Hi,
I am new to cisco and need some guidance.
I have set up VPN access using my cisco pix 515, cisco client 3.51 and authenticating to an IAS server, (also a DC), in my private network. Everything works fine, but a consultant came in and said it should be more secure but gave no opinion on how to do it. My boss now wants it more secure.
Any ideas of what I can do?
here is my config..
Thanks in advance
access-list 100 permit ip 10.1.0.0 255.255.0.0 10.10.0.0 255.255.0.0
nat (dmz) 0 access-list 100
aaa-server partnerauth protocol radius
aaa-server partnerauth (inside) host 10.1.0.10 255.255.255.255 password timeout 5
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto map dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynmaic dynmap
crypto map client authentication partnetauth
crypto map mymap interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
ip local pool vpnpool 10.0.10.1-10.0.10.254
vpngroup my-vpn-group address-pool vpnpool
vpngroup my-vpn-group DNS-SERVER 10.0.10.11
vpngroup my-vpn-group WINS-SERVER 10.0.10.11
vpngroup my-vpn-group IDLE-TIME 1800
vpngroup my-vpn-group default-domain my-domain.com
VPNGROUP MY-VPN-GROUP password xxxxxxxx
I am new to cisco and need some guidance.
I have set up VPN access using my cisco pix 515, cisco client 3.51 and authenticating to an IAS server, (also a DC), in my private network. Everything works fine, but a consultant came in and said it should be more secure but gave no opinion on how to do it. My boss now wants it more secure.
Any ideas of what I can do?
here is my config..
Thanks in advance
access-list 100 permit ip 10.1.0.0 255.255.0.0 10.10.0.0 255.255.0.0
nat (dmz) 0 access-list 100
aaa-server partnerauth protocol radius
aaa-server partnerauth (inside) host 10.1.0.10 255.255.255.255 password timeout 5
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto map dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynmaic dynmap
crypto map client authentication partnetauth
crypto map mymap interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
ip local pool vpnpool 10.0.10.1-10.0.10.254
vpngroup my-vpn-group address-pool vpnpool
vpngroup my-vpn-group DNS-SERVER 10.0.10.11
vpngroup my-vpn-group WINS-SERVER 10.0.10.11
vpngroup my-vpn-group IDLE-TIME 1800
vpngroup my-vpn-group default-domain my-domain.com
VPNGROUP MY-VPN-GROUP password xxxxxxxx