Cisco IOS: VPN configuration example
This page provides more detailed information for configuring a Skytap VPN for use with a Cisco IOS endpoint on an external network. It contains the VPN configuration parameters to enter on the Skytap VPN page, as well as a sample configuration file for the Cisco IOS device.
For general information, see Creating a VPN connection to your Skytap account.
Contents
Skytap VPN configuration
Parameters to enter on the Skytap VPN page:
Parameter Name
Value to enter
Name
Name for the Skytap VPN
Example: CorporateVPN
Remote Peer IP
[CUSTOMER VPN ENDPOINT]
value from the sample configuration file below
Region
N/A. This is automatically populated when you select a public IP address for the Skytap peer IP field (see below).
Example: US-West
Skytap peer IP
An available public IP address in your Skytap account. Select a public IP in the same region as the VMs you want to connect to.
Example: 76.32.14.101
Enter this as the [SKYTAP VPN ENDPOINT]
value in the sample configuration file below.
Skytap subnet
[SKYTAP VM IP RANGE]
value from the sample configuration file below.
This is the range of VM IP addresses in Skytap that sends and receive traffic through this VPN. This can’t overlap with the included remote subnets defined below.
You can specify the default route (0.0.0.0/0) for either the remote subnet or the local subnet. You can’t use 0.0.0.0/0 for both local and remote subnets.
Apply NAT for Connected Networks
YES
Topology
Policy-based
Phase 1 Encryption Algorithm
aes 256
Phase 1 Hash Algorithm
sha1
Phase 1 pre-shared Key
[SHARED SECRET KEY]
value from the sample configuration file below
Phase 1 SA lifetime
28800
Phase 1 DH group
modp1536 (5)
Phase 2 encryption algorithm
aes 256
Phase 2 authentication algorithm
hmac_sha1
Phase 2 perfect forward secrecy (PFS)
OFF
Phase 2 PFS group
N/A
Phase 2 SA lifetime
N/A
SA policy level
require
Specify maximum segment size
NO
Maximum segment size
N/A
Dead peer detection
ON
Included remote subnets
[INTERNAL ALLOWED IP RANGE]
value from the sample configuration file below.
These are the IP addresses and subnets on the external network that send and receive traffic through this VPN.
Example: 10.1.15.0/24
You can specify the default route (0.0.0.0/0) for either the remote subnet or the local subnet. You can’t use 0.0.0.0/0 for both local and remote subnets.
Excluded remote subnets
Subset of IP addresses and subnets on the external network that should be excluded from using the VPN tunnel. This is only used to define exclusions for VPN traffic from larger included remote subnets.
Example: 10.1.15.17/32
Sample Cisco IOS device configuration file
These are the parameters to enter in the Cisco IOS device configuration file.
Replace [VARIABLES]
with specific values from Skytap or corporate policy
crypto isakmp policy [UNIQUE NUMBER]
encr aes
authentication pre-share
group 2
lifetime 28800
crypto isakmp key [SHARED SECRET KEY] address [SKYTAP VPN ENDPOINT]
crypto ipsec transform-set [TRANSFORM SET NAME] esp-aes esp-sha-hmac
mode tunnel
crypto ipsec df-bit clear
crypto map [CRYPTO MAP NAME] [UNIQUE NUMBER] ipsec-isakmp
set peer [SKYTAP VPN ENDPOINT]
set transform-set [TRANSFORM SET NAME]
match address [ACL NAME]
interface [INTERNAL INTERFACE]
description [CUSTOMER PRIVATE IP ADDRESS]
ip address [CUSTOMER INTERNAL NETWORK]
interface [EXTERNAL INTERFACE]
description [CUSTOMER PUBLIC IP]
ip address [CUSTOMER VPN ENDPOINT]
crypto map [CRYPTO MAP NAME]
ip access-list extended [ACL NAME]
permit ip [INTERNAL ALLOWED IP RANGE] [SKYTAP VM IP RANGE]