three. Dial-up AddressVpnSet1.Networking Requirements
This example will The combination of IPSec and ADSL is a typical case which is widely used in the present practice.
(1) Router B is directly connected to the DSLAM Access terminal of the public network via ADSL , as the client side of PPPoE . Routerb The IP address that is dynamically obtained from the ISP is the private network address.
(2) the head office LAN is connected to the ATM network via Router A .
(3) in order to ensure information security , the Ipsec/ike method is used to create a secure tunnel.
2.Group Network Diagram
650) this.width=650; "src=" Https://s1.51cto.com/oss/201711/20/b09c97546bd5e55331177c8037a7de08.png "title=" Qq20171120202313.png "alt=" B09c97546bd5e55331177c8037a7de08.png "/>
3.Configuration Steps(1)ConfigurationRouter A
# Configure the Local security gateway device name.
<routera>system-view
[Routera]ike local-name RouterA
# Configure ACLs.
[Routera]acl number 3101
[routera-acl-adv-3101]rule 0 Permit IP source 172.16.0.0 0.0.0.255 destination 192.1.68.0.0 0.0.0.255 allow 192.1. 68.0 Access 172.16.0.0
[Routera-acl-adv-3101]quit
# Configure the IKE security offer.
[Routera]ike Proposal 1
[Routera-ike-proposal-1]authentication-algorithm sha validation algorithm
[Routera-ike-proposal-1]authentication-method Pre-share
[Routera-ike-proposal-1]encryption-algorithm 3DES-CBC encryption Algorithm
[Routera-ike-proposal-1]dh group2 assigning dh groups
# Configure the IKE peers peer.
[Routera]ike Peer Peer
[Routera-ike-peer-peer]exchange-mode aggressive // Negotiation mode for Savage mode
[Routera-ike-peer-peer] Pre-shared-key ABC / Configure preshared key, this key must be consistent with the peer
[Routera-ike-peer-peer]id-type name // negotiation type for use named
[Routera-ike-peer-peer]remote-name routerb // Configure peer-to-peer naming
[Routera-ike-peer-peer]nat traversal // Configure NAT traversal function
[Routera-ike-peer-peer]quit
# Create IPSec security proposal prop.
[Routera]ipsec proposal Prop
[Routera-ipsec-proposal-prop]encapsulation-mode tunnel Create tunnel mode
[Routera-ipsec-proposal-prop]transform ESP//esp validation algorithm
[ROUTERA-IPSEC-PROPOSAL-PROP]ESP encryption-algorithm 3DES// encryption Algorithm
[Routera-ipsec-proposal-prop]esp Authentication-algorithm SHA1 verification algorithm
