Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Define the Networks 

    Code Block
    object-group network Remote_VPN
     network-object 10.10.10.0 255.255.255.0
     network-object 10.20.20.0 255.255.255.0
    object-group network Remote_Internal
     network-object 172.16.1.0 255.255.255.0
     network-object 172.16.2.0 255.255.255.0
     network-object 172.16.3.0 255.255.255.0
     network-object 172.16.4.0 255.255.255.0
     network-object 172.18.0.0 255.255.0.0
    object-group network Remote_Combined
     group-object Remote_VPN
     group-object Remote_Internal
  2. Create the Crypto Map ACL

  3. Create the No-Nat ACL (Networks/hosts to which the packets should not be changed)
  4. Apply the No-NAT
  5. Create a Transform set
  6. Create the Crypto Map
  7. Enable isakmp on interface
  8. Create isakmp policies
  9. Create policy for Tunnel-Group (Site-Site hosts)
  10. Apply Tunnel-Group and Attributes

...

  1. Code Block
    access-list outside_cryptomap_1 extended permit

...

  1.  ip INTERNAL_NETWORK 255.255.255.0 object-group

...

  1.  Remote_Combined
  2. Create the No-Nat ACL (Networks/hosts to which the packets should not be changed)

    Code Block
    access-list VPNNONAT extended permit

...

  1.  ip INTERNAL_NETWORK 255.255.255.0 object-group

...

  1.  Remote_Combined
  2. Apply the No-NAT

    Code Block
    nat (inside) 0 access-list VPNNONAT
  3. Create a Transform set

    Code Block
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

...

  1. Create the Crypto Map

    Code Block
    crypto map MELONGCryptoMaps 1 match address outside_cryptomap_1

...

  1. 
    crypto map MELONGCryptoMaps 1 set peer

...

  1.  1.

...

  1. 1.

...

  1. 1.

...

  1. 1
    crypto map MELONGCryptoMaps 1 set transform-set ESP-AES-256-SHA

...

  1. 
    crypto map MELONGCryptoMaps

...

  1.  interface outside 
  2. Enable isakmp on interface

    Code Block
    crypto isakmp enable outside

...

  1. Create isakmp

...

  1. policies (Note, the policy number is for priority. The highest number first, and then tries lower policies after)

    Code Block
    crypto isakmp policy 50
     authentication pre-share
     encryption aes-256
     hash sha
     group 2
     lifetime 86400
  2. Create policy for Tunnel-Group (Site-Site hosts)

    Code Block
    group-policy Site2Site internal
    group-policy Site2Site attributes
     vpn-tunnel-protocol IPSec l2tp-

...

  1. ipsec 
  2. Apply Tunnel-Group and Attributes

    Code Block
    tunnel-group

...

  1.  1.

...

  1. 1.

...

  1. 1.

...

  1. 1 type ipsec-l2l

...

  1. 
    tunnel-group

...

  1.  1.

...

  1. 1.

...

  1. 1.

...

  1. 1 general-attributes

...

  1. 
     default-group-policy Site2Site

...

  1. 
    tunnel-group

...

  1.  1.

...

  1. 1.

...

  1. 1.

...

  1. 1  ipsec-attributes

...

  1. 
     pre-shared-key

...

  1.  PASSWORD 



Configure Split-DNS Resolution

...