multiple server Raduis on Cisco router configuration

I have a cisco router, who works as a PPPoE NAS Server I need to configure multiple raduis servers each one is dedicated to an interface, so I will each of my clients to authenticate via the server correct raduis

Thanks in advance

Hello

a brief overview of the steps config:

AAA new-model

create 2 separate radius servers, use the modern syntax with host and key in the same line

host 10.1.1.1 XXXXXXXXX RADIUS server key.

radius-server host 10.1.1.2 key XXXXXXXXX

Create 2 separate aaa-servers in a group radgroup1 and radgroup2 and add each of the servers to a server group aaa

aaa group server radius radgroup1

 server 10.1.1.1
aaa group server radius radgroup2
server 10.1.1.2

create 2 lists different servers as a method of authentication with groups aaa:

AAA authenticate ppp login1 group radgroup1

AAA authenticate ppp Connexion2 group radgroup2

Use the two authetications on what appropriate interfaces:

Router (config) #interface {name-of-interface-1}

Router(Config-if) #ppp login1 chap authentication

Router (config) #interface {name-of-interface-2}

Router(Config-if) #ppp Connexion2 chap authentication

Rgds,

MiKa

Tags: Cisco Security

Similar Questions

  • The incomplete 1941W Cisco router configuration

    Good day all.

    I was running a business of small ecommerce for the last 5 years on a Linksys wireless router. Now that I have more than 14 posts and 6 networked printers, it was time to take a step towards the top.

    I bought a 1941W SRI CISCO to take us to the Gigabit speed in the next decade with a CISCO switch. I assume that the 1941W, although robust with scalability, would provide the installation of it, simple as the product Linksys (Cisco) or at least a simple 1-2-3 How to get basic connections made. I was wrong and now I find that I have some difficulty to negotiate Internet on the router again.

    Included below is my config NVRAM. I hope someone could tell where I can have a few gaps in my config.

    Please note: this config is derived from an example on the net that seemed simple enough, so if you find yourself asking, "why did do that?", I hope that this provides the perspective.

    TEST router configuration
    28/07/2010

    Objective: Complete the basic configuration to connect (and ping) to the internet
    Problem: Cannot conect to the internet; Incomplete suspected configuration; Maybe bad config NAT or DNS issue
    Comments: In the process.

    TEXT OF HYPERTERMINAL CONNECTION TO THE CONSOLE:

    User access audit

    User name: admin
    Password:

    TESTROUTER > activate
    Password:
    TESTROUTER #ping 8.8.8.8

    Type to abort escape sequence.
    Send 5, echoes ICMP 100 bytes to 8.8.8.8, time-out is 2 seconds:
    .....
    Success rate is 0% (0/5)

    TESTROUTER #show config
    With the help of 2615 off 262136 bytes
    !
    ! 01:33:34 CST configuration was last modified Thursday, July 29, 2010 by admin
    !
    version 15.0
    no service button
    tcp KeepAlive-component snap-in service
    a tcp-KeepAlive-quick service
    horodateurs service debug datetime msec show-time zone
    horodateurs service log datetime msec show-time zone
    encryption password service
    !
    hostname TESTROUTER
    !
    boot-start-marker
    boot-end-marker
    !
    logging buffered 16000
    recording console critical
    enable secret 5 XXXXXXXXXXXXXXXXXXXXXXXXXX
    enable password 7 XXXXXXXXXXXXXXXX
    !
    AAA new-model
    !
    !
    AAA authentication login default local
    the AAA authentication enable default
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    iomem 10 memory size
    clock timezone CST - 6
    Service-module wlan-ap 0 autonomous bootimage
    !
    No ipv6 cef
    no ip source route
    inaccessible 2000 IP icmp rate-limit
    IP icmp rate-limit unreachable DF 2000
    IP cef
    !
    !
    !
    !
    no ip bootp Server
    no ip domain search
    8.8.8.8 IP name-server
    IP-server names 8.8.4.4
    name of the IP-server 209.18.47.61
    name of the IP-server 209.18.47.62
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    license udi pid CISCO1941W-A/K9 sn XXXXXXXXXXX
    ISM HW-module 0
    !
    !
    !
    admin password username 7 XXXXXXXXXXXX
    !
    !
    !
    !
    !
    !
    interface GigabitEthernet0/Wlan-0
    Description interface connecting to the AP the switch embedded internal
    Shutdown
    !
    interface GigabitEthernet0/0
    Description of connection to the internet to transfer Ethernet/fiber TWC (ISP)
    address IP AA. BB. CC.149 255.255.255.0
    IP access-group 115 to
    no ip unreachable
    no ip proxy-arp
    NAT outside IP
    IP virtual-reassembly
    no ip-cache cef route
    no ip route cache
    automatic duplex
    automatic speed
    No cdp enable
    !
    wlan-ap0 interface
    description of the Service interface module to manage the embedded AP
    no ip address
    ARP timeout 0
    No mop enabled
    No mop sysid
    !
    interface GigabitEthernet0/1
    Internal description of the connection to the local network
    IP 10.10.10.1 255.255.255.0
    IP access-group 116 to
    no ip proxy-arp
    IP nat inside
    IP virtual-reassembly
    no ip-cache cef route
    no ip route cache
    automatic duplex
    automatic speed
    No cdp enable
    No mop enabled
    !
    interface Vlan1
    no ip address
    Shutdown
    !
    IP forward-Protocol ND
    !
    no ip address of the http server
    no ip http secure server
    !
    IP nat inside source list 1 interface GigabitEthernet0/0 overload
    IP route 0.0.0.0 0.0.0.0 AA. ABM CC.1
    IP route 0.0.0.0 0.0.0.0 GigabitEthernet0/0
    !
    access-list 1 permit 0.0.0.0 255.255.255.0
    access-list 115 deny ip 127.0.0.0 0.255.255.255 everything
    !
    not run cdp

    !
    !
    control plan
    !
    !
    Line con 0
    line to 0
    line 67
    no activation-character
    No exec
    preferred no transport
    transport of entry all
    transport output pad rlogin lapb - your MOP v120 udptn ssh telnet
    line vty 0 4
    password 7 XXXXXXXXXXXXXX
    !
    Scheduler allocate 20000 1000
    end

    TESTROUTER #.

