ISAKMP Profile技术应用

ISAKMP Profile技术是IKE协商的一种新型配置方式。它主要的作用是映射我们第一阶段ISAKMP参数到第

二阶段IPSec隧道,可以实现一个设备和多个站点建立多个隧道。还可以很好的消除不同VPN之间的影

响,让第一阶段策略和第二阶段策略关联的更加紧密。并且ISAKMP
Profile普遍在EZVPN和VRF-ware

IPSec VPN配置里边被采用。

Site1 :

crypto keyring ccie

pre-shared-key address 61.128.1.1 key cisco

!

crypto isakmp policy 100

encr 3des

authentication pre-share

group 2

crypto isakmp profile isaprof

keyring ccie

match identity address 61.128.1.1 255.255.255.255

!

!

crypto ipsec transform-set myset esp-3des esp-sha-hmac

!

crypto map ccie 10 ipsec-isakmp

set peer 61.128.1.1

set transform-set myset

set isakmp-profile isaprof

match address vpn

!

interface Loopback0

ip address 1.1.1.1 255.255.255.0

!

interface FastEthernet0/0

ip address 202.100.1.1 255.255.255.0

crypto map ccie

!

ip route 0.0.0.0 0.0.0.0 202.100.1.10

!

ip access-list extended vpn

permit ip 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255

Internet:

interface FastEthernet0/0

ip address 202.100.1.10 255.255.255.0

!

interface FastEthernet0/1

ip address 61.128.1.10 255.255.255.0

end

Site2:

crypto keyring ccie

pre-shared-key address 202.100.1.1 key cisco

!

crypto isakmp policy 100

encr 3des

authentication pre-share

group 2

crypto isakmp profile isaprof

keyring ccie

match identity address 202.100.1.1 255.255.255.255

!

!

crypto ipsec transform-set myset esp-3des esp-sha-hmac

!

crypto map ccie 10 ipsec-isakmp

set peer 202.100.1.1

set transform-set myset

set isakmp-profile isaprof

match address vpn

!

interface Loopback0

ip address 2.2.2.2 255.255.255.0

!

interface FastEthernet0/0

ip address 61.128.1.1 255.255.255.0

crypto map ccie

!

ip forward-protocol nd

ip route 0.0.0.0 0.0.0.0 61.128.1.10

!

ip access-list extended vpn

permit ip 2.2.2.0 0.0.0.255 1.1.1.0 0.0.0.255

!

测试:

Site1#ping 2.2.2.2 source lo0

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 2.2.2.2, timeout is 2 seconds:

Packet sent with a source address of 1.1.1.1

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 104/133/148 ms

Site1#show crypto ipsec sa

interface: FastEthernet0/0

Crypto map tag: ccie, local addr 202.100.1.1

protected vrf: (none)

local  ident (addr/mask/prot/port): (1.1.1.0/255.255.255.0/0/0)

remote ident (addr/mask/prot/port): (2.2.2.0/255.255.255.0/0/0)

current_peer 61.128.1.1 port 500

PERMIT, flags={origin_is_acl,}

#pkts encaps: 9, #pkts encrypt: 9, #pkts digest: 9

#pkts decaps: 9, #pkts decrypt: 9, #pkts verify: 9

#pkts compressed: 0, #pkts decompressed: 0

#pkts not compressed: 0, #pkts compr. failed: 0

#pkts not decompressed: 0, #pkts decompress failed: 0

#send errors 1, #recv errors 0

local crypto endpt.: 202.100.1.1, remote crypto endpt.: 61.128.1.1

path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0

current outbound spi: 0x96AB8F14(2527825684)

inbound esp sas:

spi: 0xF41D2511(4095550737)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

conn id: 1, flow_id: SW:1, crypto map: ccie

sa timing: remaining key lifetime (k/sec): (4566332/2033)

IV size: 8 bytes

replay detection support: Y

Status: ACTIVE

inbound ah sas:

inbound pcp sas:

outbound esp sas:

spi: 0x96AB8F14(2527825684)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

conn id: 2, flow_id: SW:2, crypto map: ccie

sa timing: remaining key lifetime (k/sec): (4566332/2031)

