zoukankan      html  css  js  c++  java
  • SE 2014年5月25日


    如图配置 两实验
    R1模拟总部,R2 与R3模拟分部
    实验一 
    要求使用 IPSec VPN 主模式,使得总部与两分部内网可相互通讯

     

    步骤:

    1、  配置默认路由

    [RT1]ip route-static 0.0.0.0 0 202.112.1.2

    [RT2]ip route-static 0.0.0.0 0 67.61.1.2

    [RT3]ip route-static 0.0.0.0 0 64.67.1.2

    2、  IKE peer配置

    [RT1]ike proposal 1

    [RT1-ike-peer-rt2]exchange-mode main

    [RT1-ike-peer-rt2]pre-shared-key simple cisco

    [RT1-ike-peer-rt2]id-type ip

    [RT1-ike-peer-rt2]proposal 1

    [RT1-ike-peer-rt2]local-address 202.112.1.1

    [RT1-ike-peer-rt2]remote-address 67.61.1.1

    [RT1-ike-peer-rt3]exchange-mode main

    RT1-ike-peer-rt3]pre-shared-key simple cisco

    [RT1-ike-peer-rt3]local-address 202.112.1.1

    [RT1-ike-peer-rt3]remote-address 64.67.1.1

    [RT1-ike-peer-rt3]id-type ip

    [RT1-ike-peer-rt3]proposal 2

    [RT2-ike-peer-rt1]exchange-mode main

    [RT2-ike-peer-rt1]proposal 1

    [RT2-ike-peer-rt1]local-address 67.61.1.1

    [RT2-ike-peer-rt1]remote-address 202.112.1.1

    [RT2-ike-peer-rt1]pre-shared-key simple cisco

    [RT2-ike-peer-rt1]id-type ip

    [RT3-ike-peer-rt1]exchange-mode main

    [RT3-ike-peer-rt1]pre-shared-key simple cisco

    [RT3-ike-peer-rt1]local-address 64.67.1.1

    [RT3-ike-peer-rt1]remote-address 202.112.1.1

    3、  创建安全ACL

    [RT1]acl number 3001 match-order config

    [RT1-acl-adv-3001]rule permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255

    [RT2]acl number 3000 match-order config

    [RT2-acl-adv-3000]rule permit ip source 192.168.2.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

    [RT3]acl number 3000 match-order config

    [RT3-acl-adv-3000]rule permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

    [RT1-acl-adv-3002]rule permit ip source 192.168.1.0 0.0.0.255 destination 192.168.3.0 0.0.0.255

    4、  创建ipsec 安全提议

    [RT1]ipsec proposal rt2

    [RT1]ipsec proposal rt3

    [RT2]ipsec proposal rt1

    [RT3]ipsec proposal rt1

    5、  创建Ipsec policy

    [RT1-ipsec-policy-isakmp-h3c-1]security acl 3001

    [RT1-ipsec-policy-isakmp-h3c-1]proposal rt2

    [RT1-ipsec-policy-isakmp-h3c-1]ike-peer rt2

    [RT1-ipsec-policy-isakmp-h3c-2]security acl 3002

    [RT1-ipsec-policy-isakmp-h3c-2]ike-peer rt3

    [RT1-ipsec-policy-isakmp-h3c-2]proposal rt3

    [RT2-ipsec-policy-isakmp-h3c-1]security acl 3000

    [RT2-ipsec-policy-isakmp-h3c-1]ike-peer rt1

    [RT2-ipsec-policy-isakmp-h3c-1]proposal rt1

    [RT3-ipsec-policy-isakmp-h3c-1]security acl 3000

    [RT3-ipsec-policy-isakmp-h3c-1]ike-peer rt1

    [RT3-ipsec-policy-isakmp-h3c-1]proposal rt1

    6、  接口上应用ipsec policy

    [RT1-GigabitEthernet0/0/0]ipsec policy h3c

    [RT2-GigabitEthernet0/0/1]ipsec policy h3c

    [RT3-GigabitEthernet0/0/2]ipsec policy h3c

    7、  测试

    192.168.1.100 ping 192.168.2.100

     

