设为首页 收藏本站
查看: 527|回复: 0

[经验分享] cisco dynamic site-to-site做积极模式***

[复制链接]

尚未签到

发表于 2018-7-20 10:43:30 | 显示全部楼层 |阅读模式
pre-shared-key address 0.0.0.0 0.0.0.0 keycisco  !
  crypto isakmp policy 10
  encr 3des
  authentication pre-share
  crypto isakmp profile l2l
  keyring k1

  match>  initiate mode aggressive
  !
  !
  crypto ipsec transform-set bbb esp-3des esp-sha-hmac
  !
  !
  crypto dynamic-map ***map 1
  set transform-set bbb
  set isakmp-profile l2l
  match address 110
  !
  !
  crypto map ***map 1 ipsec-isakmp dynamic ***map
  !
  !
  !
  !
  interface Loopback0
  ip address 10.100.1.1 255.255.255.0
  !
  interface FastEthernet0/0
  no ip address
  shutdown
  duplex auto
  speed auto
  !
  interface FastEthernet1/0
  ip address 218.1.1.2 255.255.255.0
  duplex auto
  speed auto
  crypto map ***map
  !
  access-list 110 permit ip 10.100.1.0 0.0.0.255 10.1.1.00.0.0.255
  !
  no ip http server
  no ip http secure-server
  !
  ip forward-protocol nd
  ip route 0.0.0.0 0.0.0.0 218.1.1.1
  分支段为ADSL的配置:
  !
  hostname R2
  !
  vpdn enable
  !
  crypto isakmp policy 10
  encr 3des
  authentication pre-share
  !
  crypto isakmp peer address 218.1.1.2
  set aggressive-mode password cisco
  set aggressive-mode client-endpoint ipv4-address218.1.1.2
  !
  !
  crypto ipsec transform-set bbb esp-3des esp-sha-hmac
  !
  crypto map ***map 1 ipsec-isakmp
  set peer 218.1.1.2
  set transform-set bbb
  match address 110
  !
  !
  !
  !
  interface Loopback0
  ip address 10.1.1.1 255.255.255.0
  !
  interface FastEthernet0/0
  no ip address
  duplex auto
  speed auto
  pppoe enable group global
  pppoe-client dial-pool-number 1
  !
  interface FastEthernet1/0
  no ip address
  shutdown
  duplex auto
  speed auto
  !
  interface Dialer0
  ip address negotiated
  encapsulation ppp
  dialer pool 1
  dialer-group 1
  ppp authentication chap pap callin
  ppp chap hostname cisco
  ppp chap password 0 cisco
  crypto map ***map
  !
  no ip http server
  no ip http secure-server
  !
  ip forward-protocol nd
  ip route 0.0.0.0 0.0.0.0 Dialer0
  !
  !
  access-list 110 permit ip 10.1.1.0 0.0.0.255 10.100.1.00.0.0.255
  dialer-list 1 protocol ip permit
  分支段的配置也可如下:
  vpdn enable
  !
  crypto keyring k2
  pre-shared-key address 218.1.1.2 key cisco
  !
  crypto isakmp policy 10
  encr 3des
  authentication pre-share
  crypto isakmp profile L2L
  keyring k2

  match>  initiate mode aggressive
  !
  !
  crypto ipsec transform-set cisco111 esp-3des esp-sha-hmac
  !
  crypto map mtsbw 1 ipsec-isakmp
  set peer 218.1.1.2
  set transform-set cisco111
  set isakmp-profile L2L
  match address 110
  !
  !
  !
  !
  interface Loopback0
  ip address 10.1.1.1 255.255.255.0
  !
  interface FastEthernet0/0
  no ip address
  duplex auto
  speed auto
  pppoe enable group global
  pppoe-client dial-pool-number 1
  !
  interface FastEthernet1/0
  ip address 10.10.10.1 255.255.255.0
  duplex auto
  speed auto
  !
  interface Dialer0
  ip address negotiated
  encapsulation ppp
  dialer pool 1
  dialer-group 1
  ppp authentication chap pap callin
  ppp chap hostname cisco
  ppp chap password 0 cisco
  crypto map mtsbw
  !
  no ip http server
  no ip http secure-server
  !
  ip forward-protocol nd
  ip route 0.0.0.0 0.0.0.0 Dialer0
  !
  !
  access-list 110 permit ip 10.1.1.0 0.0.0.255 10.100.1.00.0.0.255
  dialer-list 1 protocol ip permit
  通过R2查看***建立情况
  R2#sh crypto isakmp sa
  dst src state conn-id slot status
  218.1.1.2 218.2.2.2 QM_IDLE 1  0ACTIVE
  ping测试:
  R2#ping 10.100.1.1 source loopback 0
  Type escape sequence to abort.
  Sending 5, 100-byte ICMP Echos to 10.100.1.1, timeout is 2seconds:
  Packet sent with a source address of 10.1.1.1
  .!!!!
  Success rate is 80 percent (4/5), round-trip min/avg/max = 8/33/60ms
  部分debug信息:
  *Mar  1 01:30:03.735: ISAKMP:(0:3:SW:1): beginningAggressive Mode exchange
  *Mar  1 01:30:03.735: ISAKMP:(0:3:SW:1): sendingpacket to 218.1.1.2 my_port 500 peer_port 500 (I)AG_INIT_EXCH
  *Mar  1 01:30:03.859: ISAKMP (0:134217731):received packet from 218.1.1.2 dport 500 sport 500 Global (I)AG_INIT_EXCH

  *Mar  1 01:30:03.863: ISAKMP:(0:3:SW:1):processing SA payload. message>
  *Mar  1 01:30:03.863: ISAKMP:(0:3:SW:1):processing>
  *Mar  1 01:30:03.863: ISAKMP (0:134217731):>  next-payl.!!!!
  Success rate is 80 percent (4/5), round-trip min/avg/max = 8/38/76ms
  R2#oad : 10
  type : 1
  address : 218.1.1.2
  protocol : 0
  port : 0
  length : 12
  *Mar  1 01:30:03.867: ISAKMP:(0:3:SW:1):: peermatches *none* of the profiles

  *Mar  1 01:30:03.867: ISAKMP:(0:3:SW:1):processing vendor>
  *Mar  1 01:30:03.867: ISAKMP:(0:3:SW:1): vendor>
  *Mar  1 01:30:03.871: ISAKMP:(0:3:SW:1):processing vendor>
  *Mar  1 01:30:03.871: ISAKMP:(0:3:SW:1): vendor>
  *Mar  1 01:30:03.871: ISAKMP:(0:3:SW:1):processing vendor>  *Mar  1 01:30:03.871: ISAKMP:(0:3:SW:1): speakingto another IOS box!
  *Mar  1 01:30:03.875: ISAKMP:(0:3:SW:1):SA usingtunnel password as pre-shared key.

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-539093-1-1.html 上篇帖子: ESXi 5.0 环境下安装部署Cisco Nexus 1000v 下篇帖子: Cisco PIX failover 实验过程详解
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表