step 1
Site-to-Site IPsec VPN Operation
1.Host A sends interesting traffic to Host B
2.Routers A and B neogotiate an IKE Phase 1 session.
3.Routers A and B neogotiate an IKE Phase 2 session.
4.Information is exchanged via the IPsec tunnel.
5.The IPsec tunnel is terminated.
访问控制列表两边要严格匹配
step 2
Neogotiate the policy [number]
IKE Policy
DES
MD5
pre-share
DH1
lifetime
Diffie-Hellman exchange
Verify the peer identity
crypto map cisco 1 ipsec-isakmp dynamic cisco
access-list 100 permit ip 1.1.1.1 0.0.0.0 3.3.3.3 0.0.0.0
IPsec profile
profile快速方法建立VPN
crypto ipsec profile [JC]
set transform-set ccna