    192.168.1.100 ping 192.168.3.100

     

    RT1 IKE SA查看

     

    RT1 ipsec SA查看

     

    实验二
    要求使用 IPSec VPN 野蛮模式,使得总部与两分部内网可相互通讯 (R2 R3两分部公网接口为动态获得地址情况)

     

    步骤:

    1、  配置静态路由

    [RT1]ip route-static 0.0.0.0 0 202.112.1.2

    [RT2]ip route-static 0.0.0.0 0 67.61.1.2

    [RT3]ip route-static 0.0.0.0 0 64.67.1.2

    2、  配置IKE Peer

    [RT1-ike-peer-rt2]exchange-mode aggressive

    [RT1-ike-peer-rt2]id-type name

    [RT1-ike-peer-rt2]pre-shared-key simple cisco

    [RT1-ike-peer-rt3]exchange-mode aggressive

    [RT1-ike-peer-rt3]id-type name

    [RT1-ike-peer-rt3]pre-shared-key simple cisco

    [RT1-ike-peer-rt3]remote-name rt3

    [RT2-ike-peer-rt1]exchange-mode aggressive

    [RT2-ike-peer-rt1]id-type name

    [RT2-ike-peer-rt1]remote-address 202.112.1.1

    3、  配置ipsec policy

    [RT1-ipsec-policy-isakmp-h3c-1]security acl 3001

    [RT1-ipsec-policy-isakmp-h3c-1]security acl 3001

    [RT1-ipsec-policy-isakmp-h3c-1]proposal rt2

    [RT1-ipsec-policy-isakmp-h3c-2]security acl 3002

    [RT1-ipsec-policy-isakmp-h3c-2]ike-peer rt3

    [RT1-ipsec-policy-isakmp-h3c-2]proposal rt3

    [RT2-ipsec-policy-isakmp-h3c-1]security acl 3000

    [RT2-ipsec-policy-isakmp-h3c-1]ike-peer rt1

    [RT2-ipsec-policy-isakmp-h3c-1]proposal rt1

    [RT2-ike-peer-rt1]pre-shared-key simple cisco

    [RT3-ike-peer-rt1]exchange-mode aggressive

    [RT3-ike-peer-rt1]id-type name

    [RT3-ike-peer-rt1]remote-address 202.112.1.1

    [RT3-ike-peer-rt1]remote-name rt1

    [RT3-ike-peer-rt1]pre-shared-key simple cisco

    [RT3-ipsec-policy-isakmp-h3c-1]security acl 3000

    [RT3-ipsec-policy-isakmp-h3c-1]ike-peer rt1

    [RT3-ipsec-policy-isakmp-h3c-1]proposal rt1

    4、  接口应用ipsec policy

    [RT1-GigabitEthernet0/0/0]ipsec policy h3c

    [RT2-GigabitEthernet0/0/1]ipsec policy h3c

    [RT3-GigabitEthernet0/0/2]ipsec policy h3c

    5、  测试

    192.168.2.100 ping 192.168.1.100

     

    192.168.3.100 ping 192.168.1.100

     

    RT1查看ike sa

     

    RT1查看ipsec sa

     

    RT2和RT3分别更换接口地址后测试,并在RT1查看IKE SA

     

  • 相关阅读:
    jquery仿淘宝规格颜色选择效果
    JQuery实现的模块交换动画效果
    javascript检查移动设备是否支持重力方向感应
    Mysql数据库备份和还原常用的命令
    Mysql备份还原数据库之mysqldump实例及参数详细说明
    php抽象类和接口
    Ubuntu下lamp(PHP+Mysql+Apache)搭建+完全卸载卸载方法
    Ubuntu 麒麟版下安装:Apache+php5+mysql+phpmyadmin.
    Ubuntu下安装Wine&WineQQ+Phpstorm+wps+svn+vim(计划任的使用)+flashplayer+curl扩展
    GitHub Linux下使用方法
  • 原文地址:https://www.cnblogs.com/networking/p/3754162.html
Copyright © 2011-2022 走看看