Ipsec Configuration
Ipsec Configuration
• Next step is to create an access-list and define the traffic we would like the
router to pass through the VPN tunnel. In this example, it would be traffic
from one network to the other, 10.10.10.0/24 to 20.20.20.0/24. Access-
lists that define VPN traffic are sometimes called crypto access-
list or interesting traffic access-list.
• Next step is to create the transform set used to protect our data. We’ve
named this TS
• Note that you can assign only one crypto map to an interface.
R2 CONFIG
• R2(config)# crypto isakmp policy 1
R2(config-isakmp)# encr 3des
• R2(config-isakmp)# hash md5
• R2(config-isakmp)# authentication pre-share
• R2(config-isakmp)# group 2
• R2(config-isakmp)# lifetime 86400
• Interface: FastEthernet0/1
Session status: UP-ACTIVE
• Peer: 1.1.1.2 port 500
• IKE SA: local 1.1.1.1/500 remote 1.1.1.2/500 Active
• IPSEC FLOW: permit ip 10.10.10.0/255.255.255.0
20.20.20.0/255.255.255.0
• Active SAs: 2, origin: crypto map