Cisco router on a stick configuration
!- Interesting traffic used for policy route. !- The access list is used to specify which traffic is to be translated for the !- outside Internet. ip nat inside source list 101 interface FastEthernet1/0 overload
![cisco router on a stick configuration cisco router on a stick configuration](https://www.techreally.com/wp-content/uploads/2013/11/router-on-a-stick.png)
!- Enables Network Address Translation (NAT) !- of the inside source address that matches access list 101 !- and gets PATed with the FastEthernet IP address. !- Create a pool of addresses to be !- assigned to the VPN Clients. !- Apply the crypto map on the interface.
![cisco router on a stick configuration cisco router on a stick configuration](https://ipcisco.com/wp-content/uploads/VLAN/Router-On-Stick-ipcisco.jpg)
!- Create the loopback interface for the VPN user traffic. crypto map clientmap client authentication list userauthenĬrypto map clientmap isakmp authorization list groupauthorĬrypto map clientmap client configuration address respondĬrypto map clientmap 10 ipsec-isakmp dynamic dynmap !- Create the actual crypto map, !- and apply the AAA lists that were created earlier. !- Create a dynamic map and apply !- the transform set that was created earlier. crypto ipsec transform-set myset esp-3des esp-md5-hmac !- Create the Phase 2 Policy for actual data encryption. crypto isakmp client configuration group vpnclient Group 2 !- Create a group that is used to specify the !- WINS and DNS server addresses to the VPN Client, !- along with the pre-shared key for authentication. !- Create an Internet Security Association and !- Key Management Protocol (ISAKMP) policy for Phase 1 negotiations. !- For local authentication of the IPsec user, !- create the user with a password. aaa authorization network groupauthor local aaa authentication login userauthen local !- In order to enable group authorization, enable !- the aaa authorization commands. !- In order to enable Xauth for user authentication, !- enable the aaa authentication commands. !- Enable authentication, authorization and accounting (AAA) !- for user authentication and group authorization. They are RFC 1918 addresses which have been used in a lab environment. Note: The IP addressing schemes used in this configuration are not legally routable on the Internet. Note: Use the Command Lookup Tool ( registered customers only) to obtain more information on the commands used in this section. In this section, you are presented with the information to configure the features described in this document. Refer to the Cisco Technical Tips Conventions for more information on document conventions. If your network is live, make sure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment.
CISCO ROUTER ON A STICK CONFIGURATION SOFTWARE
The information in this document is based on these software and hardware versions:Ĭisco Router 3640 with Cisco IOS® Software Release 12.4 There are no specific requirements for this document. This IP addressing scheme helps you to troubleshoot your network.
![cisco router on a stick configuration cisco router on a stick configuration](https://i.ytimg.com/vi/GVS7i_uF2VM/maxresdefault.jpg)
![cisco router on a stick configuration cisco router on a stick configuration](https://www.cisco.com/c/dam/en/us/support/docs/security/vpn-client/71461-router-vpnclient-pi-stick-1.gif)
Note: In order to avoid the overlapping of IP addresses in the network, assign the entirely different pool of IP addresses to the VPN Client (for example, 10.x.x.x, 172.16.x.x, .x). Refer to PIX/ASA 7.x and VPN Client for Public Internet VPN on a Stick Configuration Example in order to complete a similar configuration on a central site PIX Firewall. This allows the Internet traffic to be port address translated (PATed) to the outside world. In order to achieve this, configure the policy map in the router to point all the VPN traffic (Cisco VPN Client) to a loopback interface. This setup applies to a specific case where the router, without enabling split tunneling, and Mobile users (Cisco VPN Client) can access the Internet via the central site router.
CISCO ROUTER ON A STICK CONFIGURATION HOW TO
This document describes how to set up a central site router to perform IPsec traffic on a stick.