IPsec tunnel based on the tunnel interface(interface tunnel 1 mode ipsec)

2021-04-30 00:32:57 Published
  • 0 Followed
  • 0Collected ,5308Browsed

Network Topology


as

Configuration Steps

Device 1:

#

ospf 1

 area 0.0.0.0

  network 1.1.1.0 0.0.0.255

  network x.y.1.79 0.0.0.0

  network 172.9.1.26 0.0.0.0

#

interface LoopBack0

 description loopback import to eBGP

 ip address x.7.1.79 255.255.255.255

#

interface GigabitEthernet0/1

 port link-mode route

 ip address 1.1.1.1 255.255.255.0

#

#

interface Tunnel1 mode ipsec

 description IPSec tunnel to MCYS HQ01

 ip address 172.9.1.26 255.255.255.252

 source LoopBack0

 destination x.y.0.1

 tunnel protection ipsec profile kol_tbr_hq01

#

ipsec transform-set 3des

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm sha1

#

ipsec profile kol_tbr_hq01 isakmp

 transform-set 3des

 ike-profile kol_tbr_hq01

#

ipsec policy policy1 1 isakmp

 ike-profile kol_tbr_hq01

#

 ike identity user-fqdn HQ

#

ike profile kol_tbr_hq01

 keychain key

 exchange-mode aggressive

 local-identity user-fqdn HQ

 match remote identity fqdn BR

 match remote identity address x.y.0.1 255.255.255.255

proposal 1

#

ike proposal 1

 authentication-method rsa-signature

 encryption-method 3des

#

ike keychain key

 pre-shared-key address x.y.0.1 255.255.255.255 key SIMPLE 12345678

#


Device 2:

#

ospf 1

 area 0.0.0.0

  network 1.1.1.0 0.0.0.255

  network x.y.0.1 0.0.0.0

  network 172.9.1.25 0.0.0.0

#

interface LoopBack0

 description loopback import to eBGP

 ip address x.y.0.1 255.255.255.255

#

interface GigabitEthernet0/1

 port link-mode route

 ip address 1.1.1.2 255.255.255.0

#

#

interface Tunnel1 mode ipsec

 description IPSec tunnel to MCYS HQ01

 ip address 172.9.1.25 255.255.255.252

 source LoopBack0

 destination x.y.1.79

 tunnel protection ipsec profile kol_tbr_hq01

#

ipsec transform-set 3des

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm sha1

#

ipsec profile kol_tbr_hq01 isakmp

 transform-set 3des

 ike-profile kol_tbr_hq01

#

ipsec policy policy1 1 isakmp

 ike-profile kol_tbr_hq01

#

 ike identity user-fqdn HQ

#

ike profile kol_tbr_hq01

 keychain key

 exchange-mode aggressive

 local-identity user-fqdn BR

 match remote identity fqdn HQ

 match remote identity address x.y.1.79 255.255.255.255

Proposal 1

#

ike proposal 1

 authentication-method rsa-signature

 encryption-method 3des

#

ike keychain key

 pre-shared-key address x.y.1.79 255.255.255.255 key SIMPLE 12345678

#



Key Configuration

Transform-set+ike-proposal should be all consistent.


Please rate this case:   
0 Comments

No Comments

Add Comments: