Mục tiêu thực hành:
- Cấu hình GRE VPN sử dụng IPsec Profile trên Cisco Router VPN.RT vs Site1.RT.
- Cấu hình GRE VPN sử dụng IPsec Profile trên Cisco Router VPN.RT vs Site2.RT.
Truy cập vào "Lab 3-8 - Cau hinh dinh tuyen dong OSPF tren Cisco Router v1" tại Public Unetlab Server 24/7 để thực hành.
Cấu hình GRE VPN sử dụng IPsec Profile trên Cisco Router VPN.RT vs Site1.RT.
- Kiểm tra kết nối WAN trước khi triển khai GRE VPN.
Site1-RT#ping 203.0.3.2 source 203.0.1.2Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 203.0.3.2, timeout is 2 seconds:Packet sent with a source address of 203.0.1.2!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 msSite1-RT#
- Cấu hình GRE VPN sử dụng IPsec Profile trên VPN.RT.
crypto isakmp policy 1encryption aes 128hash shaauthentication pre-sharegroup 2lifetime 86400exitcrypto isakmp key abc address 0.0.0.0crypto ipsec transform-set myset esp-sha-hmac esp-aes 128mode transportexitcrypto ipsec profile protect-greset security-association lifetime seconds 86400set transform-set mysetexitinterface Tunnel1ip address 172.16.0.9 255.255.255.252ip mtu 1424ip tcp adjust-mss 1384tunnel source 203.0.3.2tunnel destination 203.0.1.2tunnel protection ipsec profile protect-greexitip route 172.16.1.0 255.255.255.0 Tunnel1
- Cấu hình GRE VPN sử dụng IPsec Profile trên Site1.RT.
crypto isakmp policy 1encryption aes 128hash shaauthentication pre-sharegroup 2lifetime 86400exitcrypto isakmp key abc address 0.0.0.0crypto ipsec transform-set myset esp-sha-hmac esp-aes 128mode transportexitcrypto ipsec profile protect-greset security-association lifetime seconds 86400set transform-set mysetexitinterface Tunnel1ip address 172.16.0.10 255.255.255.252ip mtu 1424ip tcp adjust-mss 1384tunnel source 203.0.1.2tunnel destination 203.0.3.2tunnel protection ipsec profile protect-greexitip route 10.0.0.0 255.255.0.0 Tunnel1
- Kiểm tra kết nối GRE VPN sử dụng IPsec Profile.
Site1-RT#show ip interface briefAny interface listed with OK? value "NO" does not have a valid configurationInterface IP-Address OK? Method Status ProtocolEthernet0/0 unassigned YES unset up upEthernet0/0.10 172.16.1.1 YES manual up upEthernet0/0.20 172.16.1.65 YES manual up upEthernet0/0.30 172.16.1.129 YES manual up upEthernet0/1 203.0.1.2 YES manual up upEthernet0/2 172.16.0.2 YES manual up upEthernet0/3 unassigned YES unset administratively down downNVI0 unassigned NO unset up upTunnel1 172.16.0.10 YES manual up upSite1-RT#
Site1-RT#ping 172.16.0.9 source 172.16.0.10Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 172.16.0.9, timeout is 2 seconds:Packet sent with a source address of 172.16.0.10!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/5 msSite1-RT#
Site1-RT#show crypto sessionCrypto session current statusInterface: Tunnel1Session status: UP-ACTIVEPeer: 203.0.3.2 port 500IKEv1 SA: local 203.0.1.2/500 remote 203.0.3.2/500 ActiveIKEv1 SA: local 203.0.1.2/500 remote 203.0.3.2/500 ActiveIPSEC FLOW: permit 47 host 203.0.1.2 host 203.0.3.2Active SAs: 4, origin: crypto mapSite1-RT#
Site1-RT#ping 10.0.0.3 source 172.16.1.65Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.0.0.3, timeout is 2 seconds:Packet sent with a source address of 172.16.1.65!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/5 msSite1-RT#
Cấu hình GRE VPN sử dụng IPsec Profile trên Cisco Router VPN.RT vs Site2.RT.
Thực hành thêm các bài Lab cơ bản khác tại hạng mục Học Network CCNA R&S thông qua các bài thực hành.
0 comments