    END OF HYPERTERMIAL TO THE TEXT OF THE CONSOLE

    Thanks in advance to those who consider a response.

    Daniel

    Daniel

    You have a LCD 115 on the external interface and it is just a line in this acl which is a refusal. Be aware that an acl has implicit deny all the end anyway so basically that this acl blocking all incoming which responses return icmp (ping) traffic. Because you run the command ping to the router using an IP address not not a DNS then NAT or DNS name is a problem at present.

    I suggest that rewrite you the acl - 115

    access-list 115 permit icmp host 8.8.8.8 entire echo response

    and test again with your ping. If it works then it's the acl that is the problem and you need to write your acl so that is what you want to allow before that you want to deny.

    Jon

  • RADIUS server two in 1 Cisco router

    Hello

    Just need to know if it is possible to use two RADIUS server in 1 Cisco router. The first server RADIUS authenticate remote users to access our internal LAN while the other RADIUS server will authenticate users who will have access to routers. The reason why we cannot use the same RADIUS server to authenticate remote users and users of router is due to our contract with our supplier (long story!).

    in any case, if it's possible, could someone help me how to do or give me the link to the documentation.

    Thank you

    Yes, it's the way to do it.  This gives you two different methods, the user.

    connection key radius-server 1.1.1.1

    RADIUS - 2.2.2.2 key server logon

    3.3.3.3 RADIUS server remote key

    4.4.4.4 RADIUS server remote key

    RADIUS AAA server telnet protocol group

    Server 1.1.1.1

    2.2.2.2 Server

    AAA-server group remoteaccess radius Protocol

    3.3.3.3 Server

    Server 4.4.4.4

    AAA authentication login default group remoteaccess

    AAA authentication connection group telnet

    line vty 0 4

    SUCH connection authentication

    Line con 0

    authentication of SUCH loging

    This is an example which will allow your access telnet to the router to use a server group

    while allowing your users to remote access use other radius servers.

    -Jesse

  • Impossible to establish a VPN connection with a router configured as a Cisco server using client VPN 5.0.00.0340

    Hei guys,.

    Please help me on this one because I'm stuck enough on her...

    I am trying to connect to a Cisco 3700 router configured as a VPN server by using a VPN client and the VPN connection does not settle.

    This is an extract from the log:

    130 12:48:30.585 07/01/11 Sev = Info/5 IKE / 0 x 63000001
    Peer supports XAUTH
    131 12:48:30.585 07/01/11 Sev = WARNING/3 IKE/0xE3000057
    The HASH payload received cannot be verified
    132 12:48:30.600 07/01/11 Sev = WARNING/2 IKE/0xE300007E
    Failed the hash check... may be configured with password invalid group.
    133 12:48:30.600 07/01/11 Sev = WARNING/2 IKE/0xE300009B
    Impossible to authenticate peers (Navigator: 904)
    134 12:48:30.600 07/01/11 Sev = Info/4 IKE / 0 x 63000013
    SEND to > ISAKMP OAK INFO (NOTIFY: INVALID_HASH_INFO) for 200.100.50.173

    I enclose the whole journal extract... The message "BOLD" is quite obvious, you mean, but I'm 100% sure, in the login entry, I typed correctly the group password: pass

    My topology is very basic, as I am setting this up only to get a clue of the operation of the Cisco VPN. It is built in GNS3:
    -2 3700 routers: one of them holds the configuration of the VPN server and the other would be the ISP through which the remote worker would try to establish a VPN connection. I am also attaching the configuration file for the router configured as a VPN router.

    Behind the second router there is a virtual XP machine on which I have installed VPN client...

    My connection entry in the customer is to have the following parameters:
    Host: 200.100.50.173 , //which is the IP address of the VPNServer
    Authentication-> authentication-> name group: grup1 password: pass / / I'm quite positive that I typed the correct password... even if the log messages are linked to a misidentification.

    I use public addresses only, because I noticed there is a question about behind the NAT VPN connections and is not not very familiar to the NAT.

    Another aspect which can be of any importance is that "allow Tunneling of Transport" in the tab Transport to the input connection is disabled

    and the VPNServer router logs the following error message when you try to establish the connection:

    * 01:08:47.147 Mar 1: % CRYPTO-6-IKMP_NOT_ENCRYPTED: IKE 200.100.50.34 package was not encrypted and it should have been.
    * 01:08:47.151 Mar 1: % CRYPTO-6-IKMP_NOT_ENCRYPTED: IKE 200.100.50.34 package was not encrypted and it should have been.

    You have no idea why I can't connect? Y at - it something wrong with my configuration of VPN server... or with the connection entry in the VPN client?

    Thank you

    Iulia

    Depending on the configuration of the router, the group name is grup1 and the password is baby.

    You also lack the ipsec processing game that you would need to apply to the dynamic map.

    Here is an example configuration for your reference:

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a0080235197.shtml

    Hope that helps.

  • Controller of domain and DNS behind RRAS without VPN connected directly to the internet with a Cisco router

    I hava a ME Cisco 3400 with physical single port available for a cable connection.

