home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.dcom.vpn      VPN protocols, clients, awesomeness      2,348 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,251 of 2,348   
   Yulunga to All   
   Cisco Client from behind a IOS box with    
   05 Oct 04 21:56:42   
   
   From: zen39712@zen.co.uk   
      
   OK --   
      
   I have a Cisco 800 Dsl router with a site to site VPN that work fine. I also   
   have remote   
   access to the nework behind the IOS through a cisco vpn client v. 4.6.   
   What I now need is to setup access to another remote network with the   
   Checkpoint   
   SecurRemote VPN client from inside my home network. Below is the config of   
   my home network   
   the Checkpoint client is on 10.100.200.10 255.255.255.224. I have 8 Public   
   Ip addresses from my ISP   
   and only use the one with NAT.   
      
   Please could someone help me with a explanation on how to go about this !!!   
      
   HOUSTON#show conf   
   Using 4426 out of 131072 bytes   
   !   
   version 12.3   
   no service pad   
   service timestamps debug datetime msec   
   service timestamps log datetime msec   
   service password-encryption   
   !   
   hostname HOUSTON   
   !   
   boot-start-marker   
   boot-end-marker   
   !   
   enable secret !   
   username dogma pass   
   aaa new-model   
   !   
   !   
   aaa authentication login userauthen local   
   aaa authorization network client3000 local   
   aaa session-id common   
   ip subnet-zero   
   !   
   !   
   !   
   !   
   ip domain name simian.com   
   ip inspect name in2out rcmd   
   ip inspect name in2out ftp   
   ip inspect name in2out tftp   
   ip inspect name in2out tcp timeout 43200   
   ip inspect name in2out http   
   ip inspect name in2out udp   
   ip ips po max-events 100   
   no ftp-server write-enable   
   !   
   !   
   !   
   !   
   !   
   crypto isakmp policy 10   
    encr 3des   
    authentication pre-share   
    group 2   
   crypto isakmp key test321 address 212.100.100.3   
   crypto isakmp key test123 address 80.100.100.10   
   !   
   crypto isakmp client configuration group client3000   
    key user@test1234user   
    dns 10.100.200.11   
    domain simian.com   
    pool ippool   
    acl 101   
   crypto isakmp profile VPNclient   
      match identity group client3000   
      client authentication list userauthen   
      isakmp authorization list client3000   
      client configuration address respond   
   !   
   !   
   crypto ipsec transform-set vpn-trans esp-3des esp-sha-hmac   
    mode transport   
   !   
   crypto ipsec profile test123   
    set security-association lifetime seconds 1800   
   !   
   !   
   crypto dynamic-map dynmap 10   
    set transform-set vpn-trans   
    set isakmp-profile VPNclient   
    reverse-route   
   !   
   !   
   crypto map dynmap 1 ipsec-isakmp dynamic dynmap   
   crypto map dynmap 10 ipsec-isakmp   
    set peer 212.100.100.3   
    set transform-set vpn-trans   
    set pfs group2   
    match address 111   
   crypto map dynmap 20 ipsec-isakmp   
    set peer 80.100.100.10   
    set transform-set vpn-trans   
    set pfs group2   
    match address 115   
   !   
   !   
   !   
   interface Ethernet0   
    ip address 10.100.200.1 255.255.255.224   
    ip nat inside   
    ip virtual-reassembly   
    no ip mroute-cache   
    fair-queue   
    no cdp enable   
    hold-queue 100 out   
   !   
   interface ATM0   
    no ip address   
    atm vc-per-vp 64   
    no atm ilmi-keepalive   
    dsl operating-mode auto   
    pvc 0/38   
     encapsulation aal5mux ppp dialer   
     dialer pool-member 1   
    !   
   !   
   interface FastEthernet1   
    no ip address   
    duplex auto   
    speed auto   
   !   
   interface FastEthernet2   
    no ip address   
    duplex auto   
    speed auto   
   !   
   interface FastEthernet3   
    no ip address   
    duplex auto   
    speed auto   
   !   
   interface FastEthernet4   
    no ip address   
    duplex auto   
    speed auto   
   !   
   interface Dialer0   
    ip address negotiated   
    ip access-group 121 in   
    ip nat outside   
    ip inspect in2out out   
    ip virtual-reassembly   
    encapsulation ppp   
    dialer pool 1   
    dialer enable-timeout 2   
    dialer-group 1   
    fair-queue   
    ppp authentication chap callin   
    ppp chap hostname ****   
    ppp chap password ***   
    crypto map dynmap   
    hold-queue 224 in   
   !   
   ip local pool ippool 192.168.1.200 192.168.1.210   
   ip classless   
   ip route 0.0.0.0 0.0.0.0 Dialer0   
   !   
   no ip http server   
   no ip http secure-server   
   ip nat inside source route-map nonat interface Dialer0 overload   
   ip nat inside source static 10.100.200.10 212.100.10.51   
   !   
   access-list 100 deny   ip 10.100.200.0 0.0.0.31 10.10.10.0 0.0.0.255   
   access-list 100 deny   ip 10.100.200.0 0.0.0.31 10.240.0.0 0.0.255.255   
   access-list 100 deny   ip 10.100.200.0 0.0.0.31 145.227.178.0 0.0.0.255   
   access-list 100 permit ip 10.100.200.0 0.0.0.31 any   
   access-list 101 permit ip 192.168.1.0 0.0.0.255 10.100.200.0 0.0.0.31   
   access-list 101 permit ip 10.100.200.0 0.0.0.31 192.168.1.0 0.0.0.255   
   access-list 103 deny   ip 10.100.200.0 0.0.0.31 10.10.10.0 0.0.0.255   
   access-list 103 deny   ip 10.100.200.0 0.0.0.31 10.240.0.0 0.0.255.255   
   access-list 103 deny   ip 10.100.200.0 0.0.0.31 145.227.178.0 0.0.0.255   
   access-list 103 deny   ip 10.100.200.0 0.0.0.31 192.168.1.0 0.0.0.255   
   access-list 103 permit ip 10.100.200.0 0.0.0.31 any   
   access-list 103 permit ip 192.168.1.0 0.0.0.31 any   
   access-list 111 permit ip 10.100.200.0 0.0.0.31 10.240.0.0 0.0.255.255   
   access-list 111 permit ip 10.100.200.0 0.0.0.31 145.227.178.0 0.0.0.255   
   access-list 115 permit ip 10.100.200.0 0.0.0.31 10.10.10.0 0.0.0.255   
   dialer-list 1 protocol ip permit   
   route-map nonat permit 10   
    match ip address 103   
   !   
   !   
   control-plane   
   !   
   !   
   line con 0   
   line aux 0   
    transport preferred ssh   
    stopbits 1   
   line vty 0 4   
    transport input ssh   
   !   
   scheduler max-task-time 5000   
   end   
      
      
      
      
   Y.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca