当前位置:首页>微思动态 > >详情
全国热线电话 400-881-4699

在线留言

【每日必学】怎么多站点site to site VPN

发布作者:微思网络   发布时间:2017-03-21   浏览量:0



配置 Internet 路由器

interface Serial1/0

ip address 202.100.1.10 255.255.255.0 no shutdown

interface Serial1/1

ip address 202.100.2.10 255.255.255.0 no shutdown

interface Serial1/2

ip address 202.100.3.10 255.255.255.0 no shutdown


第一步:配置路由

 

配置 R1:

 

ip route 172.16.2.0 255.255.255.0 202.100.1.10 ip route 172.16.3.0 255.255.255.0 202.100.1.10 ip route 202.100.2.0 255.255.255.0 202.100.1.10 ip route 202.100.3.0 255.255.255.0 202.100.1.10

 

配置 R2:

 

ip route 172.16.1.0 255.255.255.0 202.100.2.10 ip route 172.16.3.0 255.255.255.0 202.100.2.10 ip route 202.100.1.0 255.255.255.0 202.100.2.10 ip route 202.100.3.0 255.255.255.0 202.100.2.10

 

配置 R3:

 

ip route 172.16.1.0 255.255.255.0 202.100.3.10 ip route 172.16.2.0 255.255.255.0 202.100.3.10 ip route 202.100.1.0 255.255.255.0 202.100.3.10 ip route 202.100.2.0 255.255.255.0 202.100.3.10

 

注:在实际应用中,企业都是通过配置默认路由到达 Internet,以上拓扑中可以在 R1,R2,R3 配置一条默认路由也可以解决路由问题,而且企业路由器也算是 Internet 边缘路由器,0.0.0.0 0.0.0 的路由到达 internet 必不可少:

分别在 R1R2R3 配置默认路由

R1: ip route 0.0.0.0 0.0.0.0 202.100.1.10

R2: ip route 0.0.0.0 0.0.0.0 202.100.2.10

R3: ip route 0.0.0.0 0.0.0.0 202.100.3.10


第二步:ISAKMP 策略配置 R1:

crypto isakmp policy 10 encr 3des

hash md5 authentication pre-share group 2

crypto isakmp key cisco address 202.100.2.2 crypto isakmp key cisco address 202.100.3.3

配置 R2:

crypto isakmp policy 10 encr 3des

hash md5 authentication pre-share group 2

crypto isakmp key 0 cisco address 202.100.1.1 crypto isakmp key 0 cisco address 202.100.3.3

配置 R3:

crypto isakmp policy 10 encr 3des

hash md5 authentication pre-share group 2

crypto isakmp key cisco address 202.100.1.1 crypto isakmp key cisco address 202.100.2.2


第三步:ISAKMP 策略配置 IPSEC 转换集

 

配置 R1: crypto ipsec transform-set myset esp-3des esp-sha-hmac

配置 R2: crypto ipsec transform-set myset esp-3des esp-sha-hmac

配置 R3: crypto ipsec transform-set myset esp-3des esp-sha-hmac


第四步:感兴趣流量配置 R1:

Access-list 100 permit ip 172.16.1.0 0.0.0.255 172.16.2.0 0.0.0.255

Access-list 101 permit ip 172.16.1.0 0.0.0.255 172.16.3.0 0.0.0.255

 

配置 R2:

Access-list 100 permit ip 172.16.2.0 0.0.0.255 172.16.1.0 0.0.0.255

Access-list 101 permit ip 172.16.2.0 0.0.0.255 172.16.3.0 0.0.0.255

 

配置 R3:

Access-list 100 permit ip 172.16.3.0 0.0.0.255 172.16.1.0 0.0.0.255

Access-list 101 permit ip 172.16.3.0 0.0.0.255 172.16.2.0 0.0.0.255

 

第五步:配置 crypto map

 

配置 R1:

crypto map mymap 10 ipsec-isakmp set peer 202.100.2.2

match address 100

set transform-set myset

crypto map mymap 20 ipsec-isakmp set peer 202.100.3.3

match address 101

set transform-set myset


配置 R2:

crypto map mymap 10 ipsec-isakmp set peer 202.100.1.1

match address 100

set transform-set myset

crypto map mymap 20 ipsec-isakmp set peer 202.100.3.3

match address 101

set transform-set myset

 

配置 R3:

crypto map mymap 10 ipsec-isakmp set peer 202.100.1.1

match address 100

set transform-set myset

crypto map mymap 20 ipsec-isakmp set peer 202.100.2.2

match address 101

set transform-set myset

 

第六步:在相应的接口应用 crypto map

 

配置 R1:

int s1/0

crypto map mymap

 

配置 R2:

 int s1/0

crypto map mymap

 

配置 R3:

int s1/0

crypto map mymap

 

第六步:测试

R1#ping 172.16.2.2 source 172.16.1.1

R1#ping 172.16.3.3 source 172.16.1.1

R2#ping 172.16.1.1 source 172.16.2.2

R2#ping 172.16.3.3 source 172.16.2.2

R3#ping 172.16.1.1 source 172.16.3.3

R3#ping 172.16.2.2 source 172.16.3.3

 

常用检查命令:

 

show crypto isakmp policy show crypto ipsec transform-set show crypto isakmp sa

show crypto ipsec sa show crypto map

clear cryto sa

clear crypto sa peer (ip address|peer name) clear crypto sa map (map name)

Debug cryto isakmp

Debug cryto ipsec

 



 






返回顶部