aaa new-model
! Create a vpn-users DB that points to the local auth service
aaa authentication login vpn-users local
aaa authorization network vpn-users local
! any local user will be allowed to use the VPN
username fred secret 5 SECRET
! Create an ISAKMP policy that handles the ISAKMP negotiation process
crypto isakmp policy 1
encr aes
authentication pre-share
group 2
lifetime 3600
crypto isakmp keepalive 120 15
crypto isakmp xauth timeout 60
! Group policy for ISAKMP
crypto isakmp client configuration group default
key PLAINTEXT_KEY
dns LOCAL_DNS_SERVERS
domain LOCAL_DOMAIN
pool vpn-dynamic-pool
! VPN clients will be assigned addresses out of this pool
ip local pool vpn-dynamic-pool 192.168.2.1 192.168.2.254
! Create transform sets that specify how the actual IPSEC traffic will be encrypted
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA-LZS esp-aes esp-sha-hmac comp-lzs
! Create IPSEC policies - any negotiated transform scheme must be specified
! in the map below
crypto dynamic-map vpn-dynamic-map 1
set transform-set ESP-AES-128-SHA-LZS
crypto dynamic-map vpn-dynamic-map 2
set transform-set ESP-AES-128-SHA
!
crypto map vpn-dynamic client authentication list vpn-users
crypto map vpn-dynamic client configuration address respond
crypto map vpn-dynamic isakmp authorization list vpn-users
crypto map vpn-dynamic 1 ipsec-isakmp dynamic vpn-dynamic-map
! Apply the IPSEC map to the external interface
interface ExternalInterface/0
crypto map vpn-dynamic
您正在寻找远程访问 VPN。思科文档
此外,您可能应该查看Cisco Secure VPN Client Solutions Guide
这是我想出的,这应该是创建 VPN 配置的一个不错的起点。我不确定它本身是否最小,但它应该让任何正在寻找它的人启动并运行。
Zypher 指出的 Cisco 安全 VPN 客户端解决方案指南对于创建此指南非常有用 - 如果您可以筛选,其中有一些很好的示例。