...
- Define a host name:
Code Block hostname NewYork
- Configure an ISAKMP policy:
Code Block isakmp enable outside isakmp policy 9 authentication pre-share isakmp policy 9 encrypt 3des
- Configure a pre-shared key and associate with the peer:
Code Block crypto isakmp key cisco1234 address 209.165.200.229
- Configure the supported IPSec transforms:
Code Block crypto ipsec transform-set strong esp-3des esp-sha-hmac
- Create an access list:
This access list defines traffic from network 192.168.12.0 to 10.0.0.0. Both of these networks use unregistered addresses.Code Block access-list 90 permit ip 192.168.12.0 255.255.255.0 10.0.0.0 255.0.0.0
Note Steps 5 and 6 are not required if you want to enable NAT for all traffic. - Exclude traffic between the intranets from NAT:
This excludes traffic matching access list 90 from NAT. The nat 0 command is always processed before any other nat commands.Code Block nat 0 access-list 90
- Enable NAT for all other traffic:
Code Block nat (inside) 1 0 0
- Assign a pool of global addresses for NAT and PAT:
The pool of registered addresses are only used for connections to the public Internet.Code Block global (outside) 1 209.165.201.9-209.165.201.30 global (outside) 1 209.165.201.8
- Define a crypto map:c
Code Block rypto map toSanJose 20 ipsec-isakmp crypto map toSanJose 20 match address 90 crypto map toSanJose 20 set transform-set strong crypto map toSanJose 20 set peer 209.165.200.229
- Apply the crypto map to the outside interface:
Code Block crypto map toSanJose interface outside
- Specify that IPSec traffic be implicitly trusted (permitted):
Code Block sysopt connection permit-ipsec
Password Recovery
Performing password recovery on the security appliance erases the login password, enable password, and aaa authentication console commands. To erase these commands so you can log in with the default passwords, perform the following steps:
...
Code Block | ||
---|---|---|
| ||
------------------------------------------------------------------------------- The following example shows the PIX password recovery with the TFTP server on the outside interface: monitor> interface 0 0: i8255X @ PCI(bus:0 dev:13 irq:10) 1: i8255X @ PCI(bus:0 dev:14 irq:7 ) Using 0: i82559 @ PCI(bus:0 dev:13 irq:10), MAC: 0050.54ff.82b9 monitor> address 10.21.1.99 address 10.21.1.99 monitor> server 172.18.125.3 server 172.18.125.3 monitor> file np70.bin file np52.bin monitor> gateway 10.21.1.1 gateway 10.21.1.1 monitor> ping 172.18.125.3 Sending 5, 100-byte 0xf8d3 ICMP Echoes to 172.18.125.3, timeout is 4 seconds: !!!!! Success rate is 100 percent (5/5) monitor> tftp tftp np52.bin@172.18.125.3 via 10.21.1.1................................... Received 73728 bytes Cisco PIX password tool (4.0) #0: Tue Aug 22 23:22:19 PDT 2005 Flash=i28F640J5 @ 0x300 BIOS Flash=AT29C257 @ 0xd8000 Do you wish to erase the passwords? [yn] y Passwords have been erased. Rebooting.... |
Disabling Password Recovery
You might want to disable password recovery to ensure that unauthorized users cannot use the password recovery mechanism to compromise the security appliance. To disable password recovery, enter the following command:
...