magnet
  • Home
  • Network Tools
  • Anti Hacking
  • CISCO
  • Watchguard
  • GNS3
    • Adding Qemu host in GNS3
    • Adding new IOS/Images
  • VPN -Tunnels
    • Site to Site IPSec
    • IP-SEC Tunnel with Watch guard
    • PPTP with Watchguard
    • SSL VPN with Watchguard
  • About Me
  • Blog
  • CISCO Exams
    • T-Shoot 642-832
Picture
Picture

Video : How to configure Watchguatd and cisco router IPSEC secured VPN

Step by Step procedure how to configure Watchguatd and cisco router IPSEC secured VPN

In watchguard Policy manager goto VPN>Branch Office Gateways>Add

Picture
Picture
Picture

After creating gateway Goto VPN> Branch Office Tunnels

Select the same gateway which you created before . GOTO address >ADD (add the local subnet and remote subnet)




Picture
Picture
Picture
Picture
Picture




CISCO ROUTER CONFIGURATIONS:



Add the following in your configuration 

crypto isakmp policy 20
authentication pre-share
crypto isakmp key ITMAG address 10.10.10.1 (watchguard ip)
!
!
crypto ipsec transform-set vpn_trans esp-des esp-sha-hmac
mode transport
!
crypto map vpn_map 10 ipsec-isakmp
set peer 10.10.10.1
set security-association lifetime kilobytes 8192
set security-association lifetime seconds 360
set transform-set vpn_trans
match address 101
!
access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 102 deny ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 102 permit ip 192.168.3.0 0.0.0.255 any
route-map nonat permit 10
match ip address 102

Powered by Create your own unique website with customizable templates.