本站已运行

攻城狮论坛

作者: fvillman
查看: 614|回复: 0

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[路由交换] 用dynamipsgui做了个拓扑,想做ipsec vpn,但配了好多次都不成功

[复制链接]
查看: 614|回复: 0
开通VIP 免金币+免回帖+批量下载+无广告
用dynamipsgui做了个拓扑,想做vpn,但配了好多次都不成功,哪位高手帮忙给看看,我配的究竟哪有错误
1 z+ }! L  R, [; d+ ~0 u1 Y) j8 c3 _5 r8 _

" `/ K2 X/ Y6 F: B* gR1------R2------R3
( f; Y% J5 C# c! s9 tR1 G4/0(200.0.0.1) <----> R2 G4/0(200.0.0.2)          200.0.0.0 255.255.255.252% e9 f3 Y2 ~3 I; w7 }8 v
R2 G5/0 (200.0.0.5)<----> R3 G5/0(200.0.0.6)          200.0.0.4 255.255.255.252   
: a  O0 d6 P7 p' |7 z( T; ?# {VPCS V0/1 (1.1.1.2)<----> R1 F0/0(1.1.1.1)            1.1.1.0 255.255.255.0
9 q! d; \: ~! i5 k* Y/ I+ j2 AVPCS V0/2(2.2.2.1) <----> R3 F0/0 (2.2.2.2)           2.2.2.0 255.255.255.0
' B6 \9 n5 e) c* ?0 }6 CXPC P0/0(192.168.0.2) <----> R1 F1/0 (192.168.0.10)   192.168.0.0 255.255.255.0 真实内网. M, X8 s- S) Y# ^; U0 V) e9 f1 l
9 Z' |& Y& o: l3 y& Q" _
R1#sh run             ' q# B, _' `* T) ?
Building configuration...
: b6 n; i% J, GCurrent configuration : 1999 bytes7 C. @  F$ B7 o$ n4 {/ r4 X. `/ Z! b
!
% \- \+ z8 z  h9 z5 \8 [3 Fversion 12.4$ s5 U8 ~$ S- Y; z3 `  g
service timestamps debug datetime msec
. L: ?, H& Y+ o- dservice timestamps log datetime msec
( L: f/ g/ _5 g  u3 B8 Jno service password-encryption
3 W2 S1 q) m! c" R!5 [: @! [. N, ^; J8 \, ?2 M9 d# |0 C
hostname R1
$ o# ~2 u" m6 f) O- k- ^!, U$ i- r4 z+ n; U
boot-start-marker$ C5 z; K2 m. v! f
boot-end-marker
! W4 r, e* w; v: w! N!) }2 y9 X, D& @3 B. b5 G7 ~! j" S
enable password cisco% S$ f" s. d* D$ B' _2 R
!
+ e; x  r; K9 z* u. Q7 }( vno aaa new-model7 y  [! L" }  s- E
ip cef- G( o5 c% ]4 y$ T/ p1 L' y# T% d
!. c+ ?7 @! j( a0 Q
!
# b# j  J7 e) {# B. V( o$ A4 S' l!2 o8 Z$ k. A( V# M. i3 s8 C
!
5 K1 v1 N9 A: y0 I8 h, mno ip domain lookup
+ ~0 e) {: s, h!9 q  _  K. N* a* v+ T' E
multilink bundle-name authenticated; [0 L& u% [* u
!/ f- ?0 D# O' S4 }. }7 d
!" E' R, J1 D8 Z9 R9 J0 d9 t7 z4 ^  Z
!: Q& l  }  y* N$ y* ?- _+ Y) j3 F7 x
!
) I- M6 H9 I" J) B+ q& h!
7 F$ C8 z( F9 A!  {) F7 E" F: I7 L
!+ T" l+ g+ o. A% _7 j, v4 j
!% W& |1 x$ ~, s& |" Z5 ~# {$ k4 Z
!4 `1 R- w' v/ e
!* Y5 t8 ~& F/ Z, D! X! n4 @
!
* P2 @( Z# }, N' @) q+ ^!
9 k' j) w6 S4 y; z* D/ j; j!
9 ~6 [9 f7 o0 F; u( b& h: G# z!
. w3 ?! V* c, W" s* u7 {!
$ c; S% H; ]5 X8 G0 q+ b!
! W1 r# s: f* t. E( d!
3 s* _/ ]# r0 N( Acrypto isakmp policy 2/ m: ^0 ^3 X+ K) |% K
hash md5% L& Q# Q8 ?3 c8 p. p( G7 l
authentication pre-share* l, p8 Z$ H7 |3 `
crypto isakmp key 123 address 200.0.0.6
% A7 E- a: @; i! K+ {" u9 g6 R!. H6 T/ r( C# K3 ~
!         4 [" E$ ]  `4 V2 R( \: V6 U! Y
crypto ipsec transform-set toR3 esp-des . Y# B/ P  h3 i0 k
!5 v/ C& m2 b7 u9 H! b7 @
crypto map VPN 10 ipsec-isakmp
& b0 G  X. w; H. Fset peer 200.0.0.6
* H& A. |& `( D- Y7 ]/ Bset transform-set toR3
+ w$ K  B* n  O, ^) b, @: Imatch address 110
! {: l3 H7 ?' ]3 p8 z!: L1 ]/ \' m/ z# g2 C8 C( q: \
!) R. Y: m9 Q9 D: E
!
; n; }: H( o. m3 @8 j* w: h6 b!% x$ Z3 y& T, l& w5 E
!4 v4 z/ w  N& _  d8 V: d
interface FastEthernet0/0
( V& i/ A! d6 G9 Z  m' {. }$ S- Gip address 1.1.1.1 255.255.255.0
& J& C+ P/ u0 O1 J" o, z' K" F- ~; Qduplex half0 B7 _- G' h6 a! [: f
!' P3 S$ ^$ x' A. ~9 o
interface FastEthernet1/0
0 q" j! S8 ]9 [: {" ~8 Kip address 192.168.0.10 255.255.255.09 \* C- o1 {. r
duplex auto! a/ t+ H7 ?  K: P
speed auto
& L) V( w! U8 I# C6 J!
! O" B/ R( B( |1 I2 Tinterface FastEthernet1/1
0 y6 J, B& ~$ D2 S- }no ip address
