HomeНаука и техникаRelated VideosMore From: Derpy Networking

IPsec VPN Tunnel

52 ratings | 14121 views
Pre-setup: Usually this is the perimeter router so allow the firewall. Optional access-list acl permit udp source wildcard destination wildcard eq isakmp access-list acl permit esp source wildcard destination wildcard access-list acl permit ahp source wildcard destination wildcard You need to enable to securityk9 technology-package Router(config)#license boot module c2900 technology-package securityk9 Router(config)#reload Task 1: Configure the ISAKMP policy for IKE Phase 1 There are seven default isakmp policies. The most secure is the default. We will configure our own. You can remember this by HAGLE. Hash, Authentication, Group (DH), Lifetime, Encryption. Router(config)#crypto isakmp policy 1 Router(config-isakmp)#hash sha Router(config-isakmp)#authentication pre-share Router(config-isakmp)#group 5 Router(config-isakmp)#lifetime 3600 Router(config-isakmp)#encryption aes 256 We used a pre-shared key for authentication so we need to specify the password for the first phase. Router(config)#crypto isakmp key derpyisbestpony address show crypto isakmp policy Task 2: Configure the IPsec Policy for IKE Phase 2 Configure the encryption and hashing algorithms that you will use for the data sent thought the IPsec tunnel. Hence the transform. Router(config)#crypto ipsec transform-set transform_name esp-aes esp-sha-hmac Task 3: Configure ACL to define interesting traffic Even though the tunnel is setup it doesn’t exist yet. Interesting traffic must be detected before IKE Phase 1 negotiations can begin. Allow the local lan to the remote lan. Router(config)#access-list 101 permit ip show crypto isakmp sa Task 4: Configure a Crypto Map for the IPsec Policy Now that interesting traffic is defined and an IPsec transform set is configured, you need to bind them together with a crypto map. Rotuer(config)# crypto map map_name seq_num ipsec-isakmp What traffic will be interesting? The access-list we made before. Router(config-crypto-map)#match address 101 The transform-set we created earlier for the IPsec tunnel. Router(config-crypto-map)# set transform-set transform_name The peer router you’re connecting to. Router(config-crypto-map)#set peer You need to set the type of DH you want to use. Router(config-crypto-map)#set pfs group5 How long these setting will last before it’s renegotiated Router(config-crypto-map)#set security-association lifetime seconds 900 Task 5: Apply the IPsec Policy Apply the crypto map to the interface. Router(config)#interface serial0/0/0 Router(config-if)#crypto map map_name show crypto map derpy: http://th03.deviantart.net/fs71/PRE/f/2012/302/6/1/derpy_hooves_by_freak0uo-d5jedxp.png twilight: http://fc03.deviantart.net/fs70/i/2012/226/e/5/twilight_sparkle_vector_by_ikillyou121-d56s0vc.png
Html code for embedding videos on your blog
Text Comments (13)
G Rapids (1 year ago)
pretty...unique example. Think i found the broney
Mano b (1 year ago)
thanks for providing very useful information.I am using VPN service subscribed from www.datasoft.ws
Oluwa mide (1 year ago)
Enitin (24 days ago)
Huy L. (1 year ago)
can't enter, access is denied
Huy L. (1 year ago)
again, I do not have the "gateway tech"
SooZoodimp (2 years ago)
Thanks a lot It works in my packet tracer network perfectly If someone wonders how to recognize if it works ... (I am just a student ... don't know if it's actually right - but for me .... it makes sense) When using static routing or routing protocols ... If you tracert your destination address - you should get something like this (in case of network from video - it should be like it's in the brackets[ ] ) 1 0 ms 0 ms 0 ms [ ] 2 1 ms 0 ms 1 ms [ ] - this will dissapear when Ipsec works 3 2 ms 1 ms 11 ms [ ] 4 3 ms 1 ms 2 ms [ ] When using IPSEC tunnel (main router doesn't appear here at all) 1 0 ms 1 ms 0 ms [ ] 2 2 ms 3 ms 2 ms [ ] 3 1 ms 11 ms 3 ms [ ] Hope it clarifies it a bit for someone. Correct me if I am wrong in some way.
Cesar Villa (2 years ago)
You didn't do any commands to verify if it's working. How would you do that?
Derpy Networking (2 years ago)
If you look in the description, you'll see some show commands at different stages.
Ibrahim II (3 years ago)
noice vidayyeo
Derpy Networking (3 years ago)
+Ibra AT Thanks!
5656Dana (3 years ago)
Wow. XD
Derpy Networking (3 years ago)

Would you like to comment?

Join YouTube for a free account, or sign in if you are already a member.