:52:44.022: ISAKMP (0:134217743): Unknown Input IKE_MESG_FROM_PEER, IKE_AM_EXCH:  state = IKE_READY
*Mar 20 13:52:44.022: ISAKMP:(0:15:SW:1):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Mar 20 13:52:44.022: ISAKMP:(0:15:SW:1):Old State = IKE_READY  New State = IKE_READY

*Mar 20 13:52:48.590: ISAKMP (0:134217743): received packet from 172.16.2.99 dport 500 sport 500 Global (R) AG_NO_STATE
*Mar 20 13:52:48.590: ISAKMP:(0:15:SW:1): processing SA payload. message ID = 0
*Mar 20 13:52:48.590: ISAKMP:(0:15:SW:1): already processed SA payload!
*Mar 20 13:52:48.590: ISAKMP (0:134217743): Unknown Input IKE_MESG_FROM_PEER, IKE_AM_EXCH:  state = IKE_READY
*Mar 20 13:52:48.590: ISAKMP:(0:15:SW:1):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Mar 20 13:52:48.590: ISAKMP:(0:15:SW:1):Old State = IKE_READY  New State = IKE_READY

*Mar 20 13:52:53.978: ISAKMP (0:134217743): received packet from 172.16.2.99 dport 500 sport 500 Global (R) AG_NO_STATE
*Mar 20 13:52:53.978: ISAKMP:(0:15:SW:1): processing SA payload. message ID = 0
*Mar 20 13:52:53.978: ISAKMP:(0:15:SW:1): already processed SA payload!
*Mar 20 13:52:53.978: ISAKMP (0:134217743): Unknown Input IKE_MESG_FROM_PEER, IKE_AM_EXCH:  state = IKE_READY
*Mar 20 13:52:53.978: ISAKMP:(0:15:SW:1):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Mar 20 13:52:53.978: ISAKMP:(0:15:SW:1):Old State = IKE_READY  New State = IKE_READY

Ответить | Правка | ^ к родителю #1 | Наверх | Cообщить модератору

3. "Помогите, пожалуйста, с настройкой VPN Cisco"  +/
Сообщение от sh_ email(??) on 21-Мрт-06, 17:25 
Тупо залил вашу конфигурацию. Она работает. Вы group password в vpn клиенте такой же, как и в конфигурации вбиваете. В Вашем примере это cisco/cisco.

aaa authentication login default local
aaa authorization network default local
username fuck password fuck

crypto isakmp policy 6
hash md5
authentication pre-share
group 2
!
crypto isakmp client configuration group cisco
key cisco
pool vpn1
acl 100
!
!
crypto ipsec transform-set aes128 esp-des esp-md5-hmac
!
crypto dynamic-map dynam 1
set transform-set aes128
crypto dynamic-map dynam 10
set transform-set aes128
!
!
crypto map aes128 client authentication list default
crypto map aes128 isakmp authorization list default
crypto map aes128 client configuration address respond
crypto map aes128 10 ipsec-isakmp dynamic dynam
!
ip local pool vpn1 192.168.15.250 192.168.15.251
access-list 100 permit ip 172.17.31.0 0.0.0.255 172.16.2.96 0.0.0.7
access-list 100 permit ip 172.17.31.0 0.0.0.255 192.168.15.0 0.0.0.255
access-list 100 permit ip 172.16.2.88 0.0.0.7 192.168.15.0 0.0.0.255
access-list 100 permit ip 172.16.2.88 0.0.0.7 172.16.2.96 0.0.0.7
!

Ответить | Правка | ^ к родителю #2 | Наверх | Cообщить модератору

4. "Помогите, пожалуйста, с настройкой VPN Cisco"  +/
Сообщение от Dmitriy (??) on 21-Мрт-06, 17:55 
>Тупо залил вашу конфигурацию. Она работает. Вы group password в vpn клиенте
>такой же, как и в конфигурации вбиваете. В Вашем примере это
>cisco/cisco.
>
>aaa authentication login default local
>aaa authorization network default local
>username fuck password fuck
>
>crypto isakmp policy 6
> hash md5
> authentication pre-share
> group 2
>!
>crypto isakmp client configuration group cisco
> key cisco
> pool vpn1
> acl 100
>!
>!
>crypto ipsec transform-set aes128 esp-des esp-md5-hmac
>!
>crypto dynamic-map dynam 1
> set transform-set aes128
>crypto dynamic-map dynam 10
> set transform-set aes128
>!
>!
>crypto map aes128 client authentication list default
>crypto map aes128 isakmp authorization list default
>crypto map aes128 client configuration address respond
>crypto map aes128 10 ipsec-isakmp dynamic dynam
>!
>ip local pool vpn1 192.168.15.250 192.168.15.251
>access-list 100 permit ip 172.17.31.0 0.0.0.255 172.16.2.96 0.0.0.7
>access-list 100 permit ip 172.17.31.0 0.0.0.255 192.168.15.0 0.0.0.255
>access-list 100 permit ip 172.16.2.88 0.0.0.7 192.168.15.0 0.0.0.255
>access-list 100 permit ip 172.16.2.88 0.0.0.7 172.16.2.96 0.0.0.7
>!


Всё от невнимательности, наверное, после добавления
aaa authentication login default local
aaa authorization network default local
всё заработало, спасибо Вам большое!

Ответить | Правка | ^ к родителю #3 | Наверх | Cообщить модератору

5. "Помогите, пожалуйста, с настройкой VPN Cisco"  +/
Сообщение от Remy email(ok) on 09-Ноя-06, 18:07 
>Всё от невнимательности, наверное, после добавления
>aaa authentication login default local
>aaa authorization network default local
>всё заработало, спасибо Вам большое!

А у меня вот ни в какую работать не хочет!
2811: IOS Version 12.4(1r)
VPN Client: 4.8.01.0300

ругаеца
*Nov  9 15:41:34.384: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Aggressive mode failed with peer at 172.16.30.54

Настраивал с помощью wizard, на одном из внутренних Vlan, а именно Vlan4, локалка подключена на Vlan1.

Ответить | Правка | ^ к родителю #4 | Наверх | Cообщить модератору

6. "Помогите, пожалуйста, с настройкой VPN Cisco"  +/
Сообщение от tony.wheel on 17-Июн-17, 00:55 
ППо поводу VPN могу посоветовать статьи
http://netclo.ru/osvaivaem-vpn-nastroyka-gre-tunnelya-na-cis.../
http://netclo.ru/osvaivaem-vpn-nastroyka-ipsec-na-cisco-chas...


Ответить | Правка | ^ к родителю #5 | Наверх | Cообщить модератору

Архив | Удалить

Рекомендовать для помещения в FAQ | Индекс форумов | Темы | Пред. тема | След. тема




Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру