- Radius
- aaa new-model
- Radius server host address ipv4 10.0.0.2
- key abc123
- Aaa authentication login default group radius local
- Line vty 0 15
- Login authentication default
- Tacacs
- Aaa new-model
- Aaa authentication login default group tacacs+ local
- Aaa authentication enable default group tacacs+ local
- Tacacs-server host 192.168.20.2 key Cisco123
- Line vty 0 15
- Login authentication default
- IPSEC
- On Router1 1941
- # int s0/0/0
- # ip address 10.1.1.1 255.255.255.252
- # no shut
- # int g0/0
- # ip address 192.168.1.1 255.255.255.0
- # no shut
- On ISP router:
- # int s0/0/1
- # ip address 10.1.1.2 255.255.255.252
- # no shut
- # int s0/0/0
- # ip address 15.1.1.2 255.255.255.252
- # no shut
- On Router3
- # int s0/0/1
- # ip address 15.1.1.1 255.255.255.252
- # no shut
- # int g0/0
- # ip address 172.16.1.1 255.255.255.0
- # no shut
- Now we will configure static route on Router1 and Router3 and default route on the IPS router.
- On Router1
- # ip route 0.0.0.0 0.0.0.0 10.1.1.2
- On Router3
- # ip route 0.0.0.0 0.0.0.0 15.1.1.2
- On the ISP router:
- # ip route 172.16.1.0 255.255.255.0 15.1.1.1
- # ip route 192.168.1.0 255.255.255.0 10.1.1.1
- Let us run some pings between the two sites.
- On PC-1
- # ping 192.168.1.5
- On PC-A
- # ping 172.16.1.5
- If the pings are not successful, troubleshoot the issue and make sure the PCs can ping each other.
- Create access-list on Router1
- # access-list 100 permit ip 192.168.1.0 0.0.0.255 172.16.1.0 0.0.0.255
- Now, I will configure ISAKMP policy on Router1
- On Router1:
- # cryptop isakmp policy 10
- # authentication pre-share
- # encryption aes 256
- # hash sha
- # lifetime 3600
- # group 5
- Encrypt the key
- On Router1
- # crypto isakmp key cisco address 15.1.1.1
- • IPsec transform set
- On Router1
- # crypto ipsec transform-set VPN-SET esp-aes 256 esp-sha-hmac
- • Now creating the crypto map
- crypto map VPN-MAP 10 ipsec-isakmp
- set peer 15.1.1.1
- set transform-set VPN-SET
- match address 100
- exit
- • Applying the crypto map to the outgoing interface of Router1
- # int s0/0/0
- # crypto map VPN-MAP
- On Router3
- # cryptop isakmp policy 10
- # authentication pre-share
- # encryption aes 256
- # group 5
- # hash sha
- # lifetime 3600
- # exit
- # crypto key cisco address 10.1.1.1
- • IPsec transform set
- # crypto ipsec transform-set VPN-SET esp-aes 256 esp-sha-hamc
- • Creating the access list
- # access-list 100 permit ip 172.16.1.0 0.0.0.255 192.168.1.0 0.0.0.255
- • Creating the crypto map
- # crypto map VPN-MAP 10 ipsec-isakmp
- # set peer 10.1.1.1
- # set transform-set VPN-SET
- # match address 100
- # exit
- • Apply the crypto map to the outgoing interface of Router3
- # int s0/0/1
- # crypto map VPN-MAP
- Now , ping from PC-A to PC-1 and from PC-1 to PC-A
- Run these show commands on Router1 and Router3
- # show crypto isakmp sa
- # show crypto ipsec sa
- # show crypto isakmp policy
- # show crypto map
Recent Pastes