分享
 
 
 

路由器和路由器之间的VPN配置

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Hub Router

2503#show running-config

Building configuration...

Current configuration : 1466 bytes

!

version 12.2

service timestamps debug datetime msec

service timestamps log uptime

no service passWord-encryption

!

hostname 2503

!

!

ip subnet-zero

!

!

!--- Configuration for IKE policies.

crypto isakmp policy 10

!--- Enables the IKE policy configuration (config-isakmp)

!--- command mode, where you can specify the parameters that

!--- are used during an IKE negotiation.

hash md5

authentication PRe-share

crypto isakmp key cisco123 address 200.1.2.1

crypto isakmp key cisco123 address 200.1.3.1

!--- Specifies the preshared key "cisco123" which should

!--- be identical at both peers. This is a global

!--- configuration mode command.

!

!--- Configuration for IPSec policies.

crypto ipsec transform-set myset esp-des esp-md5-hmac

!--- Enables the crypto transform configuration mode,

!--- where you can specify the transform sets that are used

!--- during an IPSec negotiation.

!

crypto map mymap 10 ipsec-isakmp

!--- Indicates that IKE is used to establish

!--- the IPSec security association for protecting the

!--- traffic specified by this crypto map entry.

set peer 200.1.2.1

!--- Sets the IP address of the remote end.

set transform-set myset

!--- Configures IPSec to use the transform-set

!--- "myset" defined earlier in this configuration.

match address 110

!--- Specifyies the traffic to be encrypted.

crypto map mymap 20 ipsec-isakmp

set peer 200.1.3.1

set transform-set myset

match address 120

!

!

!

!

interface Loopback0

ip address 10.1.1.1 255.255.255.0

!

interface Ethernet0

ip address 200.1.1.1 255.255.255.0

no ip route-cache

!--- You must enable process switching for IPSec

!--- to encrypt outgoing packets. This command disables fast switching.

no ip mroute-cache

crypto map mymap

!--- Configures the interface to use the

!--- crypto map "mymap" for IPSec.

!

!--- Output suppressed.

ip classless

ip route 172.16.1.0 255.255.255.0 Ethernet0

ip route 192.168.1.0 255.255.255.0 Ethernet0

ip route 200.1.0.0 255.255.0.0 Ethernet0

ip http server

!

access-list 110 permit ip 10.1.1.0 0.0.0.255 172.16.1.0 0.0.0.255

access-list 110 permit ip 192.168.1.0 0.0.0.255 172.16.1.0 0.0.0.255

access-list 120 permit ip 10.1.1.0 0.0.0.255 192.168.1.0 0.0.0.255

access-list 120 permit ip 172.16.1.0 0.0.0.255 192.168.1.0 0.0.0.255

!--- This crypto ACL-permit identifies the

!--- matching traffic flows to be protected via encryption.

Spoke 1 Router

2509

a#show running-config

Building configuration...

Current configuration : 1203 bytes

!

version 12.2

service timestamps debug datetime msec

service timestamps log uptime

no service password-encryption

!

hostname 2509a

!

enable secret 5 $1$DOX3$rIrxEnTVTw/7LNbxi.akz0

!

ip subnet-zero

no ip domain-lookup

!

!

crypto isakmp policy 10

hash md5

authentication pre-share

crypto isakmp key cisco123 address 200.1.1.1

!

!

crypto ipsec transform-set myset esp-des esp-md5-hmac

!

crypto map mymap 10 ipsec-isakmp

set peer 200.1.1.1

set transform-set myset

match address 110

!

!

!

!

interface Loopback0

ip address 172.16.1.1 255.255.255.0

!

interface Ethernet0

ip address 200.1.2.1 255.255.255.0

no ip route-cache

no ip mroute-cache

crypto map mymap

!

.

.

!--- Output suppressed.

.

.

ip classless

ip route 10.1.1.0 255.255.255.0 Ethernet0

ip route 192.168.1.0 255.255.255.0 Ethernet0

ip route 200.1.0.0 255.255.0.0 Ethernet0

no ip http server

!

access-list 110 permit ip 172.16.1.0 0.0.0.255 10.1.1.0 0.0.0.255

access-list 110 permit ip 172.16.1.0 0.0.0.255 192.168.1.0 0.0.0.255

!

end

2509a#

Spoke 2 Router

VPN2509#show running-config

Building configuration...

Current configuration : 1117 bytes

!

version 12.2

service timestamps debug datetime msec

service timestamps log uptime

service password-encryption

!

hostname VPN2509

!

!

ip subnet-zero

no ip domain-lookup

!

!

crypto isakmp policy 10

hash md5

authentication pre-share

crypto isakmp key cisco123 address 200.1.1.1

!

!

crypto ipsec transform-set myset esp-des esp-md5-hmac

!

crypto map mymap 10 ipsec-isakmp

set peer 200.1.1.1

set transform-set myset

match address 120

!

!

!

!

interface Loopback0

ip address 192.168.1.1 255.255.255.0

!

interface Ethernet0

ip address 200.1.3.1 255.255.255.0

!--- No ip route-cache.

no ip mroute-cache

crypto map mymap

!

.

.

!--- Output suppressed.

.

.

ip classless

ip route 10.1.1.0 255.255.255.0 Ethernet0

ip route 172.16.0.0 255.255.0.0 Ethernet0

ip route 200.1.0.0 255.255.0.0 Ethernet0

no ip http server

!

access-list 120 permit ip 192.168.1.0 0.0.0.255 172.16.1.0 0.0.0.255

access-list 120 permit ip 192.168.1.0 0.0.0.255 10.1.1.0 0.0.0.255

!

end

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有