设为首页收藏本站language 语言切换
查看: 1208|回复: 1
收起左侧

[求助] 站点间SIPSEC VPN

[复制链接]
发表于 2022-8-10 17:13:49 | 显示全部楼层 |阅读模式


我 在packet tracer模拟site-site的VPN配置,没有成功,请帮我看下什么原因。。。
1234.JPG

ASA1配置如下


:
ASA Version 9.6(1)
!
hostname a7
names
!
interface GigabitEthernet1/1et
nameif outside
security-level 0
ip address 192.168.32.1 255.255.255.0
!
interface GigabitEthernet1/2
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/3
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/4
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/5
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/6
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/7
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/8
nameif inside
security-level 100
ip address 20.20.20.254 255.255.255.0
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
shutdown
!
!
route outside 0.0.0.0 0.0.0.0 192.168.32.254 1
!
access-list 100 extended permit ip 20.20.20.0 255.255.255.0 10.10.10.0 255.255.255.0
!
!
!
!
class-map inspection_default
match default-inspection-traffic
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect tftp
policy-map icmp_policy
class inspection_default
  inspect icmp
!
service-policy global_policy global
!
telnet timeout 5
ssh timeout 5
!
!
crypto ipsec ikev1 transform-set myset esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-SHA esp-aes esp-sha-hmac
!
crypto map mymap 1 match address 100
crypto map mymap 1 set peer 192.168.1.1
crypto map mymap 1 set ikev1 transform-set myset
crypto map mymap interface outside
crypto ikev1 enable outside
crypto ikev1 policy 1
encr aes
hash md5
authentication pre-share
group 2
lifetime 19200
!
tunnel-group 192.168.1.1 type ipsec-l2l
tunnel-group 192.168.1.1 ipsec-attributes
ikev1 pre-shared-key cisco




——————————————————————————————————————————————

ASA2配置如下

ASA Version 9.6(1)
!
hostname a5
names
!
interface GigabitEthernet1/1
nameif outside
security-level 0
ip address 192.168.1.1 255.255.255.0
!
interface GigabitEthernet1/2
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/3
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/4
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/5
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/6
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/7
no nameif
no security-level
no ip address
shutdown
!
interface GigabitEthernet1/8
nameif inside
security-level 100
ip address 10.10.10.254 255.255.255.0
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
shutdown
!
!
route outside 0.0.0.0 0.0.0.0 192.168.1.254 1
!
access-list 100 extended permit ip 10.10.10.0 255.255.255.0 20.20.20.0 255.255.255.0
!
!
!
!
class-map inspection_default
match default-inspection-traffic
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect tftp
policy-map icmp_policy
class inspection_default
  inspect icmp
!
service-policy global_policy global
!
telnet timeout 5
ssh timeout 5
!
!
crypto ipsec ikev1 transform-set myset esp-aes esp-sha-hmac
!
crypto map mymap 1 match address 100
crypto map mymap 1 set peer 192.168.32.1
crypto map mymap 1 set ikev1 transform-set myset
crypto map mymap interface outside
crypto ikev1 enable outside
crypto ikev1 policy 1
encr aes
hash md5
authentication pre-share
group 2
lifetime 19200
!
tunnel-group 192.168.32.1 type ipsec-l2l
tunnel-group 192.168.32.1 ipsec-attributes
ikev1 pre-shared-key cisco
!


————————————-----------------------------------------------------------------------------------
防火墙可以互相ping,检查如下
a5#show crypto isakmp sa

IKEv1 SAs:

  Active SA: 1
  Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)

Total IKE SA: 1
1   IKE Peer: 192.168.32.1
    Type    : L2L             Role    : Initiator
    Rekey   : no              State   : QM_IDLE

There are no IKEv2 SAs
——————————————————————————————————————————————————————————————

a5#show crypto ipsec sa

interface: outside
    Crypto map tag: mymap, seq num: 1, local addr 192.168.1.1

      permit ip 10.10.10.0 255.255.255.0 20.20.20.0 255.255.255.0
      local  ident (addr/mask/prot/port): (10.10.10.0/255.255.255.0/0/0)
      remote  ident (addr/mask/prot/port): (20.20.20.0/255.255.255.0/0/0)
      current_peer 192.168.32.1
      #pkts encaps: 8, #pkts encrypt: 8, #pkts digest: 0
      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
      #send errors 1, #recv errors 0

      local crypto endpt.: 192.168.1.1/0, remote crypto endpt.:192.168.32.1/0
      path mtu 1500, ip mtu, ipsec overhead 78,  media mtu 1500
      current outbound spi: 0x55A272E7(1436709607)
      current inbound spi: 0x55BE9B04(1436709607)

     inbound esp sas:
      spi: 0x55BE9B04(1438554884)
         transform: esp-aes esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, }
         slot: 0, conn id: 2007, crypto map: mymap
         sa timing: remaining key lifetime (k/sec): (4525504/3547)
         IV size: 16 bytes
         replay detection support: N
         Anti replay bitmap:
          0x00000000 0x0000001F
     outbound esp sas:
      spi: 0x55A272E7(1436709607)
         transform: esp-aes esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, }
         slot: 0, conn id: 2008, crypto map: mymap
         sa timing: remaining key lifetime (k/sec): (4525504/3547)
         IV size: 16 bytes
         replay detection support: N
         Anti replay bitmap:
          0x00000000 0x00000001
————————————————————————————————————————————————————————————————


发表于 2022-12-9 22:09:24 | 显示全部楼层
启动Packet Tracer,并建立两个站点之间的网络拓扑。
在两个站点的路由器上配置IP地址,并连接到公网。
在两个站点的路由器上配置IPSec VPN,包括共享密钥和认证方式。
在两个站点的路由器上配置相应的VPN路由规则,以便于建立VPN隧道。
测试两个站点之间的连通性,确保VPN隧道建立成功。
沙发 2022-12-9 22:09:24 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-2-5 22:09 , Processed in 0.056085 second(s), 14 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表