(Note: Make sure both ASA are ping each
other.)
ASA1
crypto isakmp policy 1
authentication pre-share
encryption 3des
group 2
exit
crypto isakmp key cisco address 102.1.1.100
crypto ipsec transform-set tset esp-3des esp-sha-hmac
exit
access-list VPN permit ip host 192.168.1.100 host
192.168.2.100
exit
crypto map CMAP 10 set transform-set tset
crypto map CMAP 10 match address VPN
crypto map CMAP 10 set peer 102.1.1.100
exit
crypto isakmp enable OUTSIDE
crypto map CMAP interface
outside
ASA2
crypto isakmp policy 1
authentication pre-share
encryption 3des
group 2
exit
crypto isakmp key cisco address 101.1.1.100
crypto ipsec transform-set tset esp-3des esp-sha-hmac
exit
access-list VPN permit ip host 192.168.2.100 host
192.168.1.100
exit
crypto map CMAP 10 set transform-set tset
crypto map CMAP 10 match address VPN
crypto map CMAP 10 set peer 101.1.1.100
exit
crypto isakmp enable OUTSIDE
crypto map CMAP interface outside
----
No comments:
Post a Comment