    The ISP give me an IP address interface = 89.120.29.89 to act as a gateway to the IP Address of the host, which is provided for in the order 89.120.29.90.

    The host computer is a dual Xeon computer with two NICs for LAN and WAN.

    Fields of application: to install a windows 2008 R2 between public and private network server.

    Even though I know it's not recomanded, I put the DNS role and directories Active Directory roles installed on the same computer, the computer above, (I do not have enough computer for roles different place on different computers)

    The desired configuration:

    To have installed with his roles behind a WS2008R2 has RRAS. without a VPN.

    b with VPN

    and for WAN access for the client computers of the private LAN Windows 7 OS. (The basin of LAN address 192.168.0.1 - 255).

    First step : to have internet access in the browser (I use Google chrome) (without taking into account the DNS and AD)

    Network configuration:

    Map NETWORK WAN, at the top of the stack of liaison in the Control Panel/network connections and sharing:

    Host IP: 89.120.29.90

    Mask: 255.255.255.252

    Gateway: 89.120.29.89

    DNS: 193.231.100.130 my ISP name server address.

    OK, I can browse the internet.

    Second stage. (Consider DNS and Active Directories)

    DNS instaled role for this computer.

    AD installed as a global catalog.

    NETWORK WAN server that is directly connected to the Cisco router:

    Conection area 3

    Properties:

    Client for Microsoft Netwaork: not verified

    Network Load Balancing: not verified

    File and shared printer: not verified

    QoSPacketScheduler: not verified;

    Microsoft Network Monitor 3 pilot: not verified

    IPv4                                                     ;  checked

    Pilot a Link Layer Topology Mapper i/o: checked

    Link layer Discover responder: checked

    IPv4 tab

    Host IP: 89.120.29.90

    Mask: 255.255.255.252

    Gateway: 89.120.29.89

    DNS: 193.231.100.130 my ISP name server address.

    under the tab advanced

    IP settings : even that, tab IPV4 with automatic metric check;

    DNS tab :

    Add primary and connection suffixes DNS specific: not verified

    Add suffixes primary DNS suffixes parents: not verified

    Add this DNS suffixes: no

    Registry deals with this connection in DNS: not verified;

    Use this connection DNS suffix in DNS registration: not verified;

    WINS tab : enable search LMHOST: not verified

    Enable NetBios over TCP IP: don't check;

    Disable NetBios on TCP IP: checked;

    Connection to the local network 2

    Properties :

    Client for Microsoft Netwaork: checked

    Network Load Balancing: no

    File and shared printer: checked

    QoS Packet Scheduler: not verified;

    Microsoft Network Monitor 3 pilot: not verified

    IPv4 checked

    Pilot a Link Layer Topology Mapper i/o: checked

    Link layer Discover responder: checked

    IPv4 tab

    NETWORK LAN CARD: 192.168.0.101

    Mask: 255.255.255.0

    Gateway: 192.168.0.1

    under Advanced tab:

    IP settings : even that, tab IPV4 with automatic metric check;

    DNS tab :

    Add primary and connection suffixes DNS specific: checked

    Add suffixes primary DNS suffixes parents: not verified

    Add this DNS suffixes: no

    Registry deals with this connection in DNS: checked;

    Use this connection DNS suffix in DNS registration: checked;

    WINS tab : enable search LMHOST: not verified

    Enable NetBios over TCP IP: check;

    Disable NetBios on TCP IP: not verified;

    Install RRAS as NAT (NAT) under any condition imposed by DHCP(not installed) in ideea that RRAS will generate the private IP address of the DHCP allocator.

    In any case, for the beginning, I have a fix IP, do not get IP automatically.

    At this point, it gets the configuration simple posible for RRAS follows:

    3, LAN connection that corespond to the WAN interface IP:

    "NAT configured for the following Internet interface: Local Area Connection 3.
    The clients on the local network will assign the IP addresses of the following range:

    network address: 192.168.0.0. netmask 255.255.0.0.

    After Windows RRAS are open:

    The Network Interfaces tab:

    NICs are enabled and connected;

    UAL remotely & policies:

    Launch NPS,

    on the NPS server tab:

    Allow access to successful Active Directory directories:

    Properties: authentication: port 1812,1645

    kept port 1813,1646;

    on the accounting tab: nothing;

    under NPS policies:

    Grant permission for the RRAS server under builin\Administrator of the accounts;

    On strategy and the type of server unspecified (NAT do not exist as an entry in the drop-down list server dwn)

    under the static road: nothing;

    under the IPv4 tab or both are there(there IP) and are up

    under NAT

    Connection to the local network 3: public interface connected to the internet

    enable NAT on this interface:

    under the address pool: ISP addresses public;(two addresses)

    under the terms of service and the ports: Web server: http 80.

    (I have I have a static IP address for the client computer in mind, I set up a single customer).

    At the client computer :

    configured as domain customer and added to the users AD and computer AD

    logon to the domain:

    Local Area Connection

    Properties:

    Client for Microsoft Netwaork: checked

    Network Load Balancing: not verified

    File sharing and printer: checked

    QoS Packet Scheduler: checked;

    Microsoft Network Monitor 3 pilot: not verified

    IPv4                                                     ;  checked

    Pilot a Link Layer Topology Mapper i/o: checked

    Link layer Discover responder: checked

    IPv4 tab

    Host IP: 192.168.0.101

    Mask: 255.255.0.0

    Gateway: 192.168.0.1

    DNS: (auto-add the same to the local machine).

    under the tab advanced

    IP settings : even that, tab IPV4 with automatic metric check;

    DNS tab :

    Add primary and connection suffixes DNS specific: checked

    Add suffixes primary DNS suffixes parents: not verified

    Add this DNS suffixes: no

    Registry deals with this connection in DNS: checked;

    Use this connection DNS suffix in DNS registration: checked;

    WINS tab : enable search LMHOST: not verified

    Enable NetBios over TCP IP: checked;

    Disable NetBios on TCP IP: not verified;

    right now the 192.168.0.101 client cannot connect to internet through RRAS.

