<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Router Management via IPSec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466482#M1055914</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's good to know that the issue has been resolved. Perhaps to rate the particular post that resolves the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Sep 2005 23:26:54 GMT</pubDate>
    <dc:creator>rating_is_vital</dc:creator>
    <dc:date>2005-09-07T23:26:54Z</dc:date>
    <item>
      <title>Router Management via IPSec</title>
      <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466477#M1055892</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am setting up multiple terminal Servers (2600 - running Advance Security IOS) for reverse telnet sessions to our equipment in the physical location of each 2600.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the most secure way to access the 2600? I may not know what IP the user is coming from. I have SSH only, but would like the user to perhaps VPN/PPTP or something to the 2600 prior being able to access a VTY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't seem to get IPSEC to work in transport mode with the client (does the cisco VPN client even support this?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my thoughts were, some sort of ipsec to the public IP of the 2600, then you get handed a private IP (loopback interface of 2600 is member of this private IP segment) then from your ipsec private IP, you are allowed to ssh to the loopback IP. The global (fa0/0) interface is locked down to only allow ipsec traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts on this setup or any advise of what others have done? is IPSec transport mode the best way? how can I get this to work? Different client software?  Any docs on how to configure this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can get it to work with PPTP properly although it is extremely slow, and I do not like PPTP &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466477#M1055892</guid>
      <dc:creator>Steven Bourque</dc:creator>
      <dc:date>2020-02-21T08:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: Router Management via IPSec</title>
      <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466478#M1055896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you may configure remote vpn access. the user needs to connect the ipsec vpn then will be able to telnet to the inside interface of the router via ipsec.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username cisco password 7 xxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;         &lt;/P&gt;&lt;P&gt;aaa authentication login myauthen local&lt;/P&gt;&lt;P&gt;aaa authorization network myauthor local &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group mygroup&lt;/P&gt;&lt;P&gt; key AaBbCcDd&lt;/P&gt;&lt;P&gt; pool vpnpool&lt;/P&gt;&lt;P&gt; acl 130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10&lt;/P&gt;&lt;P&gt; set transform-set myset &lt;/P&gt;&lt;P&gt;        &lt;/P&gt;&lt;P&gt;crypto map mymap client authentication list myauthen&lt;/P&gt;&lt;P&gt;crypto map mymap isakmp authorization list myauthor&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; ip address 192.168.8.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; crypto map mymap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 10.12.12.1 10.12.12.10&lt;/P&gt;&lt;P&gt;ip nat inside source route-map nonat interface Dialer0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip 192.168.8.0 0.0.0.255 10.12.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.8.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 130 permit ip 192.168.8.0 0.0.0.255 10.12.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;route-map nonat permit 10&lt;/P&gt;&lt;P&gt; match ip address 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;above is a sample code. once the remote vpn established, the remote user will get a private address from the pool (10.12.12.0). then the user can telnet to the router inside interface (192.168.8.1) via the ipsec tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;feel free to post your config and we will assist you further to modify the existing code&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2005 01:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466478#M1055896</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-09-07T01:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Router Management via IPSec</title>
      <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466479#M1055900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Part of the original question asked about using transport mode. It is my impression that transport mode is more for gateway to gateway IPSec. For use with a client implementation I think you would be better to use tunnel mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2005 12:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466479#M1055900</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2005-09-07T12:09:01Z</dc:date>
    </item>
    <item>
      <title>Re: Router Management via IPSec</title>
      <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466480#M1055907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying your setup, it was similar to what I have previously tried (I didn't have the nat statements) but I will try them anyway.  my 2600 only has one interface, so I am using loopbacks for the "private" network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can get the VPN to work, but am not able to SSH to the private address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't seem to ping the 172.17.60.1 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My VPN client shows the route, the encrypted counter increases, but no return traffic.  I do have a default route pointing the the next hop of the fa0/0 interface, so it should be hitting my crypto map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on what you posted and the next post, it seems it is recommended to use tunnel mode as your example and not transport?  Even though the router is the end destination? Strange I never had a problem configuring VPN's before.. never had to access the router from it though &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all the help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login VPN local-case&lt;/P&gt;&lt;P&gt;aaa authorization network VPN local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;password encryption aes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group VPN&lt;/P&gt;&lt;P&gt; key 6 &lt;AES encrypted="" key=""&gt;&lt;/AES&gt;&lt;/P&gt;&lt;P&gt; pool VPN&lt;/P&gt;&lt;P&gt; acl 130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPNSET esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map VPN 10&lt;/P&gt;&lt;P&gt; set transform-set VPNSET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map VPN client authentication list VPN&lt;/P&gt;&lt;P&gt;crypto map VPN isakmp authorization list VPN&lt;/P&gt;&lt;P&gt;crypto map VPN client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map VPN 10 ipsec-isakmp dynamic VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 172.17.60.1 255.255.255.255&lt;/P&gt;&lt;P&gt; ip nat inside (tried it with this removed too)&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt; ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip ips AUDIT in&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt; crypto map VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool VPN 192.168.1.1 192.168.1.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source route-map NONAT interface FastEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip host 172.17.60.1 192.168.1.0 0.0.0.7&lt;/P&gt;&lt;P&gt;access-list 101 permit ip host 172.17.60.1 any&lt;/P&gt;&lt;P&gt;access-list 130 permit ip host 172.17.60.1 192.168.1.0 0.0.0.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map NONAT permit 10&lt;/P&gt;&lt;P&gt; match ip address 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 10 permit 192.168.1.0 0.0.0.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 10 in&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication VTY&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; access-class 10 in&lt;/P&gt;&lt;P&gt; exec-timeout 15 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication VTY&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2005 12:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466480#M1055907</guid>
      <dc:creator>Steven Bourque</dc:creator>
      <dc:date>2005-09-07T12:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Router Management via IPSec</title>
      <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466481#M1055911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got it working with your config sample..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had 2 additional problems (dumb user)--&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;1: I was testing it going through my PIX, the esp fixup was not enabled due to the pix itself having isakmp enabled so I bypassed the pix....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2: I had null routes for private addresses, so I added reverse-route in the crypto map to add a specific host route when logged in via VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.  Last time I had this config I kept getting disconnected.  For some reason it seems solid now.. not sure the difference this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2005 18:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466481#M1055911</guid>
      <dc:creator>Steven Bourque</dc:creator>
      <dc:date>2005-09-07T18:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: Router Management via IPSec</title>
      <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466482#M1055914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's good to know that the issue has been resolved. Perhaps to rate the particular post that resolves the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2005 23:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466482#M1055914</guid>
      <dc:creator>rating_is_vital</dc:creator>
      <dc:date>2005-09-07T23:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Router Management via IPSec</title>
      <link>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466483#M1055918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would, however, I accidentaly put it to a 4, and it won't let me change it, or mark is as resolved.. so I guess it will have to stay at a 4...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2005 00:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-management-via-ipsec/m-p/466483#M1055918</guid>
      <dc:creator>Steven Bourque</dc:creator>
      <dc:date>2005-09-08T00:20:54Z</dc:date>
    </item>
  </channel>
</rss>

