设为首页收藏本站language 语言切换
查看: 2140|回复: 4
收起左侧

Cisco 路由器 VPN典型配置

[复制链接]
发表于 2010-8-19 14:56:57 | 显示全部楼层 |阅读模式
本实验借助于Cisco 2600 路由器,通过VPN技术实现蓝色学苑,一分部和二分部之间的网络互联,为了贴近实用性,中间仍然通过Cisco 3640 模拟ISP 。
  
   通过在网络基础部分的介绍,各位应该对VPN技术有了一定的认识,在VPN的实现中主要有两个方面:建立VPN Tunnel和IPSec的加密
  
  具体拓扑图如下:

11111.jpg
   Cisco 2600 with GRE Tunnel
  
  Current configuration
  
  !
  
  version 12.0
  
  sevice timestamps debug uptime
  
  sevice timestamps log uptime
  
  sevice password-encryption
  
  !
  
  hostname bluestudy1
  
  !
  
  enable passsword cisco
  
  !
  
  memory-size iomem 25
  
  ip subnet-zero
  
  no ip domain-lookup
  
  !
  
  interface Tunnel0
  
  ip address 172.16.101.1 255.255.255.0
  
  no ip directed-broadcast
  
  ip mtu 1467
  
  tunnel sourece 199.1.1.2
  
  tunnel destination 199.1.2.2
  
  !
  
  interface serial0/0
  
  no ip address
  
  no ip directed-broadcast
  
  encapsulation frame-relay
  
  no ip mroute-cache
  
  frame-relay lmi-type ansi
  
  !
  
  interface serial0/0.1 point-to-point
  
  description connected to internet
  
  ip address 199.1.1.2 255.255.255.248
  
  no ip directed-broadcast
  
  ip nat outside
  
  no arp frame-relay
  
  frame-relay interface-dlci 111
  
  !
  
  !
  
  interface ethernet0/0
  
  ip address 172.16.1.1 255.255.255.0
  
  no ip directed-broadcast
  
  ip nat inside
  
  !
  
  router eigrp 100
  
  network 172.16.0.0
  
  !
  
  router rip
  
  version 2
  
  network 172.16.0.0
  
  no auto-summary
  
  !
  
  ip nat pool bluestudy 199.1.1.3 199.1.1.10 netmask 255.255.255.248
  
  ip nat inside sourece list 2 pool bluestudy overload
  
  ip nat inside sourece static 172.16.1.3 199.1.1.5
  
  ip classless
  
  ip route 0.0.0.0 0.0.0.0 srial0/0.1
  
  ip http server
  
  !
  
  access-list 2 permit 172.16.1.0 0.0.0.255
  
  snmp-server community public RO
  
  !
  
  line con 0
  
  exec-timeout 0 0
  
  password cisco
  
  login
  
  transport input none
  
  line aux 0
  
  line vty 0 4
  
  password cisco
  
  login
  
  !
  
  end
  
   
  
   
  
  Cisco 2600 Configuration with IPSec
   
  
   
  
  Current configuration
  
  !
  
  version 12.0
  
  sevice timestamps debug uptime
  
  sevice timestamps log uptime
  
  sevice password-encryption
  
  !
  
  hostname bluestudy1
  
  !
  
  enable passsword cisco
  
  !
  
  memory-size iomem 25
  
  ip subnet-zero
  
  no ip domain-lookup
  
  !
  
  crypto isakmp key policy 1
  
  authentication pre-share
  
  group 2
  
  crypto isakmp key slurpee-machine address 172.16.101.2
  
  !
  
  crypto ipsec transform-set test ah-sha-hmac esp-des esp-sha-hmac
  
  !
  
  set transform-set test
  
  !
  
  crypto map bluestudy 10 ipsec-isakmp
  
  set peer 172.16.101.2
  
  set transform-set test
  
  match address 101
  
  !
  
  interface Tunnel0
  
  ip address 172.16.101.1 255.255.255.0
  
  no ip directed-broadcast
  
  ip mtu 1467
  
  tunnel sourece 199.1.1.2
  
  tunnel destination 199.1.2.2
  
  crypto map bluestudy
  
  !
  
  interface serial0/0
  
  no ip address
  
  no ip directed-broadcast
  
  encapsulation frame-relay
  
  no ip mroute-cache
  
  frame-relay lmi-type ansi
  
  !
  
  interface serial0/0.1 point-to-point
  
  description connected to internet
  
  ip address 199.1.1.2 255.255.255.248
  
  no ip directed-broadcast
  
  ip nat outside
  
  no arp frame-relay
  
  frame-relay interface-dlci 111
  
  !
  
  !
  
  interface ethernet0/0
  
  ip address 172.16.1.1 255.255.255.0
  
  no ip directed-broadcast
  
  ip nat inside
  
  !
  
  router eigrp 100
  
  network 172.16.0.0
  
  !
  
  router rip
  
  version 2
  
  network 172.16.0.0
  
  no auto-summary
  
  !
  
  ip nat pool bluestudy 199.1.1.3 199.1.1.10 netmask 255.255.255.248
  
  ip nat inside sourece list 2 pool bluestudy overload
  
  ip nat inside sourece static 172.16.1.3 199.1.1.5
  
  ip classless
  
  ip route 0.0.0.0 0.0.0.0 srial0/0.1
  
  ip http server
  
  !
  
  access-list 2 permit 172.16.1.0 0.0.0.255
  
  access-list 101 permit ip 172.16.1.0 0.0.0.255 172.16.2.0 0.0.0.255(对方网络,只有到这个网络的信息包才加密)
  
   
  
  snmp-server community public RO
  
  !
  
  line con 0
  
  exec-timeout 0 0
  
  password cisco
  
  login
  
  transport input none
  
  line aux 0
  
  line vty 0 4
  
  password cisco
  
  login
  
  !
  
  end
  
发表于 2012-4-25 22:22:30 | 显示全部楼层
太深奥了
沙发 2012-4-25 22:22:30 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2012-4-25 22:23:25 | 显示全部楼层
太经典了
板凳 2012-4-25 22:23:25 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2012-6-22 00:33:47 | 显示全部楼层
"interface ethernet0/0
  
ip address 172.16.1.1 255.255.255.0
  
no ip directed-broadcast
    
ip nat inside"中
“no ip directed-broadcast   
ip nat inside”这两条命令是干什么用的?
地板 2012-6-22 00:33:47 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2013-5-26 22:16:43 | 显示全部楼层
5# 2013-5-26 22:16:43 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-2-3 03:49 , Processed in 0.087631 second(s), 12 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表