    ;

    This issue is beyond the scope of this site and must be placed on Technet or MSDN

    http://social.technet.Microsoft.com/forums/en-us/home

    http://social.msdn.Microsoft.com/forums/en-us/home

  • No network on computer - 2 routers, 1 no CISCO router.

    Hi guys!

    I hope someone can help me with that.
    First some information about what material I got.
    I got a Cisco 860VAE router, I didn't get no cable from the console (so I'm connected to telnet), I got a home router also (got it from my ISP).

    I use my router I have of my TV service provider, so I can't remove it just... boring...
    I was getting the Cisco router because I am a Cisco CCNA student at my school (first year) and I thought it might be cool to NetFlow

    The router I got from my ISP is quite advanced so not a lot of options here. In any case, it uses the 10.0.0.0/8 range IP
    Then my CISCO router uses the ip range 192.168.1.0/24

    The problem is that I can't connect to the internet from my computer (I know...)

    Let me show you my config(remember I'm NEW) race:

    Current configuration: 2500 bytes
    !
    ! Last configuration change at 18:04:48 UTC Wednesday, January 15, 2014, by admin
    version 15.2
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    router host name
    !
    boot-start-marker
    boot-end-marker
    !
    !
    no set record in buffered memory
    activate tnhtc92DsfdXBhelxjLWJy3243i4ntXrpb4RdfFmfqY secret 4
    !
    No aaa new-model
    WAN ethernet mode
    !
    !
    !
    IP dhcp pool ccp_pool
    import all
    network 192.168.1.0 255.255.255.0
    Server DNS 8.8.8.8 8.8.4.4
    !
    !
    !
    !
    IP flow-cache timeout active 1
    8.8.8.8 IP name-server
    IP-server names 8.8.4.4
    IP cef
    No ipv6 cef
    !
    !
    !
    !
    !
    username admin privilege 15 secret 4 lUgFIkgcrt4SYXMq7jZtxq52lwdfgkj238
    !
    !
    VDSL controller 0
    Shutdown
    !
    !
    !
    !
    !
    interface Loopback0
    IP 11.0.0.1 255.255.255.0
    penetration of the IP stream
    stream IP output
    !
    interface Loopback1
    no ip address
    !
    ATM0 interface
    no ip address
    Shutdown
    No atm ilmi-keepalive
    !
    interface Ethernet0
    no ip address
    penetration of the IP stream
    stream IP output
    Shutdown
    !
    interface FastEthernet0
    no ip address
    !
    interface FastEthernet1
    no ip address
    !
    interface FastEthernet2
    no ip address
    !
    interface FastEthernet3
    switchport access vlan 2
    no ip address
    spanning tree portfast
    !
    interface GigabitEthernet0
    Description $ETH - WAN$
    the IP 10.0.0.1 255.0.0.0
    penetration of the IP stream
    stream IP output
    automatic duplex
    automatic speed
    !
    interface Vlan1
    IP 192.168.1.1 255.255.255.0
    penetration of the IP stream
    stream IP output
    !
    interface Vlan2
    no ip address
    penetration of the IP stream
    stream IP output
    !
    interface Dialer0
    no ip address
    penetration of the IP stream
    stream IP output
    !
    router RIP
    version 2
    10.0.0.0 network
    network 192.168.1.0
    No Auto-resume
    !
    by default-gateway IP 10.0.0.100
    IP forward-Protocol ND
    IP http server
    local IP http authentication
    no ip http secure server
    capture IP stream vlan id
    IP flow-export Vlan1 source
    IP flow-export version 9
    192.168.1.3 IP flow-export destination 9991
    !
    IP route 0.0.0.0 0.0.0.0 10.0.0.100
    IP route 10.0.0.0 255.0.0.0 GigabitEthernet0
    IP route 192.168.1.0 255.255.255.0 Vlan1
    !
    MAC-address-table-aging time 15
    !
    public RW SNMP-server community
    RO SNMP-Server Community public
    Server SNMP ifindex persist
    config SNMP-server enable traps
    public version 2 c SNMP-server host 10.0.0.3
    !
    control plan
    !
    connection of the banner ^ C * CISCO * ^ C
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    exec-timeout 60 0
    Cisco password
    Synchronous recording
    local connection
    transport telnet entry
    !
    Scheduler allocate 1000-60000
    !
    end

    I haven't CHANGED anything!
    Some of it was just conjecture...

    When I try Googles PING DNS(IP: 8.8.8.8) of the router I get
    Send 5, echoes ICMP 100 bytes to 8.8.8.8, time-out is 2 seconds:
    !!!!!
    Success rate is 100 per cent (5/5), round-trip min/avg/max = 36/39/40 ms

    When I try to PING my own computer DNS googles, I get
    Request timed out.
    Request timed out.
    Request timed out.

    My CISCO router ip: 192.168.1.1 (vlan1) 10.0.0.1(gigabitethernet/WAN)
    My ip from the ISP router: 10.0.0.100
    My computer ip: 192.168.1.3 gateway: 192.168.1.1

    Try to do a topology of MY ISP text-> router ISP-> Switch-> CISCO router-> workstation

    It's not like I can configure RIP on my ISP router if... ? And BTW, my cisco router only support RIP as the routing protocol
    Then what should I do?

