security device manager (SDM)
ip http secure-server
line vty 0 4
transport input ssh telnet
username ssxw privilege 15 password ssxw
GRE generic routing encapsulation 通过路径封装 不支持认证和加密 但是支持多种网络协议
封装 Ip |GRE| IP| TCP| DATA 协议号47
新的ip包头 4个四节 支持数据包的完整性检查
R1 int tunnel 0 R2 int tunnel 0
ip add 10.1.1.1 255.255.255.0 ip add 10.1.1.2 255.255.255.0
tunnel souce s0/0 tunnel souce s0/0
tunnel destination 200.1.1.2 tunnel destination 200.1.1.2
tunnel mode gre ip tunnel mode gre ip
no shut no shut
ip route 0.0.0.0 0.0.0.0 tunnel 0
NIP GRE IP DATA
TUNNEL地址的作用 为了使用静态路由!!
introducting secure grp tunnels gre over ipsec
支持多种网络协议 支持动态***
IP ESP IP GRE IP TCP IDATA ESP (TUNNEL MODE)
IP ESP GRE IP TCP DATA ESP (TRANSPORT)用transpor mode 可以节省24字节 先看路由 做封装在查access-list R1access-list 100 permit ip host 200.1.1.1 host 200.1.1.2 (注意)crypto siakmp poli 10auth perhash md5en 3desexitcrypto isakmp key 0 123 add 200.1.1.2crypto ipsec tran *** esp-md5-ad esp-3desmode tranexitcrypto map ***set peer 200.1.1.2match add 100set tran ***exitint s0/0crypto map ***(宣告路由:自动触发 )router eigrp 90net 192.168.1.0net 172.1.1.0 0.0.0.255no au 封装NIP GRE IP RIGRPSOU200.1.1.1-.2 (SOU172.1.1.1-D224.0.0.10)HA cisco high availability options高可用性dpd crypto isakmp keepalive 10 3(每10秒发一次 三次没收到 换下一个传输 )crypto ipse tran *** esp-md5-ah esp-3descrypto map *** 10 ipsec-isakmpset -peer 200.1.1.2 defaultset-peer 200.1.2.2set tran ***match add 100access-list 100 permit 内网地址HSRPint fa0/0ip add 172.31.1.2 255.255.255.0standby 1 preemptstandby 1 ip 172.31.1.1standby 1 name ***standby 1 track fa0/1crypto map *** redundancy ***exicrypto dymaic-map *** 10set transform-set ***reserse-route (反向路由注入)(reverse route injection)crypto map *** ipsec-isakmp dynamic ***定义感兴趣流量 在active路由器注入一个静态路由 将静态路由重分发进动态路由ipsec 自动切换 无状态 状态stateful sso (状态化自切换)int fa0/0ip add 172.31.1.2 255.255.255.0standby 1 preemptstandby 1 ip 172.31.1.1standby 1 name ***standby 1 track fa0/1crypto map *** redundancy ***exicrypto dymaic-map *** 10 statefulset transform-set ***reserse-route (反向路由注入)(reverse route injection)crypto map *** ipsec-isakmp dynamic ***redundancy lnter-devicescheme standby ***ipc zond defaultassociation 1protocol sctplocal-port 12345local-ip 10.1.1.1retransimt-timeout 300 10000path-retransmit 1-assoc-retransmit 20remote-port 12345remote 10.1.1.2IPsec ***的备份活动静态路由 (用ad控制 或者度量值 动态)int s0/0.1ip add 200.1.1.1 255.255.255.0delay 100router eigrp 100no aunet 192.168.0.0 0.0.255.255net 10.0.0.0 0.0.0.255easy ***easy *** server /easy *** remote1 client初始化ike phase1 process(内置软件认证)2 The *** client astablishes an isakmp SA3 The easy *** server accepts the sa proposal (1.5阶段)4 The easy *** server initiates a username passwordRRI根据分配地址反向路由注入!(最长匹配 32位 可以分在同一网段,不能重复)!(给client分配地址) 注意数据data改变()nip esp ip dataR1 int fa0/0ip add 200.1.1.1 255.255.255.0no shutint s1/0ip add 192.168.1.1 255.255.255.0no shutip http secure-servicesline vty 0 4transport input sshlogin localuserna ssxw pre 15 pass 523(在本地一定要启用AAA 用户名 密码)group 2(D H算法 默认 不能改 client内置group 2)定义地址pool (定义组 (市场部 财务部 工程部 等))split tunnel 分割通道 (access-list)选择加密!!不影响上网local lan (所在本网段不加密)查看计算机路由 printer routerip http serverip http authen localuser ssxw pre 15 pass 523show crypto engine connetions active(加解密)EASY *** 配置:ip cefaaa new-modelaaa authentication login default localaaa authentication login sdm_***_xauth_ml_1 localaaa authorization exec default localaaa authorization network sdm_***_group_ml_1 localusername ssxw privilege 15 password 0 ssxwcrypto isakmp policy 10enc 3desauth pre-sharegroup 2(注意)crypto isakmp client configuration group tatfookkey tatfook123pool sdm_pool_1acl 100crypto ipsec transform-set esp-3des-sha esp-3des esp-sha-hmaccrypto dynamic-map sdm-dynmap_1 1set transform-set esp-3des-shareverse-routecrypto map sdm_cmap_1 client authentication list sdm_***_xauth_ml_1crypto map sdm_cmap_1 isakmp authorization list sdm_***_group_ml_1crypto map sdm_cmap_1 client cpmfiguration address respondcrypto map sdm_cmap_1 65535 ipsec-isakmp dynamic sdm_dynmap_1int fa0/0ip add 192.168.16.5 255.255.255.0crypto dynamic-map sdm_cmap_1ip local pool sdm_pool_1 192.168.8.1 192.168.8.100access-list 100 permit ip 192.168.1.0 0.0.0.255 any