SITE-A-ROUTER(config)#crypto isakmp enable SITE-B-ROUTER(config)#crypto isakmp enable 配置加密 ISAKMP 策略 SITE-A-ROUTER(config)#crypto isakmp policy 20 SITE-A-ROUTER(config-isakmp)#authentication pre-share SITE-A-ROUTER(config-isakmp)#encryption aes 256 SITE-A-ROUTER(config-isakmp)#hash sha SITE-A-ROUTER(config-isakmp config-isakmp)#encryption aes 256 SITE-B-ROUTER(config-isakmp)#hash sha SITE-B-ROUTER(config-isakmp)# group 5 SITE-B-ROUTER(config-isakmp)#lifetime 3600 SITE-B-ROUTER(config-isakmp)#end 查看 配置的ISAKMP 策略 SITE-A-ROUTER
priority 1 policy ISAKMP: default group 1 ISAKMP: encryption DES-CBC ISAKMP: hash SHA ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 :(0:0:N/A:0):Checking ISAKMP transform 1 against priority 1 policy ISAKMP: default group 1 ISAKMP : encryption DES-CBC ISAKMP: hash SHA ISAKMP: auth pre-share ISAKMP: life type in (config-isakmp-policy)# group 2 ciscoasa(config-isakmp-policy)# lifetime 10000 ciscoasa(config-isakmp-policy
[fw-1-ipsec-policy-isakmp-policy-10]security acl 3000 [fw-1-ipsec-policy-isakmp-policy-10]proposal prop [fw-3-ipsec-policy-isakmp-policy-10]ike-peer peer [fw-1-ipsec-policy-isakmp-policy-10]quit [fw-1]ike [fw-3-ipsec-policy-isakmp-policy-10]security acl 3000 [fw-3-ipsec-policy-isakmp-policy-10]proposal prop [fw-3-ipsec-policy-isakmp-policy-10]ike-peer peer [fw-3-ipsec-policy-isakmp-policy-10]quit [fw-3]ike [FW1] ipsec policy policy 10 isakmp # 配置安全策略policy引用ike对等体peer。
(2)ISAKMP/IKE阶段1建立过程: 1)交换ISAKMP/IKE传输集 ISAKMP/IKE传输集就是一组用来保护管理连接的安全策略,也有人将它称之为IKE策略或ISAKMP策略。 ISAKMP/IKE阶段2具有上面这种特性,也就是说ISAKMP/IKE的数据连接实际是通过两个单向连接建立的。 policy 1 R3(config-isakmp)#encryption aes R3(config-isakmp)#hash sha R3(config-isakmp)#authentication pre-share R3(config-isakmp)#group 2 R3(config-isakmp)#lifetime 10000 R3(config-isakmp)#exit R3(config 4、附带一些查看配置的命令: R1#show crypto isakmp policy #查看ISAKMP协商策略的配置结果 R1#show crypto isakmp sa
[FW1-ipsec-policy-isakmp-james-1]security acl 3000 [FW1-ipsec-policy-isakmp-james-1]transform-set james [FW1-ipsec-policy-isakmp-james-1]ike-profile james [FW1-ipsec-policy-isakmp-james-1]remote-address 123.0.0.2 [FW1-ipsec-policy-isakmp-james-1]quit [FW1]int Tunnel 0 mode gre [FW1-Tunnel0]ip address [FW2-ipsec-policy-isakmp-james-1]security acl 3000 [FW2-ipsec-policy-isakmp-james-1]transform-set james [FW2-ipsec-policy-isakmp-james-1]ike-profile james [FW2-ipsec-policy-isakmp-james-1]remote-address
ACL [R1-ipsec-policy-isakmp-1-10]proposal r1 //配安全策略所引用的安全提议 [R1-ipsec-policy-isakmp- //DH组 [R1-ipsec-policy-isakmp-1-10]sa duration time-based 86400 //ipsec SA生存周期 [R1-ipsec-policy-isakmp [R3-ipsec-policy-isakmp-1-10]security acl 3000 [R3-ipsec-policy-isakmp-1-10]proposal r3 [R3-ipsec-policy-isakmp -1-10]ike-peer R1 [R1-ipsec-policy-isakmp-1-10]pfs dh-group2 [R3-ipsec-policy-isakmp-1-10]sa duration time-based 86400 [R3-ipsec-policy-isakmp-1-10]q [R3]int s0/2/0 [R3-Serial0/2/0]ipsec policy 1 [R3
