Topology
[PC-1]----[ROUTER-1]----[ROUTER-2]----[PC-2]
[PC-1] eth0: 192.168.1.1/24
[ROUTER-1] fa0/1: 192.168.1.254/24
[ROUTER-1] fa0/0: 12.12.12.1/24
[ROUTER-1] vt1: 192.168.0.1/24 (virtual-template1)
[ROUTER-1] lo0: 192.168.0.1/24
[ROUTER-2] lo0: 192.168.0.2/24
[ROUTER-2] tu0: 192.168.0.2/24
[ROUTER-2] fa0/0: 12.12.12.2/24
[ROUTER-2) fa0/1: 192.168.2.254/24
[PC-2] eth0: 192.168.2.1/24
Dynamic VTI (Hub)
The hub cannot initiate a site-to-site VPN because it does not know the peer IP address.
ROUTER-1(config)#crypto isakmp policy 1ROUTER-1(config-isakmp)#authentication pre-shareROUTER-1(config-isakmp)#encryption aesROUTER-1(config-isakmp)#hash shaROUTER-1(config-isakmp)#group 2ROUTER-1(config-isakmp)#lifetime 86400ROUTER-1(config)#crypto isakmp aggressive-mode disableROUTER-1(config)#crypto keyring KEYRINGROUTER-1(conf-keyring)#pre-shared-key address 0.0.0.0 0.0.0.0 key 0 SECRET_KEYROUTER-1(config)#crypto isakmp enableROUTER-1(config)#crypto ipsec transform-set TRANSFORM_SET esp-aes esp-sha-hmacROUTER-1(config)#crypto isakmp profile PROFILEROUTER-1(conf-isa-prof)#match identity address 0.0.0.0 0.0.0.0ROUTER-1(conf-isa-prof)#keyring KEYRINGROUTER-1(conf-isa-prof)#virtual-template 1ROUTER-1(config)#crypto ipsec profile PROFILEROUTER-1(config-profile)#set transform-set TRANSFORM_SETROUTER-1(config-profile)#set isakmp-profile PROFILEROUTER-1(config-profile)#set pfs group2ROUTER-1(config)#interface lo0ROUTER-1(config-if)#ip address 192.168.0.1 255.255.255.0ROUTER-1(config)#interface fa0/0ROUTER-1(config-if)#ip nat outsideROUTER-1(config)#interface fa0/1ROUTER-1(config-if)#ip nat insideROUTER-1(config)#interface virtual-template1 type tunnelROUTER-1(config-if)#ip unnumbered lo0ROUTER-1(config-if)#tunnel source fa0/0ROUTER-1(config-if)#tunnel mode ipsec ipv4ROUTER-1(config-if)#tunnel protection ipsec profile PROFILEROUTER-1(config)#ip route 0.0.0.0 0.0.0.0 12.12.12.2ROUTER-1(config)#ip access-list extended ACL_NATROUTER-1(config-ext-nacl)#permit ip any anyROUTER-1(config)#ip nat inside source list ACL_NAT interface fa0/0 overloadROUTER-1(config)#router ospf 1ROUTER-1(config-router)#network 192.168.0.0 0.0.255.255 area 0ROUTER-1(config-router)#passive-interface defaultROUTER-1(config-router)#no passive-interface virtual-template1
Static VTI (Spoke)
The spokes initiate the site-to-site VPN.
ROUTER-2(config)#crypto isakmp policy 1ROUTER-2(config-isakmp)#authentication pre-shareROUTER-2(config-isakmp)#encryption aesROUTER-2(config-isakmp)#hash shaROUTER-2(config-isakmp)#group 2ROUTER-2(config-isakmp)#lifetime 86400ROUTER-2(config)#crypto isakmp aggressive-mode disableROUTER-2(config)#crypto isakmp key 0 SECRET_KEY address 12.12.12.1ROUTER-2(config)#crypto isakmp enableROUTER-2(config)#crypto ipsec transform-set TRANSFORM_SET esp-aes esp-sha-hmacROUTER-2(config)#crypto ipsec profile PROFILEROUTER-2(config-crypto-map)#set transform-set TRANSFORM_SETROUTER-2(config-crypto-map)#set pfs group2ROUTER-2(config)#interface lo0ROUTER-2(config-if)#ip address 192.168.0.2 255.255.255.0ROUTER-2(config)#interface fa0/0ROUTER-2(config-if)#ip nat outsideROUTER-2(config)#interface fa0/1ROUTER-2(config-if)#ip nat insideROUTER-2(config)#interface tu0ROUTER-2(config-if)#ip unnumbered lo0ROUTER-2(config-if)#tunnel source fa0/0ROUTER-2(config-if)#tunnel destination 12.12.12.1ROUTER-2(config-if)#tunnel mode ipsec ipv4ROUTER-2(config-if)#tunnel protection ipsec profile PROFILEROUTER-2(config)#ip route 0.0.0.0 0.0.0.0 12.12.12.1ROUTER-2(config)#ip access-list extended ACL_NATROUTER-2(config-ext-nacl)#permit ip any anyROUTER-2(config)#ip nat inside source list ACL_NAT interface fa0/0 overloadROUTER-2(config)#router ospf 1ROUTER-2(config-router)#network 192.168.0.0 0.0.255.255 area 0ROUTER-2(config-router)#passive-interface defaultROUTER-2(config-router)#no passive-interface tu0
No comments:
Post a Comment