& P/ Q( V( k2 Ushutdown 4 h- K1 `/ j# U; O5 G: [/ p
duplex auto, p" a/ E  y- L+ A: @
speed auto
6 @" r0 e" w, L3 |. D$ k! J6 M' t6 ?!
$ }! q  {- T  [5 T! X2 }% winterface FastEthernet2/0
: j# n6 s6 ~& j# |; sno ip address
0 u1 E3 z; B! a4 fshutdown
! [, Y" ?9 S2 {- W! q5 g# [duplex auto
: _( Y/ a4 g. i. e) d/ J& A) ?speed auto  C* [3 R. D9 m* ]9 n0 M
!$ U7 D; E. ^3 L! s- q) q6 @
interface FastEthernet2/1
3 z2 _( F0 o" l+ B1 `, ?  p7 y3 r) w$ zno ip address* h/ |2 u0 j* I/ c1 s+ K* w
shutdown
2 ~7 A- n5 {# y' b7 gduplex auto% n: A% |1 Q% {: d2 M0 z
speed auto3 S9 {. y) @$ a& M8 P4 W
!
$ p8 ^$ t, A- l5 c+ Z: sinterface Serial3/0
* _, |" @9 T' l! ~' J$ {no ip address; c" O9 {& C+ n: K- q
shutdown
* a/ q8 U& A4 B# i- ^7 Hserial restart-delay 0
* V+ P/ ~; v2 F1 _!
/ y  g& w8 b) g' m; s9 Q! Iinterface Serial3/1
5 L4 ?0 Y) U! ]; Dno ip address3 x- b1 h1 t1 i0 K
shutdown : X4 H$ `3 H  @" X
serial restart-delay 0% D" G' R* e9 k; w+ ?
!- n- ~9 c8 [+ c  w- W
interface Serial3/2
  D+ _% e3 x! K' A7 n/ V! }1 Ino ip address
/ ?0 L2 [: R. ~shutdown$ x) O. O9 a& G! m/ q) [" ~  X
serial restart-delay 00 h( E6 D  E4 f# M) }* j) S
!
# t" x/ y5 x: l# ^4 H5 ointerface Serial3/3
% |9 h$ m. E5 K/ n, Z& Ino ip address
9 p9 i" M2 M7 N( R! cshutdown
3 ]) F) b* m4 ]6 Sserial restart-delay 00 J1 C" I- ]- r
!7 H1 a! q' b  b9 \
interface GigabitEthernet4/0. q+ q$ l, l: Y0 P
ip address 200.0.0.1 255.255.255.252+ V0 o: |0 M5 r6 P# F, ~& R' U
negotiation auto
' k: N/ u4 j& C" @crypto map VPN
  x) @4 ~$ [$ D+ M. I!
8 b7 y* d0 E# U/ U7 h5 minterface GigabitEthernet5/0
# P  Z( d/ Q( }: C9 s; e, a; x: Wno ip address. n) ^) N- S! f/ C' Z# @' z
shutdown4 \. ^( K9 K  e- j& u( M
negotiation auto! |" F' P3 s" a1 _3 ^4 p" k% B
!8 H- `" _- z: W! w3 K. B  U
router ospf 1
" A& W+ O% x5 D3 Q) _log-adjacency-changes2 Z( s% V; `% \  ?7 F* y
network 200.0.0.0 0.0.0.3 area 0
0 z# r- j. T% P, _0 Y0 b5 e!
! w# _5 ^2 Z& a$ c+ Hno ip http server
7 @  V. @7 _4 j4 F8 h, N' \: G1 Vno ip http secure-server
- }2 |9 {1 v6 I1 f& V  J7 n!
. X9 X& {& B4 q3 F  p!
% ?( i2 @2 h- w; Q8 i# e+ S6 i!
1 V4 J* X6 c6 Qlogging alarm informational' v. m2 i- Z1 j" h* L. g4 i
access-list 110 permit tcp 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255
; n6 h, U% G1 p+ H- `access-list 110 permit tcp 192.168.0.0 0.0.0.255 2.2.2.0 0.0.0.255" I+ R0 ~6 h8 L  B  X
!
: E( j' _( h8 ^4 D8 x+ y!
& b8 }$ U8 }$ s* d. }4 b!
% |" f4 J6 C/ W3 j!' o, K; d0 S0 S
!
6 j" [- Q$ U* B+ f# K% C, `control-plane/ `: L6 b% L; d& s7 B+ O$ }/ _( G7 H! u
!# M7 J+ i( l4 E$ h6 }; x( d4 E" w
!# I  a% P9 D9 k% q
!+ \  W$ |$ H  a& f) {0 O: y4 M, o
!% a1 E' p( X9 z: ]" N
!9 e. u5 n; l# Q" T1 Y, e% Y
!         
( t. y" l) ^9 u' Q7 _gatekeeper: @( C9 \% C7 T1 o: A& A
shutdown( _8 Y# [  R0 u1 \. Q# S: E
!
' g1 a+ ?$ m& M) ]& {7 P. r!
1 y2 v9 C1 s( g' e4 L7 O' ~7 o6 |line con 0# O  a/ m$ D& |5 L6 E, p
exec-timeout 0 0
6 p9 W; a) Y& Ologging synchronous
7 s, M6 n" M1 s7 R) Ystopbits 13 G0 [, o2 K3 {# r/ P, {
line aux 0
; ~: {7 J, m) g6 F5 Y6 B. e8 ^stopbits 1
9 f  ?) x; z) V9 O! H8 Zline vty 0 4& D+ F, \0 q3 A5 p
exec-timeout 0 06 z0 j2 P0 x, c2 S6 A+ D
logging synchronous/ {* B7 O! q, P  h0 \8 x# r
no login
/ C- q3 Q/ {: b3 tline vty 5 1869
% B. O1 \4 U  T9 mexec-timeout 0 0
9 W! e- B/ [: b7 E8 D& e. B& K% K2 I& b5 zlogging synchronous- @- A" j2 i& h& l  l) W) H& @
no login
3 B* _: K2 l! X8 j!
& c# p- \# C8 t9 o/ l' W9 K!" l( }  Q2 q7 a7 G; N9 M
end2 f/ m! t; \: k; ^" M4 U' y$ d