[Routera-ipsec-proposal-prop]quit
# Create security Policy Policies and specify to establish SA through IKE negotiation .
[Routera]ipsec Policy Policy Ten ISAKMP
# Configure security Policy to refer to IKE peer peer.
[Routera-ipsec-policy-isakmp-policy-10]ike-peer Peer
# Configure security Policy to reference access control List 3101.
[Routera-ipsec-policy-isakmp-policy-10]security ACL 3101
# Configure security Policy to reference IPSEC security proposal prop.
[Routera-ipsec-policy-isakmp-policy-10]proposal Prop
[Routera-ipsec-policy-isakmp-policy-10]quit
# Configure the IP address.
[Routera]interface serial 2/0
[Routera-serial2/0]ip address 100.1.1.1 255.255.255.0
[Routera-serial2/0]ipsec Policy Policies Reference Security
[Routera-serial2/0]quit
# Configure the Ethernet port.
[Routera]interface Ethernet 1/0
[Routera-ethernet1/0]ip address 172.16.0.1 255.255.255.0
[Routera-ethernet1/0]quit
# Configure static routes to the branch office LAN.
[Routera]ip route-static 192.168.0.0 255.255.255.0 serial 2/0
(2)ConfigurationRouter B
# Configure the name of the local security gateway.
<routerb>system-view
[Routerb]ike local-name Routerb
# Configure ACLs.
[Routerb]acl number 3101
[routerb-acl-adv-3101]rule 0 Permit IP source 192.168.0.0 0.0.0.255 destination 172.16.0.0 0.0.0.255 allow 172.16.0.0 Network Segment Entry
[Routerb-acl-adv-3101]quit
# Configure the IKE security offer.
[Routerb]ike Proposal 1
[Routerb-ike-proposal-1]authentication-algorithm sha validation algorithm
[Routerb-ike-proposal-1]authentication-method Pre-share
[Routerb-ike-proposal-1]encryption-algorithm 3DES-CBC encryption Algorithm
[Routerb-ike-proposal-1]dh group2 assigning dh groups
# Configure the IKE peers peer.
[Routerb]ike Peer Peer
[Routerb-ike-peer-peer]exchange-mode aggressive // Negotiation mode for Savage mode
[Routerb-ike-peer-peer] Pre-shared-key ABC // Configure preshared key, this key must be consistent with the peer
[Routerb-ike-peer-peer]id-type name // negotiation type for use named
[Routerb-ike-peer-peer] Remote-name routera // Configure peer-to-peer naming
[Routerb-ike-peer-peer]remote-address 100.1.1.1 // Configure peer-to-peer IP address
[Routerb-ike-peer-peer] NAT traversal // Configure NAT traversal function
[Routerb-ike-peer-peer]quit
# Create IPSec security proposal prop.
[Routerb]ipsec proposal Prop
[Routerb-ipsec-proposal-prop]encapsulation-mode Tunnel tunnel mode
[Routerb-ipsec-proposal-prop] Transform ESP encryption method
[ROUTERB-IPSEC-PROPOSAL-PROP]ESP Encryption-algorithm 3DES ESP encryption mode 3DES
[Routerb-ipsec-proposal-prop]esp authentication-algorithm SHA1 authentication method
[Routerb-ipsec-proposal-prop] Quit
# Create security Policy Policies and specify to establish SA through IKE negotiation .
[Routerb] IPSec policy policy ten ISAKMP
# Configure security Policy to refer to IKE peer peer.
[Routerb-ipsec-policy-isakmp-policy-10] Ike-peer Peer
# Configure security Policy to reference access control List 3101.
[Routerb-ipsec-policy-isakmp-policy-10]security ACL 3101
# Configure security Policy to reference IPSEC security proposal prop.
[ROUTERB-IPSEC-POLICY-ISAKMP-POLICY-10] Proposal prop
[Routerb-ipsec-policy-isakmp-policy-10]quit
# Configure the Dial-up access control list.
[Routerb]dialer-rule 1 IP Permit
# Create Dialer0, using the user name and password assigned by the ISP for dialing and PPP authentication related configuration,
and configure MTU.
[Routerb]interface Dialer 0
[Routerb-dialer0]link-protocol PPP uses PPP dialing
[routerb-dialer0]ppp pap local-user Test password simple 123456 dial-up ISP provides user name and password
[Routerb-dialer0]ip Address Ppp-negotiate
[Routerb-dialer0]dialer User 1 users
[Routerb-dialer0]dialer-group 1 user Group
[Routerb-dialer0]dialer Bundle 1
[routerb-dialer0]ipsecno-nat-process enable do not Nat traversal
[ROUTERB-DIALER0] IPSec policy policy refers to IPSec policies created under this interface
[Routerb-dialer0]mtu 1492
[Routerb-dialer0]quit
# Configure static routes to the head office LAN.
[Routerb]ip route-static 172.16.0.0 255.255.255.0 dialer 0
# Configure the Ethernet port.
[Routerb]interface Ethernet 1/0
[Routerb-ethernet1/0]tcp MSS 1450
[Routerb-ethernet1/0]ip address 192.168.0.1 255.255.255.0
[Routerb-ethernet1/0]quit
This article is from the "Garrett" blog, make sure to keep this source http://garrett.blog.51cto.com/11611549/1983596
IPsec VPN detailed--dial address