This example is where Cisco routers, in this example Cisco 831 and Cisco 837 routers, are on remote sites and connection to a main site which has a NetScreen 5XT firewall.
Cisco 831/837 router VPN Configuration.
crypto keyring merope
pre-shared-key address <<NetScreen untrust ip address>> key <<key>>
!
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp identity hostname
crypto isakmp profile vpn-connection
description VPN Connection to Main Site
keyring merope
self-identity user-fqdn <<hostname>>@<<domain name>>
match identity address <<NetScreen untrust ip address>> 255.255.255.255
initiate mode aggressive
!
!
crypto ipsec transform-set crypto-set esp-3des esp-md5-hmac
!
crypto map vpn 10 ipsec-isakmp
set peer <<NetScreen untrust ip address>>
set transform-set crypto-set
set pfs group2
set isakmp-profile vpn-connection
match address VPN-ACL
!
ip access-list extended VPN-ACL
remark VPN Encryption with Main Site
permit ip <<local IP Range>> 0.0.0.255 <<Remote IP Range>> 0.0.0.255
!
interface <<External Interface>>
crypto map vpn
NetScreen 5XT Configuration.
(mind the line breaks)
set address "Untrust" "<<Remote IP Range>>/255.255.255.0" <<Remote IP Range>> 255.255.255.0 "Remote Site VPN" set ike gateway "<<remote-hostname>>" address 0.0.0.0 id "<<remote-hostname>>@<<domain name>>" \ Aggr outgoing-interface "ethernet3" preshare "<<key>>" proposal "pre-g2-3des-md5" unset ike gateway "<<remote-hostname>>" nat-traversal set vpn "<<remote-hostname>>" gateway "<<remote-hostname>>" replay tunnel idletime 0 proposal \ "g2-esp-3des-md5" set policy id 9 name "<<remote-hostname>>" from "Untrust" to "home" "<<Remote IP Range>>/255.255.255.0" \ "<<Local IP Range>>/255.255.255.0" "ANY" tunnel vpn "<<remote-hostname>>" id 6 pair-policy 8 set policy id 8 name "<<remote-hostname>>" from "home" to "Untrust" "<<Local IP Range>>/255.255.255.0" \ "<<Remote IP Range>>/255.255.255.0" "ANY" tunnel vpn "<<remote-hostname>>" id 6 pair-policy 9
No page links to NetscreenToCiscoVPN.