IPsec自动方式

在这里插入图片描述

实验要求

  1. 配置 IPsec VPN 采用自动方式
  2. 同时要满足上网和VPN两种需求
  3. 使用NAT进行地址映射
  4. 认证方法和加密算法自行配置采用安全的方法

实验配置

R1:

#基本配置
sy
sy R1
dhcp enable
acl 3001
rule 1 deny ip des 192.168.3.0 0.0.0.255
rule 2 permit ip
inter g0/0/0
ip ad 192.168.1.254 24
dhcp select inter
inter g0/0/1
nat outbound 3001
ip ad 12.1.1.1 24

ip route-s 0.0.0.0 0 12.1.1.2

#VPN配置
sy
acl 3000
rule 1 permit ip source 192.168.1.0 0.0.0.255 des 192.168.3.0 0.0.0.255

ipsec proposal To-shanghai
esp auth sha2-256
esp encry aes-256

ike proposal 1
authentication-algorithm md5
encry aes-cbc-256
dh group2

ike peer shanghai v1
exchange-mode main
pre-shared-key cipher huawei
ike-proposal 1
local-address 12.1.1.1
remote-address 23.1.1.3

ipsec policy beijing-VPN 1 isakmp
security acl 3000
proposal To-shanghai
ike-peer shanghai

inter g0/0/1
ipsec policy beijing-VPN

R2:

sy
sy ISP
inter g0/0/0
ip ad 12.1.1.2 24
inter g0/0/1
ip ad 23.1.1.2 24
inter loop 0
ip add 2.2.2.2 32
q

R3:

#基本配置
sy
sy R3
dhcp enable
acl 3001
rule 1 deny ip des 192.168.1.0 0.0.0.255
rule 2 permit ip
inter g0/0/0
ip ad 192.168.3.254 24
dhcp select inter
inter g0/0/1
nat outbound 3001
ip ad 23.1.1.3 24

ip route-s 0.0.0.0 0 23.1.1.2

#VPN配置
sy
acl 3000
rule 1 permit ip source 192.168.3.0 0.0.0.255 des 192.168.1.0 0.0.0.255

ipsec proposal To-beijing
esp auth sha2-256
esp encry aes-256

ike proposal 1
authentication-algorithm md5
encry aes-cbc-256
dh group2

ike peer beijing v1
exchange-mode main
pre-shared-key cipher huawei
ike-proposal 1
local-address 23.1.1.3
remote-address 12.1.1.1

ipsec policy shanghai-VPN 1 isakmp
security acl 3000
proposal To-beijing
ike-peer beijing

inter g0/0/1
ipsec policy shanghai-VPN

Author:DC

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值