User manual
Global Configuration Commands
5-35
RFSwitch(config-crypto-group)#dns 10.1.1.1
RFSwitch(config-crypto-group)#wins 10.1.1.1
5. Specify the authentication type.
RFSwitch(config)# aaa vpn-authentication local
RFSwitch(config)# local username harry password symbol123
6. Create a transform set.
RFSwitch(config)#crypto ipsec transform-set windows esp-3des
esp-sha-hmac
RFSwitch(config-crypto-ipsec)#mode transport
7. Specify a dynamic crypto map.
RFSwitch(config)#crypto map TestMap 30 ipsec-isakmp dynamic
RFSwitch(config-crypto-map)#set peer 0.0.0.0
RFSwitch(config-crypto-map)#match address 101
RFSwitch(config-crypto-map)#set transformset windows
RFSwitch(config-crypto-map)#set remote-type ipsec-l2tp
8. Apply the crypto map to interface vlan2.
RFSwitch(config)#interface vlan2
RFSwitch(config-if)cryto map TestMap
9. Upon a successful connection, the XP client will obtain a virtual IP address.
5.1.8.2 Use Case 2: Configuring Site-to-Site VPN
Intranets use unregistered addresses connected over the public internet by site-to-site
VPN. In this scenario, NAT is required for the connections to the public internet. However
NAT is not required for traffic between the two intranets, which can be transmitted using
a VPN tunnel over the public Internet.
The site-to-site VPN allows branch office mobility controllers to connect back to the
central office using a secure, encrypted tunnel, for all site-to-site traffic. This allows a