版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1、一、Pix-Pix二、路由器和路由器之間的VPN配置三、路由器-路由器以及VPN Client之間的VPN一、Pix-PixPIX CentralBuilding configuration.:SavedPIX Version 6.3(3)interface ethernet0 autointerface ethernet1 autonameif ethernet0 outside security0nameif ethernet1 inside security100enable password 8Ry2YjIyt7RRXU24 encryptedpasswd 2KFQnbNIdI.2KY
2、OU encryptedhostname pix-centralfixup protocol dns maximum-length 512fixup protocol ftp 21fixup protocol h323 h225 1720fixup protocol h323 ras 1718-1719fixup protocol http 80fixup protocol rsh 514fixup protocol rtsp 554fixup protocol sip 5060fixup protocol sip udp 5060fixup protocol skinny 2000fixup
3、 protocol smtp 25fixup protocol sqlnet 1521fixup protocol tftp 69 names! This is traffic to PIX 2.access-list 120 permit ip ! This is traffic to PIX 3.access-list 130 permit ip ! Do not do Network Address Translation (NAT) on traffic to other PIXes. access-list 100 permit ip access-list 100 permit i
4、p pager lines 24 logging onmtu outside 1500 mtu inside 1500 ip address outside 53 ip address inside ip audit info action alarm ip audit attack action alarm pdm history enable arp timeout 14400! Do not do NAT on traffic to other PIXes.nat (inside) 0 access-list 100 route outside 1 timeout xlate 3:00:
5、00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absoluteaaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local no snmp-server location
6、no snmp-server contactsnmp-server community public snmp-server enable traps floodguard enablesysopt connection permit-ipsec crypto ipsec transform-set myset esp-des esp-md5-hmac! This is traffic to PIX 2.crypto map newmap 20 ipsec-isakmp crypto map newmap 20 match address 120 crypto map newmap 20 se
7、t peer 54 crypto map newmap 20 set transform-set myset! This is traffic to PIX 3.crypto map newmap 30 ipsec-isakmpcrypto map newmap 30 match address 130crypto map newmap 30 set peer 57 crypto map newmap 30 set transform-set mysetcrypto map newmap interface outsideisakmp enable outsideisakmp key * ad
8、dress 54 netmask 55no-xauth no-config-modeisakmp key * address 57 netmask 55no-xauth no-config-modeisakmp identity addressisakmp policy 10 authentication pre-shareisakmp policy 10 encryption desisakmp policy 10 hash md5isakmp policy 10 group 1isakmp policy 10 lifetime 1000telnet timeout 5ssh timeout
9、 5console timeout 0terminal width 80Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e:endPIX 2Building configuration.:SavedPIX Version 6.3(3)interface ethernet0 autointerface ethernet1 autonameif ethernet0 outside security0nameif ethernet1 inside security100enable password 8Ry2YjIyt7RRXU24 encryptedpa
10、sswd 2KFQnbNIdI.2KYOU encryptedhostname pix2fixup protocol dns maximum-length 512fixup protocol ftp 21fixup protocol h323 h225 1720fixup protocol h323 ras 1718-1719fixup protocol http 80fixup protocol rsh 514fixup protocol rtsp 554fixup protocol sip 5060fixup protocol sip udp 5060fixup protocol skin
11、ny 2000fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names! This is traffic to PIX Central.access-list 110 permit ip ! Do not do NAT on traffic to PIX Central.access-list 100 permit ip pager lines 24 logging onmtu outside 1500mtu inside 1500ip address outside 54 ip address
12、 inside ip audit info action alarm ip audit attack action alarm no failoverfailover timeout 0:00:00failover poll 15no failover ip address outside no failover ip address inside pdm history enablearp timeout 14400! Do not do NAT on traffic to PIX Central.nat (inside) 0 access-list 100route outside 1ti