    You need to configure nat on the Cisco. I'm assuming that the ISP router connects to G0 on the Cisco. The ISP router probably does not know on your subnet 192.168.1.0/24 and you can't nat several subnets in their router anyway. You need to with the Cisco nat address 10.0.0.0/8 on Cisco.

    access-list 100 permit ip 192.168.1.0 0.0.0.255 any

    IP nat inside source list 100 interface g0 overload

    int g0

    NAT outside IP

    int vlan 1

    IP nat inside

    Get rid of these:

    IP route 10.0.0.0 255.0.0.0 GigabitEthernet0

    IP route 192.168.1.0 255.255.255.0 Vlan1

    You don't need them because these two subnets will be seen as connected routes.


    You will also need to add a default router in your dhcp pool:

    IP dhcp pool ccp_pool

    default router 192.168.1.1

    And you can get rid of this line as well:

    by default-gateway IP 10.0.0.100


    HTH,
    John

    Please note all useful messages *.

  • L2TP/ipsec passthrough firewall of cisco router

    Hello! I have the following problem.

    External network users wish to connect internal Windows to network and share resources 2012 (start the software, files, etc)

    So it's time to deploy a vpn server and as I did not have a free license to run on my windows 2012, I decided to use my qnap for it (because it has this built-in feature) so I chose l2tp/ipsec and tested on the laboratory at home with simple tplink router with upnp function and it worked like a charm.

    However, in the real production environment, I need to use the cisco router, and this is how the story begins ;)

    Thus, clients with their machines say (7, 8.1, 10) must pass router cisco (with nat) firewall and access a vpn server and the internal network on qnap.

    I googled for sample configuration, but most of them related to the configuration of the router as a vpn server, and I want to achieve is to make my pass router vpn traffic. Once I found the same sample of pptp config, I have modified it a bit, but do not know if it works because I have not yet tested.

    In any case, could you check my config and see if it's ok? I'm doing a static nat for vpn 192.168.5.253 server to external address?

    Also, here is a short pattern

    vpn client VPN server (win 7,8,10)---routeur cisco 1921 - qnap)

    xxx.194 cloud 5,254 5.253 (internal network)

    test #show runn
    Building configuration...

    Current configuration: 3611 bytes
    !
    ! Last modified at 19:31:01 UTC Wednesday, may 4, 2016 configuration by
    !
    version 15.4
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    encryption password service
    !
    hostname test
    !
    boot-start-marker
    boot-end-marker
    !
    !
    enable secret $5
    !
    No aaa new-model
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    DHCP excluded-address IP 192.168.5.200 192.168.5.254
    DHCP excluded-address IP 192.168.5.1 192.168.5.189
    !
    pool dhcp IP network
    network 192.168.5.0 255.255.255.0
    router by default - 192.168.5.254
    network domain name
    xxx.x.xxx.244 DNS server
    !
    !
    !
    IP domain name temp
    IP cef
    No ipv6 cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    CTS verbose logging
    !
    !
    license udi pid CISCO1921/K9 sn xxxxxx
    licence start-up module c1900 technology-package securityk9
    !
    !
    username secret abc 5
    username privilege 15 7 cisco password
    !
    redundancy
    !
    !
    !
    !
    !
    property intellectual ssh version 2
    !
    type of class-card inspect entire game cm_helpdek_protocols
    http protocol game
    https protocol game
    ssh protocol game
    type of class-card inspect entire game cm_gre_protocols
    Access-group name WILL
    type of class-card inspect entire game cm_icmp
    group-access icmp name game
    type of class-card inspect the correspondence cm_helpdesk
    match the name of group-access helpdesk
    type of class-card inspect entire game inside_to_outside
    h323 Protocol game
    match Protocol pptp
    ftp protocol game
    tcp protocol match
    udp Protocol game
    match icmp Protocol
    !
    type of policy-card inspect pm_outside_to_inside
    class type inspect cm_gre_protocols
    Pass
    class type inspect cm_icmp
    inspect
    class type inspect cm_helpdesk
    inspect
    class class by default
    Drop newspaper
    type of policy-card inspect pm_inside_to_outside
    class type inspect inside_to_outside
    inspect
    class type inspect cm_gre_protocols
    Pass
    class class by default
    Drop newspaper
    !
    area inside security
    Description inside the zone of confidence
    security of the outside area
    Outside the untrusted area description
    source of zonep_insiede_to_outside security pair area inside the destination outside
    type of service-strategy inspect pm_inside_to_outside
    source of zonep_outside_to_inside security zone-pair outside the destination inside
    type of service-strategy inspect pm_outside_to_inside
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    Shutdown
    !
    interface GigabitEthernet0/0
    Description 'LAN '.
    IP 192.168.5.254 255.255.255.0
    IP nat inside
    IP virtual-reassembly in
    security of the inside members area
    automatic duplex
    automatic speed
    !
    interface GigabitEthernet0/1
    Description "WAN CID: xxxxx".
    IP address xxx.xxx.xxx.194 255.255.255.252
    NAT outside IP
    IP virtual-reassembly in
    security of the outside Member area
    automatic duplex
    automatic speed
    !
    IP forward-Protocol ND
    !
    IP http server
    local IP http authentication
    no ip http secure server
    !
    IP nat pool network xxx.xxx.xxx.201 xxx.xxx.xxx.201 netmask 255.255.255.248
    IP nat inside source list 1 pool overload the network
    IP route 0.0.0.0 0.0.0.0 xxx.xxx.xxx.193
    !
    GRE extended IP access list
    Note ACL to allow ACCORD of PPTP OUTBOUND
    allow a gre
    permit any any eq udp 1701
    allow udp any any eq isakmp
    permit any any eq non500-isakmp udp
    helpdesk extended IP access list
    IP enable any host 192.168.5.253
    icmp extended IP access list
    allow icmp any host 192.168.5.253
    !
    !
    !
    access-list 1 permit 192.168.5.0 0.0.0.255
    !
    control plan
    !
    !
    !
    Line con 0
    local connection
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport output pad telnet, rlogin xxxxx
    StopBits 1
    line vty 0 4
    local connection
    transport input telnet ssh
    !
    Scheduler allocate 20000 1000
    !
    end

    Kind regards

    Andrew

    Once the client has been connected to the VPN, you want traffic back to flow to the client. Which can be easily received with "inspect".