//设置认证方法为预共享密钥 Router(config-isakmp)#hash md5 //用于完整性检查的哈希算法为MD5 Router(config-isakmp)#encryption (config-isakmp)#lifetime 86400 //生存时间设置为86400 Router(config-isakmp)#exit Router(config)# crypto isakmp : ISAKMP is ON //表明ISAKMP已经被启用。 (config-isakmp)#lifetime 86400 //生存时间设置为86400 Router(config-isakmp)#exit Router(config)# crypto isakmp : ISAKMP is ON //表明ISAKMP已经被启用。
ciscoasa(config)# username zhangsan password 123123 # 配置AAA认证用户 ciscoasa(config)# crypto isakmp enable outside # 开启IKE协商功能 # 阶段一:指定管理连接的相关参数,加密算法等 ciscoasa(config)# crypto isakmp policy 10 ciscoasa(config-isakmp-policy)# encryption 3des ciscoasa(config-isakmp-policy)# hash sha ciscoasa(config-isakmp-policy)# authentication pre-share ciscoasa(config-isakmp-policy)# group 2 ciscoasa(config-isakmp-policy)# exit ciscoasa(config)# ip local pool test-pool 192.168.1.200-192.168.1.210
Key Data: 配置ISAKMP POlicy(KS-1) crypto isakmp policy 10 authentication pre-share 需要配置所有KS和GM的" isakmp key" crypto isakmp key ccie address 202.100.1.2 crypto isakmp key ccie address 202.100.2.1 policy 10 authentication pre-share //只需要配置所有KS的"isakmp keys" crypto isakmp key ccie address 202.100.1.1 policy 10 authentication pre-share crypto isakmp key ccie address 202.100.1.1 crypto isakmp key ISAKMP Policy配置(KS-1) KS-1(config)#crypto isakmp key 0 ccie address 202.100.3.1 KS-1(config)#crypto
pre-share Center(config-isakmp)#hash md5 Center(config-isakmp)#encryption des Center(config-isakmp policy 10 Branch1(config-isakmp)#authentication pre-share Branch1(config-isakmp)#hash md5 Branch1(config-isakmp)#encryption des Branch1(config-isakmp)#exit Branch1(config)#crypto isakmp policy 10 Branch2(config-isakmp)#authentication pre-share Branch2(config-isakmp)#hash md5 Branch2(config-isakmp)#encryption des Branch2(config-isakmp)#exit Branch2(config)#crypto isakmp
SITE-A-ROUTER(config)#crypto isakmp enable SITE-B-ROUTER(config)#crypto isakmp enable 配置加密 ISAKMP 策略 SITE-A-ROUTER(config)#crypto isakmp policy 20 SITE-A-ROUTER(config-isakmp)#authentication pre-share SITE-A-ROUTER(config-isakmp)#encryption aes 256 SITE-A-ROUTER(config-isakmp)#hash sha SITE-A-ROUTER(config-isakmp config-isakmp)#encryption aes 256 SITE-B-ROUTER(config-isakmp)#hash sha SITE-B-ROUTER(config-isakmp)# group 5 SITE-B-ROUTER(config-isakmp)#lifetime 3600 SITE-B-ROUTER(config-isakmp)#end 查看 配置的ISAKMP 策略 SITE-A-ROUTER
SITE-A-ROUTER(config)#crypto isakmp enable SITE-B-ROUTER(config)#crypto isakmp enable 7、配置加密 ISAKMP SITE-A-ROUTER(config-isakmp)#encryption aes 256 SITE-A-ROUTER(config-isakmp)#hash sha SITE-A-ROUTER( config-isakmp)#group 5 SITE-A-ROUTER(config-isakmp)#lifetime 3600 SITE-A-ROUTER(config-isakmp)#exit (config-isakmp)#encryption aes 256 SITE-B-ROUTER(config-isakmp)#hash sha SITE-B-ROUTER(config-isakmp) #group 5 SITE-B-ROUTER(config-isakmp)#lifetime 3600 SITE-B-ROUTER(config-isakmp)#end 8、查看 配置的ISAKMP 策略