13、meout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00timeout uauth 0:05:00 absoluteaaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local no snmp-
14、server location no snmp-server contactsnmp-server community public no snmp-server enable traps floodguard enablesysopt connection permit-ipseccrypto ipsec transform-set myset esp-des esp-md5-hmac ! This is traffic to PIX Central.crypto map newmap 10 ipsec-isakmpcrypto map newmap 10 match address 110
15、crypto map newmap 10 set peer 53crypto map newmap 10 set transform-set mysetcrypto map newmap interface outsideisakmp enable outsideisakmp key * address 53 netmask 55no-xauth no-config-modeisakmp identity addressisakmp policy 10 authentication pre-shareisakmp policy 10 encryption desisakmp policy 10
16、 hash md5isakmp policy 10 group 1isakmp policy 10 lifetime 1000telnet timeout 5ssh timeout 5console timeout 0terminal width 80Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e:endPIX 3 ConfigurationBuilding configuration.:SavedPIX Version 6.3(3)interface ethernet0 autointerface ethernet1 autonameif et
17、hernet0 outside security0nameif ethernet1 inside security100enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted hostname pix3fixup protocol dns maximum-length 512fixup protocol ftp 21fixup protocol h323 h225 1720fixup protocol h323 ras 1718-1719fixup protocol http 80fixup pr
18、otocol rsh 514fixup protocol rtsp 554fixup protocol sip 5060fixup protocol sip udp 5060fixup protocol skinny 2000fixup protocol smtp 25fixup protocol sqlnet 1521fixup protocol tftp 69names! This is traffic to PIX Central.access-list 110 permit ip ! Do not do NAT on traffic to PIX Central.access-list
19、 100 permit ip pager lines 24logging onmtu outside 1500mtu inside 1500ip address outside 57 ip address inside ip audit info action alarmip audit attack action alarmno failoverfailover timeout 0:00:00failover poll 15no failover ip address outsideno failover ip address insidepdm history enablearp time
20、out 14400! Do not do NAT on traffic to PIX Central.nat (inside) 0 access-list 100route outside 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00timeout uauth 0:05:00 absoluteaaa-server TA
21、CACS+ protocol tacacs+aaa-server RADIUS protocol radius aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set myset esp-des esp-md5-hmac! This
22、 is traffic to PIX Central.crypto map newmap 10 ipsec-isakmpcrypto map newmap 10 match address 110 crypto map newmap 10 set peer 53 crypto map newmap 10 set transform-set myset crypto map newmap interface outside isakmp enable outsideisakmp key * address 53 netmask 55 no-xauth no-config-mode isakmp
23、identity addressisakmp policy 10 authentication pre-shareisakmp policy 10 encryption desisakmp policy 10 hash md5 isakmp policy 10 group 1 isakmp policy 10 lifetime 1000 telnet timeout 5 ssh timeout 5console timeout 0 terminal width 80 Cryptochecksum:aa3bbd8c6275d214b153e1e0bc0173e4 :end二、路由器和路由器之間的
24、VPN配置Hub Router 2503#show running-config Building configuration.Current configuration : 1466 bytesversion 12.2 service timestamps debug datetime msec service timestamps log uptime no service password-encryption !hostname 2503 ip subnet-zero! Configuration for IKE policies.crypto isakmp policy 10! En
25、ables the IKE policy configuration (config-isakmp)! command mode, where you can specify the parameters that ! are used during an IKE negotiation.hash md5authentication pre-sharecrypto isakmp key cisco123 address crypto isakmp key cisco123 address ! Specifies the preshared key cisco123 which should!
