
IKE Policy Command Set Command Reference Guide
258 © 2003 ADTRAN, Inc. 61950860L1-35D
(config)#crypto ike policy 10
(config-ike)#no local-id
(config-ike)#peer 192.168.1.2
(config-ike)#initiate aggressive
(config-ike)#respond anymode
(config-ike)#client configuration pool vpn_users
(config-ike)#attribute 10
(config-ike-attribute)#encryption 3des
(config-ike-attribute)#hash sha
(config-ike-attribute)#authentication pre-share
(config-ike-attribute)#group 1
(config-ike-attribute)#lifetime 900
Step 5:
Define the remote-id settings. The
crypto ike remote-id
command is used to specify the remote-id for a peer
connecting to the system. This command is also used to specify the preshared-key associated with the
specific remote-id. The
crypto ike remote-id
command is used to define the remote-id for a peer connecting
to the system, specify the preshared-key associated with the specific remote-id, and (optionally) determine that
the peer matching this remote-id should not use mode config (by using the
no-mode-config
keyword). See
crypto ike remote-id
on page 154 for more information.
(config)#crypto ike remote-id address 192.168.1.2 preshared-key
mysecret123
Step 6:
Define the transform-set. A transform-set defines the encryption and/or authentication algorithms to be used to
secure the data transmitted over the VPN tunnel. Multiple transform-sets may be defined in a system. Once a
transform-set is defined, many different crypto maps within the system can reference it. In this example, a
transform-set named
highly_secure
has been created. This transform-set defines ESP with Authentication
implemented using 3DES encryption and SHA1 authentication.
(config)#crypto ipsec transform-set highly_secure esp-3des esp-sha-hmac
(cfg-crypto-trans)#mode tunnel
Step 7:
Define an ip-access list. An Extended Access Control List is used to specify which traffic needs to be sent
securely over the VPN tunnel. The entries in the list are defined with respect to the local system. The source
IP address will be the source of the traffic to be encrypted. The destination IP address will be the receiver of
the data on the other side of the VPN tunnel.
(config)#ip access-list extended corporate_traffic
(config-ext-nacl)#permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255 log
deny ip any any
Technology Review (Continued)
Comentarios a estos manuales