int fa0/0
ip address 192.168.1.33 255.255.255.224
no shut
int se0/0
ip address 61.0.0.5 255.255.255.0
no shut
ip route 0.0.0.0 0.0.0.0 se0/0
cry isakmp policy 1 >>>>>>>>>>>>>>>>>Phase-1
!--- Defines an IKE policy. Use the crypto isakmp policy command in global configuration mode.
!--- Defines an IKE policy. Use the crypto isakmp policy command in global configuration mode.
!--- IKE policies define a set of
parameters that are used during the IKE phase I negotiation.
authentication pre-share
encryption 3des
hash sha
group 2
!--- Specifies preshared keys as the authentication method.
cry isakmp key abc123 address 71.0.0.5 >>>>>>>>>>>>> Defining key
!--- Configures a preshared authentication key, used in global configuration mode.
cry ipsec transform-set abc1 esp-3des esp-sha-hmac >>>>>>> Phase-2
!--- Defines a transform-set. This is an acceptable combination of security protocols and algorithms, which has to be matched on the peer router.
mode tunnel >>>>defining tunel mode
access-list 120 permit ip 192.168.1.32 0.0.0.31 192.168.1.64 0.0.0.31 >>>> defining interesting traffic
crypto map vpnmap 10 ipsec-isakmp >> creating a crypto map using ipsec and isakmp
set transform-set abc1
set peer 71.0.0.5
!--- Sets the IP address of the remote end
!--- Sets the IP address of the remote end
match address 120
!--- This is used to assign an extended access list to a crypto map entry which is used by IPSec to determine which traffic should be protected by crypto and which traffic does not
need crypto protection.
int se0/0 >>>>>>apply the cryptomap on the exit interface/ WAN interface
crypto map vpnmap
#### change the addresses accordingly to configure the other end. WAN Interfaces are not directly connected for the above topology.
Parameters and
Accepted values:
=========================
1.Message
encryption algorithm:
56 bit DES
168 bit 3DES
AES 128 bit key
AES 192 bit key
AES 256 bit key
default: 3DES
2. Message integrity (hash) algorithm:
SHA-1 (HMAC variant) 160 bit
sha
MD5 (HMAC variant) 128 bit
default: SHA-1
3. Peer Authentication method:
Preshare keys
RSA signature
CRACK
default: preshared
4. Key exchange parameters (DH group ID):
768 bit DH group 1
1024 bit DH
group 2
1536 bit DH
group 5
Elliptical
curve field size: 163 bits group 7
default: 1024 bit DH group2
5. ISAKMP established life time :
default: 86400 seconds
No comments:
Post a Comment