26、be identical at both peers. This is a global! configuration mode command.! Configuration for IPSec policies.crypto ipsec transform-set myset esp-des esp-md5-hmac! Enables the crypto transform configuration mode, ! where you can specify the transform sets that are used ! during an IPSec negotiation.c
27、rypto map mymap 10 ipsec-isakmp! Indicates that IKE is used to establish! the IPSec security association for protecting the ! traffic specified by this crypto map entry.set peer ! Sets the IP address of the remote end.set transform-set myset! Configures IPSec to use the transform-set ! myset defined
28、 earlier in this configuration.match address 110! Specifyies the traffic to be encrypted.crypto map mymap 20 ipsec-isakmpset peer set transform-set mysetmatch address 120 interface Loopback0ip address !interface Ethernet0ip address no ip route-cache! You must enable process switching for IPSec! to e
29、ncrypt outgoing packets. This command disables fast switching.no ip mroute-cachecrypto map mymap! Configures the interface to use the! crypto map mymap for IPSec.! Output suppressed.ip classlessip route Ethernet0ip route Ethernet0ip route Ethernet0ip http server!access-list 110 permit ip 55 55access
30、-list 110 permit ip 55 55access-list 120 permit ip 55 55 access-list 120 permit ip 55 55! This crypto ACL-permit identifies the! matching traffic flows to be protected via encryption.Spoke 1 Router2509a#show running-config Building configuration.Current configuration : 1203 bytes !version 12.2servic
31、e timestamps debug datetime msec service timestamps log uptime no service password-encryption !hostname 2509a!enable secret 5 $1$DOX3$rIrxEnTVTw/7LNbxi.akz0!ip subnet-zerono ip domain-lookupcrypto isakmp policy 10hash md5authentication pre-sharecrypto isakmp key cisco123 address !crypto ipsec transf
32、orm-set myset esp-des esp-md5-hmac!crypto map mymap 10 ipsec-isakmpset peer set transform-set mysetmatch address 110 interface Loopback0ip address !interface Ethernet0ip address no ip route-cacheno ip mroute-cachecrypto map mymapOutput suppressed.ip classlessip route Ethernet0ip route Ethernet0ip ro
33、ute Ethernet0 no ip http server access-list 110 permit ip 55 55 access-list 110 permit ip 55 55 end2509a#Spoke 2 RouterVPN2509#show running-config Building configuration.Current configuration : 1117 bytes !version 12.2service timestamps debug datetime msec service timestamps log uptime service passw
34、ord-encryption !hostname VPN2509 ip subnet-zero no ip domain-lookup crypto isakmp policy 10hash md5authentication pre-sharecrypto isakmp key cisco123 address !crypto ipsec transform-set myset esp-des esp-md5-hmac!crypto map mymap 10 ipsec-isakmpset peer set transform-set mysetmatch address 120interf
35、ace Loopback0ip address !interface Ethernet0ip address ! No ip route-cache.no ip mroute-cachecrypto map mymapOutput suppressed.ip classlessip route Ethernet0ip route Ethernet0ip route Ethernet0no ip http server!access-list 120 permit ip 55 55 access-list 120 permit ip 55 55 !end三、路由器-路由器以及VPN Client
36、之間的VPNCisco 2611 Routervpn2611#show runBuilding configuration.Current configuration : 2265 bytesversion 12.2service timestamps debug uptime service timestamps log uptime no service password-encryption !hostname vpn2611! Enable aaa for user authentication ! and group authorization.aaa new-model! To e
