© Microhard Systems Inc. 191
Appendix E: VPN Example
Step 4 (continued…)
Step 5
ASA 5505 configuration using command line interface.
object network NETWORK_OBJ_192.168.0.0_24
subnet 192.168.0.0 255.255.255.0
access-list outside_cryptomap_1 line 1 extended permit ip 192.168.30.0 255.255.255.0
192.168.0.0 255.255.255.0
group-policy GroupPolicy_173.181.197.156 internal
group-policy GroupPolicy_173.181.197.156 attributes
vpn-tunnel-protocol ikev1
exit
tunnel-group 173.181.197.156 type ipsec-l2l
tunnel-group 173.181.197.156 general-attributes
default-group-policy GroupPolicy_173.181.197.156
tunnel-group 173.181.197.156 ipsec-attributes
ikev1 pre-shared-key **********
isakmp keepalive threshold 10 retry 2
crypto map outside_map 2 match address outside_cryptomap_1
crypto map outside_map 2 set peer 173.181.197.156
crypto map outside_map 2 set ikev1 transform-set test
nat (inside,outside) 2 source static NETWORK_OBJ_192.168.30.0_24
NETWORK_OBJ_192.168.30.0_24 destination static NETWORK_OBJ_192.168.0.0_24
NETWORK_OBJ_192.168.0.0_24 no-proxy-arp route-lookup