Академический Документы
Профессиональный Документы
Культура Документы
Scenario
Set up a Site-to-Site IPSec VPN connection between Cyberoam and Cisco Router using Preshared
Key to authenticate VPN peers. Throughout the article we have used network parameters as shown in
the diagram below.
Cisco Configuration
Cyberoam Configuration
Cisco Configuration
Configure Cisco Router by following the steps given below.
Cisco> en
Password: ******
Cisco# conf t
How To Establish Site-to-Site IPSec Connection between CR and Cisco Router using Preshared Key
encryption 3des
hash md5
authentication pre-share
group 2
lifetime 28800
You can verify the IKE Parameters you configured by executing the following command:
Note:
This new crypto map will remain disabled until a peer and a valid access-list has been configured.
You can view the crypto map by executing the following command:
%crypto-6-ISAKMP_ON_OFF: ISAKMP is ON
You can check the IPSec negotiation by executing the following commands:
Cyberoam Configuration
After configuration of VPN connection on Cisco Router, configure IPSec connection in Cyberoam. You
can configure IPSec in Cyberoam by following the steps given below. Logon to Cyberoam Web Admin
Console as an administrator having read-write permission for relevant features.
Parameter Description
Go to VPN > IPSec > Connection and click under Active and Connection heads against
CR_to_Cisco connection, created in step 1.
Under the Active status indicates that the connection is successfully activated.
Under the Connection status indicates that the connection is successfully established.