37、nable X-Auth for user authentication, ! enable the aaa authentication commands.aaa authentication login userauthen local! To enable group authorization, enable ! the aaa authorization commands.aaa authorization network groupauthor localaaa session-id common! For local authentication of the IPSec use
38、r, ! create the user with password.username cisco password 0 ciscoip subnet-zero ip audit notify logip audit po max-events 100Create an Internet Security Association andKey Management Protocol (ISAKMP)! policy for Phase 1 negotiations for the VPN 3.x clients.crypto isakmp policy 3encr 3desauthentica
39、tion pre-sharegroup 2! Create an ISAKMP policy for Phase 1! negotiations for the LAN-to-LAN tunnels.crypto isakmp policy 10hash md5authentication pre-share! Specify the PreShared key for the LAN-to-LAN tunnel.! Make sure that you use! no-xauth parameter with your ISAKMP key.crypto isakmp key cisco12
40、3 address 99 no-xauth ! Create a group that will be used to! specify the WINS, DNS servers address! to the client, along with the pre-shared ! key for authentication.crypto isakmp client configuration group 3000clientkey cisco123dns 0wins 0domain pool ippool! Create the Phase 2 Policy for actual dat
41、a encryption.crypto ipsec transform-set myset esp-3des esp-md5-hmacCreate a dynamic map and applythe transform set that was created above.crypto dynamic-map dynmap 10 set transform-set myset! Create the actual crypto map, and! apply the aaa lists that were created! earlier. Also create a new instanc
42、e for your! LAN-to-LAN tunnel. Specify the peer IP address,! transform set and an Access Control List (ACL) for this ! instance.crypto map clientmap client authentication list userauthen crypto map clientmap isakmp authorization list groupauthor crypto map clientmap client configuration address resp
43、ond crypto map clientmap 1 ipsec-isakmpset peer 99set transform-set mysetmatch address 100crypto map clientmap 10 ipsec-isakmp dynamic dynmap!fax interface-type fax-mailmta receive maximum-recipients 0! Apply the crypto map on the outside erface Ethernet0/0ip address 59 half-duplexcrypto map clientm
44、ap!interface Serial0/0no ip addressshutdowninterface Ethernet0/1ip address no keepalivehalf-duplex! Create a pool of addresses to be! assigned to the VPN Clients.ip local pool ippool 00 00ip classlessip route ip http serverip pim bidir-enable! Create an ACL for the traffic! to be encrypted. In this example,! the traffic from /24 to /24! would be encrypted.access-list 100 permit ip 55 55 !snmp-server community foobar ROcall rsvp-sync!mgcp profile default!dial-peer
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年全球及中國超微細合金線材行業(yè)頭部企業(yè)市場占有率及排名調(diào)研報告
- 2025年全球及中國低浴比氣液染色機行業(yè)頭部企業(yè)市場占有率及排名調(diào)研報告
- 2025-2030全球汽車油漆測厚儀行業(yè)調(diào)研及趨勢分析報告
- 2025年全球及中國眼內(nèi)液體填充物行業(yè)頭部企業(yè)市場占有率及排名調(diào)研報告
- 2025年全球及中國初創(chuàng)企業(yè)媒體服務平臺行業(yè)頭部企業(yè)市場占有率及排名調(diào)研報告
- 2025-2030全球知識產(chǎn)權審計服務行業(yè)調(diào)研及趨勢分析報告
- 2025-2030全球設備用墊圈和密封材料行業(yè)調(diào)研及趨勢分析報告
- 2025-2030全球微膠囊脂質(zhì)粉行業(yè)調(diào)研及趨勢分析報告
- 2025年全球及中國車規(guī)級數(shù)字功放電感行業(yè)頭部企業(yè)市場占有率及排名調(diào)研報告
- 2025-2030全球螺旋繞線機行業(yè)調(diào)研及趨勢分析報告
- 第二章《有理數(shù)的運算》單元備課教學實錄2024-2025學年人教版數(shù)學七年級上冊
- DB31-T 596-2021 城市軌道交通合理通風技術管理要求
- 華為智慧園區(qū)解決方案介紹
- 2022年江西省公務員錄用考試《申論》真題(縣鄉(xiāng)卷)及答案解析
- 人教版八年級英語上冊期末專項復習-完形填空和閱讀理解(含答案)
- 一例蛇串瘡患者個案護理課件
- 低壓電工理論考試題庫低壓電工考試題
- 國家電網(wǎng)培訓課件
- 五年級上冊口算練習400題及答案
- 駱駝祥子選擇題100道及答案
- 2024年公務員考試題庫附答案【完整版】
評論
0/150
提交評論