    And from the point of view of the firewall, you do not have ESP-traffic (which would be the IP/50). You have only UDP traffic (initially UDP/500 which goes into UDP/4500)

    And you are right with your last ACE. That of a lot to permissive and not necessary for this function.

  • NPS Windows Help for authentication of aaa for Cisco router - is it safe?

    I am very confused about how all this works and was hoping someone could help me.

    I followed a bunch of tutorials online for authentication RADIUS of installation on a Cisco router and he did to a NPS Windows Server. Now I can ssh into the router my AD account.

    Now that I got it to work, I go to the settings to make sure everything is secure.

    On my router, the config is pretty simple:

    aaa new-modelaaa group server radius WINDOWS_NPSserver-private 123.123.123.123 auth-port 1812 acct-port 1813 key mykeyaaa authentication login default local group WINDOWS_NPS
    
    ip domain-name MyDomcrypto key generate rsa
    
    (under vty and console)# login authentication default
    On the NPS Windows:
    • I created a new RADIUS client for the router.
    • Created a secret shared and specified Cisco as the name of the seller.
    • Created a new strategy of network with my desired conditions.
    • And now the frame of the configuration of the network policy that worries me:
    
    
    So initially I thought my AD credentials were being sent over the wire in plain text, but I did a capture and saw this:
    
    
    
    How is my password being encrypted and how strong is the encryption?
    
    Another thing is how can I configure aaa authentication with mschapv2? The documentation I saw for mschapv2 uses the "ppp authentication ms-chap-v2" command, but I'm not using ppp I'm using aaa with a radius server.
     
    

    Hello

    RADIUS encrypts the password, but sends the username in clear. GANYMEDE encrypts the user name and password.

    You can find the encryption used by RADIUS in the RFC scheme:

    https://Tools.ietf.org/html/rfc2865#page-27

    MS-Chap-V2 is used for the authentication of users such as the remote access and vpn, not management switch

    Thank you

    John

  • Client VPN Cisco router Cisco, MSW CA + certificates

    Dear Sirs,
    Let me approach you on the following problem.

    I wanted to use a secure between the Cisco VPN client connection
    (Windows XP) and Cisco 2821 with certificate-based authentication.
    I used the Microsoft certification authority (Windows 2003 server).
    Cisco VPN client used eTokenPRO Aladdin as a certificate store.

    Certificate of MSW CA registration and implementation in eToken ran OK
    Customer VPN Cisco doesn't have a problem with the cooperation of eToken.
    Certificate of registration of Cisco2821 MSW ca ran okay too.

    Cisco 2821 configuration is standard. IOS version 12.4 (6).

    Attempt to connect to the client VPN Cisco on Cisco 2821 was
    last update of the error messages:

    ISAKMP: (1020): cannot get router cert or routerdoes do not have a cert: had to find DN!
    ISAKMP: (1020): ITS been RSA signature authentication more XAUTH using id ID_FQDN type
    ISAKMP (1020): payload ID
    next payload: 6
    type: 2
    FULL domain name: cisco - ca.firm.com
    Protocol: 17
    Port: 500
    Length: 25
    ISAKMP: (1020): the total payload length: 25
    ISAKMP (1020): no cert string to send to peers
    ISAKMP (1020): peer not specified not issuing and none found appropriate profile
    ISAKMP (1020): Action of WSF returned the error: 2
    ISAKMP: (1020): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    ISAKMP: (1020): former State = new State IKE_R_MM5 = IKE_P1_COMPLETE

    Is there some refence where is possible to find some information on
    This problem? There is someone who knows how to understand these mistakes?
    Thank you very much for your help.

    Best regards
    P.Sonenberk

    PS Some useful information for people who are interested in the above problem.

    Address IP of Cisco 2821 10.1.1.220, client VPN IP address is 10.1.1.133.
    MSW's IP 10.1.1.50.
    Important parts of the Cisco 2821 configuration:

