Allright. In this example, we will use "MYSECRET" as the shared key string.
crypto isakmp policy 1
hash md5
authentication pre-share
crypto isakmp key MYSECRET address 0.0.0.0 0.0.0.0
crypto isakmp client configuration address-pool local ourpool
!
!
crypto ipsec transform-set trans1 esp-des esp-md5-hmac
!
crypto dynamic-map dynmap 10
set transform-set trans1
!
!
crypto map intmap client configuration address initiate
crypto map intmap client configuration address respond
crypto map intmap 10 ipsec-isakmp dynamic dynmap
!
Now we have to assign our encryption scheme to the EXTERNAL INTERFACE, that is the interface which the VPN requests will arrive through. Don't change any other settings on that interface, just add "crypto map intmap".
interface Serial0
description Connected to the rest of the world
crypto map intmap
!
Our VPN clients will be assigned addresses from a pool, make sure these addresses are allowed to pass through any filters that you may have set up, and that your servers allow connections as necessary.
ip local pool ourpool 192.168.2.1 192.168.2.254
Now download and install a VPN client that suits your needs. It must support DES encryption, MD5 hashing and pre-shared-key authentication. We use cisco-secure-vpn-client-1.1-des.zip.