IV size: 8 bytes

replay detection support: Y

Status: ACTIVE

outbound ah sas:

outbound pcp sas:

Site1#show crypto session

Crypto session current status

Interface: FastEthernet0/0

Profile: isaprof

Session status: UP-ACTIVE

Peer: 61.128.1.1 port 500

IKE SA: local 202.100.1.1/500 remote 61.128.1.1/500 Active

IPSEC FLOW: permit ip 1.1.1.0/255.255.255.0 2.2.2.0/255.255.255.0

Active SAs: 2, origin: crypto map

时间: 2024-10-28 03:00:58

ISAKMP Profile技术应用的相关文章

cisco learn book index

------------------------------------------------------------------ Routing TCP/IP Volume 1 , Second Edition ------------------------------------------------------------------ Routing TCP/IP Volume 2 ---------------------------------------------------

Jetty9开发(1)

Version: 9.2.14.v20151106  Jetty : 开发文档 jetty的官网:http://www.eclipse.org/jetty/ Jetty : 开发文档 目录 I. jetty起步 1.介绍jetty服务器 Jetty是一个开源的项目,他提供的功能有:Http服务器,Http客户端和servlet容器. 2.我应该使用什么版本的jetty服务器? 到目前为止,jetty9是最新的版本,并且拥有比以前版本jetty很多很强大的功能,然而还有很多人仍然在使用更老版本的j

cisco冗余GETVPN配置实例

GCKS(config)#do show run Building configuration... Current configuration : 3260 bytes ! upgrade fpd auto version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname GCKS ! boot-st

Cisco DMVPN和GETVPN混合配置实例

KS#show runBuilding configuration... Current configuration : 2641 bytes!upgrade fpd autoversion 12.4service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname KS!boot-start-markerboot-end-marker!

EasyVPN + L2L-VPN over Router

拓扑图: 配置脚本: Internet: conf t no ip domain-lookup line vty 0 15 logging synchronous exec-timeout 0 0 password cisco line console 0 logging synchronous exec-timeout 0 0 exit int f0/0 ip add 61.128.1.10 255.255.255.0 no shut int f1/0 ip add 202.100.1.10 

学习笔记:Twitter核心数据类库团队的Hadoop优化经验

转自:http://blog.jobbole.com/88283/ 一.来源 Streaming Hadoop Performance Optimization at Scale, Lessons Learned at Twitter (Data platform @Twitter) 二.观后感2.1 概要此稿介绍了Twitter的核心数据类库团队,在使用Hadoop处理离线任务时,使用的性能分析方法,及由此发现的问题和优化手段,对如何使用JVM/HotSpot profile(-Xprof)分

Dynamic LAN-to-LAN VPN

(1)在R1上配置IKE(ISAKMP)策略: R1(config)#crypto isakmp policy 1 R1(config-isakmp)#encryption 3des R1(config-isakmp)#hash sha R1(config-isakmp)#authentication pre-share R1(config-isakmp)#group 2 R1(config-isakmp)#exit 说明:定义了ISAKMP policy 1,加密方式为3des,hash算法为

cisco easy vpn服务器端的架设

先前条件: 1,一个可支持VPN协议的路由器(如果不支持,可能是版本原因,可以用刷系统方式刷新系统). 2,cisco easy vpn客户端,可以在各大网站中下载,但是需要注意其中是否捆绑了别的插件或者木马. 3,一个可用的外网IP. Router配置命令: R(config)# aaa new-model           //ezvpn必须启动AAA R(config)# aaa authentication login default none //避免无法普通登录,如果你架设的rad

综合实验DMVPN+EZVPN+Eigrp&OSPF+路由重发布

互联基本配置 !Internet: conf t int f0/0 ip add 100.1.1.1 255.255.255.0 no shut exit int f1/0 ip add 210.1.1.1 255.255.255.0 no shut exit int f1/1 ip add 200.1.1.1 255.255.255.0 no shut exit !Beijing-Center: Route# conf t int f0/0 ip add 100.1.1.2 255.255.2