    !
    cisco-ca hostname
    !
    ................
    AAA new-model
    !
    AAA authentication login default local
    AAA authentication login sdm_vpn_xauth_ml_1 local
    AAA authorization exec default local
    AAA authorization sdm_vpn_group_ml_1 LAN
    !
    ...............
    IP domain name firm.com
    host IP company-cu 10.1.1.50
    host to IP cisco-vpn1 10.1.1.133
    name of the IP-server 10.1.1.33
    !
    Authenticated MultiLink bundle-name Panel
    !
    Crypto pki trustpoint TP-self-signed-4097309259
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 4097309259
    revocation checking no
    rsakeypair TP-self-signed-4097309259
    !
    Crypto pki trustpoint company-cu
    registration mode ra
    Enrollment url http://10.1.1.50:80/certsrv/mscep/mscep.dll
    use of ike
    Serial number no
    IP address no
    password 7 005C31272503535729701A1B5E40523647
    revocation checking no
    !
    TP-self-signed-4097309259 crypto pki certificate chain
    certificate self-signed 01
    30820249 308201B 2 A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
    .............
    FEDDCCEA 8FD14836 24CDD736 34
    quit smoking
    company-cu pki encryption certificate chain
    certificate 1150A66F000100000013
    30820509 308203F1 A0030201 02020 HAS 11 092A 8648 01000000 13300 06 50A66F00
    ...............
    9E417C44 2062BFD5 F4FB9C0B AA
    quit smoking
    certificate ca 51BAC7C822D1F6A3469D1ADC32D0EB8C
    30820489 30820371 A0030201 BAC7C822 02021051 D1F6A346 9D1ADC32 D0EB8C30
    ...............
    C379F382 36E0A54E 0A6278A7 46
    quit smoking
    !
    ...................
    crypto ISAKMP policy 30
    BA 3des
    md5 hash
    authentication rsa-BA
    Group 2
    ISAKMP crypto identity hostname
    !
    Configuration group customer isakmp crypto Group159
    key Key159Key
    pool SDM_POOL_1
    ACL 100
    !
    the crypto isakmp client configuration group them
    domain firm.com
    pool SDM_POOL_1
    ACL 100
    !
    Crypto ipsec transform-set esp-3des esp-md5-hmac 3DES-MD5
    !
    crypto dynamic-map SDM_DYNMAP_1 1
    the transform-set 3DES-MD5 value
    market arriere-route
    !
    card crypto SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
    map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1 crypto
    client configuration address map SDM_CMAP_1 crypto answer
    map SDM_CMAP_1 65535-isakmp dynamic SDM_DYNMAP_1 ipsec crypto
    !
    ................
    !
    end

    status company-cu of Cisco-ca #show cryptographic pki trustpoints
    Trustpoint company-cu:
    Issuing CA certificate configured:
    Name of the object:
    CN = firm-cu, dc = company, dc = local
    Fingerprint MD5: 5026582F 8CF455F8 56151047 2FFAC0D6
    Fingerprint SHA1: 47B 74974 7C85EA48 760516DE AAC84C5D 4427E829
    Universal router configured certificate:
    Name of the object:
    host name = cisco - ca.firm.com
    Fingerprint MD5: E78702ED 47D5D36F B732CC4C BA97A4ED
    Fingerprint SHA1: 78DEAE7E ACC12F15 1DFB4EB8 7FC DC6F3B7E 00138
    State:
    Generated keys... Yes (general purpose, not exportable)
    Authenticated issuing certification authority... Yes
    Request certificate (s)... Yes

    Cisco-ca #sh crypto pubkey-door-key rsa
    Code: M - configured manually, C - excerpt from certificate

    Name of code use IP-address/VRF Keyring
    C Signature name of X.500 DN default:
    CN = firm-cu
    DC = company
    DC = local

    C signature by default cisco-vpn1

    IMPORTANT: I don't have a Cisco IOS Software: 12.4 (5), 12.3 (11) T08, 12.4 (4.7) PI03c,.
    12.4 (4.7) T - there is error in the cryptographic module.

    Hey guys, it's weird that the router is not find cert after IKE is the cert and validates, it is certainly not reason, but I would go ahead and set up the mapping of certificate on this router to force the client to associate with Group of IKE, for that matter, that you need to change your config a bit for use iskamp profiles :

    http://www.Cisco.com/en/us/docs/iOS/12_3t/12_3t8/feature/guide/gt_isakp.html

  • Multiple VPN connections using 871 router

    Hello

    I have the cisco router 871 at the site of the retail that connects to the corporate site. I also want to connect a device to the sharing network partner, but it needs to connect to their virtual private network.  Is it possible to configure the 2 VPN connection to 2 different company sites in this scenario?

    Thanks for your help.

    Umesh.

    Hello

    You can configure multiple VPN tunnels on the router (whether on the same interface or different interfaces).

    You can then perform the traffic from a tunnel in another tunnel, if you must do the same.

    Federico.

  • Need some advice about the VPN between local Cisco router and remote Watchguard

    Hi all

    I am configuring a Cisco 887 to VPN router to a device of watchguard at the remote site.

    From what I understand, the VPN tunnel is in PLACE. I can ping to the remote server on the 192.168.110.0 of the network, but whenever I try to navigate to it on the local server, it wouldn't work.

    I ping the remote server via the IP address on the local server, but not on the Cisco router. Is - will this work as expected?

    --------------------------------------------------------------------------------------

    R5Router #sh crypto isakmp his

    IPv4 Crypto ISAKMP Security Association

    DST CBC conn-State id

    110.142.127.237 122.3.112.10 QM_IDLE 2045 ACTIVE

    IPv6 Crypto ISAKMP Security Association

    --------------------------------------------------------------------------------------

    R5Router #sh encryption session

    Current state of the session crypto

    Interface: Virtual-Access2

    The session state: down

    Peer: 122.3.112.10 port 500

    FLOW IPSEC: allowed ip 192.168.0.0/255.255.255.0 192.168.110.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed 1 192.168.0.0/255.255.255.0 192.168.110.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed 6 192.168.0.0/255.255.255.0 192.168.110.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 122.3.112.10 192.168.0.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    Interface: Dialer0

    The session state: UP-ACTIVE

    Peer: 122.3.112.10 port 500

    IKEv1 SA: local 110.142.127.237/500 remote 122.3.112.10/500 Active

    FLOW IPSEC: allowed ip 192.168.0.0/255.255.255.0 192.168.110.0/255.255.255.0

    Active sAs: 2, origin: card crypto

    FLOW IPSEC: allowed 1 192.168.0.0/255.255.255.0 192.168.110.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed 6 192.168.0.0/255.255.255.0 192.168.110.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 122.3.112.10 192.168.0.0/255.255.255.0

    Active sAs: 0, origin: card crypto

    Crypto ACL 102, should really include only 1 line, that is to say:

    10 permit ip 192.168.0.0 0.0.0.255 192.168.110.0 0.0.0.255

    and you should have the image mirror on the remote end ACL line too.

