日韩av黄I国产麻豆传媒I国产91av视频在线观看I日韩一区二区三区在线看I美女国产在线I麻豆视频国产在线观看I成人黄色短片

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 >

×××实验

發布時間:2024/4/15 54 豆豆
生活随笔 收集整理的這篇文章主要介紹了 ×××实验 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

?

1.1、IPsec ×××

1.1.1、實驗描述

在配制ipsec ***時一般按照以下幾個頻驟

第一.R1發送感興流量到R2(設定感興流量即ACL)

第二.R1和R2協商IKE 第一階段(phase 1)

?? * 確定密鑰分發方式

?? * 確定驗證方式

?? * 對等方確定ISAKMP策略(加密算法、hash算法、IKE SA生存期)

第三.R1和R2協商IKE 第二階段(phase 2)

第四.通過IPsec信道交互信息

第五.在無數據發送的時候自動關團信道

?

1.1.2、拓撲

?

?

如圖所示,R1和R2為兩個路由器,它們是通過internet連一起的,(但實驗是通過串口直接連在一起),R1的loopback 0模擬R1這邊的內網,R2的loopback 0模擬R2的內網,最后實現兩邊的loopback是通過×××實現互連的

1.1.3、基本配制

R1=========================

host R1

no ip domain-lookup

line con 0

logg sy

exec-time 0 0

!

int s1/1

ip add 200.200.100.1 255.255.255.252

no sh

int loopback 0

ip add 10.1.1.1 255.255.255.0

exit

?

R2=================================

host R2

no ip domain-lookup

line con 0

logg sy

exec-time 0 0

!

int s1/0

ip add 200.200.100.2 255.255.255.252

cl ra 56000

no sh

int loopback 0

ip add 10.2.2.1 255.255.255.0

exit

!

1.1.4、×××配制

?

R1=================================================

access-list 101 permit ip host 10.1.1.1 host 10.2.2.1

crypto isakmp policy 1

? authentication pre-share

? hash md5

exit

!

crypto isakmp key 0 cisco address 200.200.100.2 255.255.255.0

!????

crypto ipsec transform-set shanghai esp-des esp-md5-hmac

!

crypto map ***_to_shanghai 10 ipsec-isakmp

? match add 101

? set peer 200.200.100.2

? set transform shanghai

!

ip route 10.2.2.0 255.255.255.0 200.200.100.2

?

int s1/1

crypto map ***_to_shanghai

?

R2 ================================================

access-list 101 permit ip host 10.2.2.1 host 10.1.1.1

crypto isakmp policy 1

? authentication pre-share

? hash md5

? exit

!

crypto isakmp key 0 cisco address 200.200.100.1 255.255.255.0

!

crypto ipsec transform-set shanghai esp-des esp-md5-hmac

!

crypto map ***_to_shanghai 10 ipsec-isakmp

? match add 101

? set peer 200.200.100.1

? set transform shanghai

!

ip route 10.1.1.0 255.255.255.0 200.200.100.1

!

int s1/0

crypto map ***_to_shanghai

!

?

?

1.1.5、校驗

在R1上擴展ping?? 10.2.2.1

R1#ping

Protocol [ip]:

Target IP address: 10.2.2.1

Repeat count [5]:

Datagram size [100]:

Timeout in seconds [2]:

Extended commands [n]: y

Source address or interface: loo 0

Type of service [0]:

Set DF bit in IP header? [no]:

Validate reply data? [no]:

Data pattern [0xABCD]:

Loose, Strict, Record, Timestamp, Verbose[none]:

Sweep range of sizes [n]:

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 10.2.2.1, timeout is 2 seconds:

Packet sent with a source address of 10.1.1.1

..!!!

Success rate is 60 percent (3/5), round-trip min/avg/max = 172/238/288 ms

R1#show crypto map

Crypto Map "***_to_shanghai" 10 ipsec-isakmp

??????? Peer = 200.200.100.2

??????? Extended IP access list 101

??????????? access-list 101 permit ip host 10.1.1.1 host 10.2.2.1

??????? Current peer: 200.200.100.2

??????? Security association lifetime: 4608000 kilobytes/3600 seconds

??????? PFS (Y/N): N

??????? Transform sets={

??????????????? shanghai,

??????? }

??????? Interfaces using crypto map ***_to_shanghai:

??????????????? Serial1/1

R1#show crypto ipsec sa

?

interface: Serial1/1

??? Crypto map tag: ***_to_shanghai, local addr 200.200.100.1

?

?? protected vrf: (none)

?? local? ident (addr/mask/prot/port): (10.1.1.1/255.255.255.255/0/0)

?? remote ident (addr/mask/prot/port): (10.2.2.1/255.255.255.255/0/0)

?? current_peer 200.200.100.2 port 500

???? PERMIT, flags={origin_is_acl,}

??? #pkts encaps: 3, #pkts encrypt: 3, #pkts digest: 3

??? #pkts decaps: 3, #pkts decrypt: 3, #pkts verify: 3

??? #pkts compressed: 0, #pkts decompressed: 0

??? #pkts not compressed: 0, #pkts compr. failed: 0

??? #pkts not decompressed: 0, #pkts decompress failed: 0

??? #send errors 2, #recv errors 0

?

???? local crypto endpt.: 200.200.100.1, remote crypto endpt.: 200.200.100.2

???? path mtu 1500, ip mtu 1500

???? current outbound spi: 0xC57F1ABD(3313441469)

?

???? inbound esp sas:

????? spi: 0x9C8542B5(2625979061)

??????? transform: esp-des esp-md5-hmac ,

??????? in use settings ={Tunnel, }

??????? conn id: 2001, flow_id: SW:1, crypto map: ***_to_shanghai

??????? sa timing: remaining key lifetime (k/sec): (4416419/3493)

??????? IV size: 8 bytes

??????? replay detection support: Y

??????? Status: ACTIVE

?

???? inbound ah sas:

?

???? inbound pcp sas:

?

???? outbound esp sas:

????? spi: 0xC57F1ABD(3313441469)

??????? transform: esp-des esp-md5-hmac ,

??????? in use settings ={Tunnel, }

??????? conn id: 2002, flow_id: SW:2, crypto map: ***_to_shanghai

??????? sa timing: remaining key lifetime (k/sec): (4416419/3492)

??????? IV size: 8 bytes

??????? replay detection support: Y

??????? Status: ACTIVE

?

???? outbound ah sas:

?

???? outbound pcp sas:

R1#show crypto isakmp sa

dst???????????? src???????????? state??????? ??conn-id ?????slot ????status

200.200.100.2?? 200.200.100.1?? QM_IDLE????????????? 1??? 0 ?????ACTIVE

?

轉載于:https://blog.51cto.com/haolun/993027

總結

以上是生活随笔為你收集整理的×××实验的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。