<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416189#M1055503</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, so only user setup client not anyone? Any example? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 08 Jan 2006 02:03:30 GMT</pubDate>
    <dc:creator>cisco.learner</dc:creator>
    <dc:date>2006-01-08T02:03:30Z</dc:date>
    <item>
      <title>Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416187#M1055501</link>
      <description>&lt;P&gt;Hi, I setup static for remote connection now for rdp. I want to know what advantage is setup the remote VPN client on pix.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416187#M1055501</guid>
      <dc:creator>cisco.learner</dc:creator>
      <dc:date>2020-02-21T08:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416188#M1055502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the main benefit is to secure the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;providing port forwarding and inbound acl have been configured for remote user, all the traffic is traversed in clear text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the remote vpn client needs to be installed on the remote pc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jan 2006 01:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416188#M1055502</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2006-01-08T01:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416189#M1055503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, so only user setup client not anyone? Any example? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jan 2006 02:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416189#M1055503</guid>
      <dc:creator>cisco.learner</dc:creator>
      <dc:date>2006-01-08T02:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416190#M1055504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, cisco vpn client is a must.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below are the sample codes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.1.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 192.168.1.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set vpnset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool ippool 10.1.1.11-10.1.1.21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup vpnclient address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup vpnclient idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpnclient dns-server 139.130.4.4&lt;/P&gt;&lt;P&gt;vpngroup vpnclient password cisco456&lt;/P&gt;&lt;P&gt;vpngroup vpnclient split-tunnel 120&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set vpnset&lt;/P&gt;&lt;P&gt;crypto map remote_vpn 20 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username cisco password cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;crypto map remote_vpn client authentication LOCAL&lt;/P&gt;&lt;P&gt;crypto map remote_vpn client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map remote_vpn client configuration address respond&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jan 2006 02:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416190#M1055504</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2006-01-08T02:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416191#M1055505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, is there another remote VPN method? My friend don't need install VPN client.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2006 00:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416191#M1055505</guid>
      <dc:creator>cisco.learner</dc:creator>
      <dc:date>2006-01-09T00:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416192#M1055506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not with the pix501. with pix 515e or above, webvpn would the other option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just wondering what sort of device your friend has. it may be feasible to configure a lan-lan vpn between you and your friend.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2006 00:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416192#M1055506</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2006-01-09T00:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416193#M1055507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, my friend has router 827h. Possible to setup vpn? Please give example.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2006 00:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416193#M1055507</guid>
      <dc:creator>cisco.learner</dc:creator>
      <dc:date>2006-01-09T00:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416194#M1055508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;below are the sample codes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for pix,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 121 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 1.1.x.x.x.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map myvpn 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map myvpn 10 match address 121&lt;/P&gt;&lt;P&gt;crypto map myvpn 10 set peer 1.1.1.2&lt;/P&gt;&lt;P&gt;crypto map myvpn 10 set transform-set myset&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map myvpn interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp key xxx address 1.x.x.2 netmask 255.255.255.255 no-xauth no-config-mode &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for router,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp key xxx address 1.1.1.1 no-xauth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer 1.1.1.1&lt;/P&gt;&lt;P&gt; set transform-set myset&lt;/P&gt;&lt;P&gt; match address 121&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt;ip address 1.1.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip access-group 111 in&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;crypto map mymap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source route-map nonat interface Dialer0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.2.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 111 permit udp any host 1.1.1.2 eq non500-isakmp&lt;/P&gt;&lt;P&gt;access-list 111 permit udp any host 1.1.1.2 eq isakmp&lt;/P&gt;&lt;P&gt;access-list 111 permit esp any host 1.1.1.2&lt;/P&gt;&lt;P&gt;access-list 111 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 111 deny   ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 121 permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map nonat permit 10&lt;/P&gt;&lt;P&gt; match ip address 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2006 18:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-vpn/m-p/416194#M1055508</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2006-01-10T18:23:56Z</dc:date>
    </item>
  </channel>
</rss>