    PLS, remove the remaining lines on 102 ACL ACL.

    I guess that the ACL 101 is NAT exemption, if it is pls include "deny ip 192.168.0.0 0.0.0.255 192.168.110.0 0.0.0.255" on top of your current line "license".

    Clear the tunnels as well as the NAT translation table after the changes described above.

  • I'd like to find the password for my Cisco router

    I can't connect to my network wirelessly on my ereader, because I don't know what is the password when asked.

    Read the manual for the device (Cisco router) should tell you what the password by default is to manage the router (if this does not work... it should tell you how to configure the default router, so you can use the default password to reconfigure) so you can go and change the password to access wireless to something You know.

  • Cisco router linksys e1000 wireless

    a friend of my sister bought a cisco router (see the above subject line). Unfortunately, I was not home at the same time. Currently, there are a desktop wired to the router and a laptop with a Wi - Fi connection. The person who set up the router I forgot the username and the password of the router (didn't even bother to write this info). I convey my computer laptop home from work where I had a connection to internet/router. My laptop (Dell classroom business), I can see the two connections without wire (secured and unsecured comments). When I try to connect to the secure connection I do not get any screen of security, connection, etc., guests. He said something like 'try to check the security info' - do not remember the exact verbage. Anyway, I can not connect. The signal strength is strong - the bars are green. Can connect to the connection of comments, I am not always invited for any connection and safety info. Run the ipconfig/all command confirms the connection. I have still no internet access. Don't know why, but the signal strength readings 'poor' - a single green bar (while the secure connection shows all the force green signal bars). I have installed / configured several wireless - never had a problem.  I need to recover the connection info router without having to perform a hard reset on the router (I have same access limitted in my house of sisters/partners where the router). Is there a way to do it. I spoke twice to the cisco technical support and received two different answers (not according to the first call, open Explorer, go to programs/cisco for the info). This must be done on the computer that was used to install the cisco installation disc). Help, please!

    There are a lot of things I want to share with you on your router E1000 installation:

    1 E1000 comes with an installation CD that has CIsco Connect (the icon looks like a house) to easily manage your wireless network (you can easily get your password for the Cisco connection). Cisco Connect (CCC) is generally accessible to the computer that is first used to install the router (maybe this is why the tech officer ask you to go to the computer used to install this)

    2 E1000 broadcasts 2 signals of the main network and - network of comments. Once you click on the name of the network, you can easily connect the guest network seems to be unsecured However, when you access a Web site you will be asked a password. Always secure line.

    3. you can actually access to internet but not wireless cable but to the router.

    4. If you don't have the computer used to install the router, you must reconfigure and the first thing to do is to reset the router. You must configure manually if you do not have the installation cd.

    You can try these links:

    Setting up a Linksys router for DSL Internet connection

    Setting up a router with cable Internet Service

  • PowerConnect 6248 switch for Cisco router

    Hello

    I'm new to this forum and I have a problem at the moment between a Cisco router and a dell pc6248. The problem is that I lost conectivity in VLAN 1 when I connect the router to a trunk port in the switch, however I conectivity VLAN 2 through this link to trunk. The configuration of the switch:

    interface ethernet 1/g48

    switchport mode trunk

    switchport trunk allowed vlan add 1-2

    output

    interface ethernet 1/g43

    switchport mode access

    switchport access vlan 2

    output

    On router

    fast interface 0/1

    no ip address

    no downtime

    fast interface 0/1.1

    encapsulation dot1q 1 native

    IP 192.200.3.1 255.255.255.0

    fast interface 0/1.2

    encapsulation dot1q 2

    IP 192.168.51.33 255.255.255.248

    output

    With the above configuration, I lost conectivity with the host in the vlan 1 - 192.200.3.x/24, but I win conectivity VLAN 2, when I connect the router to the 48 trunk port in the switch. This means that the trunk link for VLAN 2 work but not for VLAN 1.

    I read on the port of general mode, where I can configure the pvid of the port as 1 (vlan1) and it would be the unttag VLAN (even natively in Cisco), and I can configure the VLAN 2 like the tag, all this in the same port. What do you think about this? Someone have set up something like that?

    Best regards

    Erasmo

    PD: I write from Chile, I apologize for my English.

    I agree with you, I would try the general mode on the PowerConnect switch.

    mode console # switchport general

    Console # switchport General allowed vlan add 2 tag

    Console # switchport pvid General 1

    Keep us updated.

  • Cisco router 892 IPSec initiator?

    Hi all!

    I have the IPSec tunnel between Cisco router 892 (c890-universalk9 - mz.154 - 3.M4.bin) and Cisco PIX 515E (ver. 8.0 (4) 28) with 5 subnets behind PIX.

    PIX configured to deal with two-way-type of connection, but router support not =)

    So, when I generate intresting hosts behind the router traffic IPSec does not work. When I generate traffic hosts behind PIX , everything works, but I need to be initiator on the side of the router :-(

    Is there a way to make my initiator 892 tunnel Cisco IPSec router to work with Cisco PIX / ASA?

    I'm afraid I should replace the router to another device = (())

    Thank you!

    Hi Yura Kazakevich,

    Try to enable pfs on the router:

    map SDM_CMAP_1 1 ipsec-isakmp crypto

    Set of pfs

    Hope this info helps!

    Note If you help!

    -JP-

Maybe you are looking for