hostname R5
aaa new-model
aaa group server radius ISE1
server-private 192.168.55.121 timeout 5 retransmit 2 key Cisco123
ip radius source-interface GigabitEthernet0/0/0
aaa authentication ppp VPDN_AUTH local
aaa authentication ppp L2TP-AUTHEN group ISE1
aaa authorization network L2TP-AUTHOR group ISE1
aaa accounting delay-start
aaa accounting network L2TP-ACCT
action-type start-stop
group ISE1
ip domain name securitylab.com
vpdn enable
vpdn-group L2TP
! Default L2TP VPDN group
accept-dialin
protocol l2tp
virtual-template 1
no l2tp tunnel authentication
crypto pki trustpoint OpenSSL-CA12
enrollment terminal
subject-name CN="192.168.55.21"
revocation-check crl
rsakeypair R5-KEY
crypto pki certificate map Cert-MAP1 1
subject-name co win10cl2
crypto pki certificate chain OpenSSL-CA12
certificate 01
308203FC 308202E4 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
<Snip>
quit
crypto isakmp profile ISAKMP-PROF
self-identity fqdn R5.securitylab.com
ca trust-point OpenSSL-CA12
match certificate Cert-MAP1
isakmp authorization list L2TP-AUTHOR
crypto ipsec transform-set L2TP-TSET esp-3des esp-sha-hmac
mode transport
crypto dynamic-map D-MAP 1
set transform-set L2TP-TSET
set isakmp-profile ISAKMP-PROF
reverse-route
crypto dynamic-map D-MAP 10
set transform-set L2TP-TSET
crypto map CMAP 10 ipsec-isakmp dynamic D-MAP
interface Loopback0
ip address 192.168.100.1 255.255.255.0
interface Loopback1
description loopback for IPsec Pool
ip address 100.100.100.11 255.255.255.255
interface GigabitEthernet0/0/0
ip address 192.168.55.21 255.255.255.0
interface GigabitEthernet0/0/1
ip address 192.168.56.21 255.255.255.0
negotiation auto
crypto map CMAP
interface Virtual-Template1
ip unnumbered Loopback1
peer default ip address pool L2TP-POOL
ppp authentication pap ms-chap-v2 L2TP-AUTHEN
ppp authorization L2TP-AUTHOR
ppp accounting L2TP-ACCT
ip local pool L2TP-POOL 100.100.100.1 100.100.100.10
ip route 0.0.0.0 0.0.0.0 192.168.56.254
|