

#pkts decaps: 5, #pkts decrypt: 5, #pkts verify: 5 #pkts encaps: 5, #pkts encrypt: 5, #pkts digest: 5 Inside and outside interfaces must be determined on Easy VPN Remote.īoth sites are completed now, so let’s do some testing:ġ92.168.2.1 192.168.2.2 QM_IDLE 1008 0 ACTIVEĬrypto map tag: clientmap, local addr 192.168.2.2
#Easyvpn client password
! Use Username and password saved in profile for connecting to Easy VPN Server. !Indicate the IP address of Easy VPN Server. ! Easy VPN group username and password, which are created on server. If we don’t do this, then we’ll have to connect manually to Easy VPN server every time the network is down. ! Connect automatically to Easy VPN Server. Configuration is almost similar to the Cisco Easy VPN Client configuration. Interface FastEthernet0/0 crypto map clientmapīy this, easy vpn server configuration is completed. !Now attach the crypto-map to outside interface. ! Create crypto map, which will be used to AAA authentication, authorization lists and also in dynamic-crypto map.Ĭrypto map clientmap client authentication list userauthenĬrypto map clientmap isakmp authorization list groupauthorĬrypto map clientmap 10 ipsec-isakmp dynamic dynmap !Create Dynamic-map, which will be used to crypto-map later. !create IPSEC Transform-set for DATA EncryptionĬrypto ipsec transform-set TS esp-3des esp-sha-hmac Save-password Feature allows Remote to save password.Ĭrypto isakmp client configuration group vpngrp !Create group with pre-shared key for IKE authentication. !create username, by which authorization of Easy VPN Remote will occur later. ! enable local authorization method list with name groupauthor for X-AUTHĪaa authorization network groupauthor local ! enable local authentication method list with name userauthen for X-AUTHĪaa authentication login userauthen local

First of all configure R2 as the Server in our scenario. For simplicity I configured default route on both routers to each other. Let’s consider an example as shown on diagram below: configure R1 as an easy VPN Remote and configure R2 as an easy VPN Server and force the traffic to flow via the VPN Tunnel between the Loopback interfaces.īefore starting the configuration between the two routers, check the connectivity between the Loopback interfaces.

The basic configuration is performed on the Server and the configuration done on the Remote router is almost similar to the configuration done on Cisco easy VPN client. Just keep in mind that an EasyVPN scenario involves a Server and Remote Clients. In this post however, let’s consider the configuration of Cisco Easy VPN between two Cisco routers. Basically Cisco Easy VPN is usually used for Cisco easy VPN Client termination.