dh group2 //IKE提议使用的DH交换组 [R1-ike-proposal-10]sa duration 86400 //ISAKMP c策略所引用的ACL [R1-ipsec-policy-isakmp-1-10]proposal r1 //配安全策略所引用的安全提议 [R1-ipsec-policy-isakmp //DH组 [R1-ipsec-policy-isakmp-1-10]sa duration time-based 86400 //ipsec SA生存周期 [R1-ipsec-policy-isakmp [R3-ipsec-policy-isakmp-1-10]security acl 3000 [R3-ipsec-policy-isakmp-1-10]proposal r3 [R3-ipsec-policy-isakmp -1-10]ike-peer R1 [R3-ipsec-policy-isakmp-1-10]sa duration time-based 86400 [R3-ipsec-policy-isakmp
policy 10 Router(config-isakmp)#encryption 3des Router(config-isakmp)#hash sha Router(config-isakmp) #authentication pre-share Router(config-isakmp)#group 2 #阶段1至此配置完毕 Router(config-isakmp)#exit #接下来"配置阶段 configuration group test-group Router(config-isakmp-group)#key 321321 # 用户组密码 Router(config-isakmp-group Router(config-isakmp-group)#acl split-acl # 应用acl Router(config-isakmp-group)#split-dns test.com # 指定要分离出来的域名 Router(config-isakmp-group)#exit #阶段1.5至此就配置完毕了。
authentication pre-share router_config_isakmp# exit router_config # 相关命令 crypto isakmp key crypto isakmp # exit Router#show crypto isakmp sa Router# 相关命令 show crypto isakmp sa 5.1.3 crypto isakmp key 要配置预共享认证密钥 crypto isakmp policy 要定义IKE策略,使用全局配置命令crypto isakmp policy。 ISAKMP(xxx): dealing with Notify Payload ISAKMP: Notify-Message: NO_PROPOSAL_CHOSEN 双方配置的ISAKMP _isakmp# group 2 router_config _isakmp# exit router_config# 相关命令 authentication(IKE policy) crypto isakmp
命令: conf t ( IKE) crypto isakmp policy 1 (传输集/策略集) encryption des/3des/aes hash md5/sha group 1/ 2/5 authentication pre-share lifetime 秒 (默认86400秒) exit crypto isakmp key 预共享密钥 address 对方的公网IP地址 match address acl表名 set transform-set 传输模式名 set peer 对方的公网IP exit crypto map wenmap 1 ipsec-isakmp match address 100 set transform-set wentran set peer 200.1.1.2 exit crypto map wenmap 2 ipsec-isakmp 查看命令: show crypto isakmp sa 查看第一阶段状态 show crypto ipsec sa 查看第二阶段状态 show crypto isakmp policy 查看第一阶段的策略配置集
debug pvc nego debug atm all sho crypto isakmp display ike sa sho crypto isakmp display ike peer sho crypto isakmp
23.23.23.3 # //定义IPSec提议 ipsec proposal to_rtb (注:使用默认值:隧道模式、MD5认证、DES加密) # //定义IPSec策略,协商方式为isakmp ,即使用IKE协商 ipsec policy to_rtb 1 isakmp //定义需要加密传送的ACL security acl 3000 //选择使用的IKE对等体 ike-peer to_rtb 12.12.12.1 # //定义IPSec提议 ipsec proposal to_rta (注:使用默认值:隧道模式、MD5认证、DES加密) # //定义IPSec策略,协商方式为isakmp ,即使用IKE协商 ipsec policy to_rta 1 isakmp //定义需要加密传送的ACL security acl 3000 //选择使用的IKE对等体 ike-peer to_rta
IKE的组成 IKE也不是一个单独的协议,它有三大协议综合而成 (1)isakmp:(Internet Security Association Key Management Protocol),主要定义了 IKE与ISAKMP IKE的最终目标是协商两边站点之间建立动态的IPSec隧道,能够实时维护IPSec SA信息,而进行IKE工作则由ISAKMP报文来完成,在配置之前,了解下ISAKMP的报文,对于后续理解会很大的帮助 2、tunnel的local与remote 后面多了一个:500,在手动的时候为0,这里为500,表示采用isakmp的UDP 500 3、多了一个flow source与destiantion:这个实际上就是体现出来哪些流量走
==============================R0配置============================== crypto isakmp policy 1 encr 3des hash md5 authentication pre-share group 2 lifetime 3600 crypto isakmp key 1234 address 192.168.8.1 ! crypto isakmp policy 1 encr 3des hash md5 authentication pre-share group 2 lifetime 3600 crypto isakmp key 1234 address 192.168.1.1 !