# N9 ]0 G. \2 DR2#sh run1 D* d/ ^1 f# S
Building configuration...
' Q. |; a5 r) B* P+ N9 g+ {Current configuration : 1633 bytes5 W! \" C) @. w1 b
!" {" P8 _$ I' N  @; \3 ^
version 12.4
% t1 c4 i$ \2 C  _/ gservice timestamps debug datetime msec$ u, b4 q" q3 H  |
service timestamps log datetime msec
/ A2 d  r# e3 ~) N$ a. W3 J. ^0 Jno service password-encryption% M1 t9 w8 T4 N
!
) ]2 l7 w! |5 c7 B. nhostname R2+ m* H/ P; W) X6 Y6 Y: A
!* @& v/ _% u0 h! x; c& [
boot-start-marker
! u- B; T+ Y5 [" ~) Gboot-end-marker
" Q' m6 S9 j/ r!
* C/ b. d$ d; |enable password cisco
0 K2 e( a2 R7 g1 \9 C/ D!$ Y* W# L9 j3 z* `: I
no aaa new-model
: ^( D5 v1 P9 c& s! K/ d, _8 I2 Zip cef
" f7 [6 v5 b0 X!( S9 D+ O) f! K) B
!
* o# e* ~+ c, d. L!
) r& p) \& D2 F! D!
% X# `9 Z8 j% H* R' y. Bno ip domain lookup
4 b9 n9 \+ D9 I& i!
- I0 q7 T; C3 z. V. e' G9 i' Zmultilink bundle-name authenticated( N" ^6 Y! a. C! |
!
$ o9 w8 @; Y1 x5 n!
5 W, U7 k9 h6 j, O  ^!( g1 m: g) s7 H7 }* \) k
!
; c# Q1 u3 q) |4 T!
. `, O+ P( T2 {( q! F!8 @- Z- I  w) L, i/ B; H
!
) W1 J. m! p9 C!' j% S2 v+ P+ W7 L
!
$ w. g5 I5 d" d3 f% r; L!
( s  L0 _8 M4 l7 Y" \, B!
* d( S" ?* ~8 R! ?2 y!
' L3 C  N1 @5 y' d!
) q& C/ ~& h6 d( M  F$ o!3 R5 m6 ]3 H2 C! Z2 |
!! }* O; Q' e# s
! . I4 c) A6 b* K+ e+ ?( d3 f
!+ d1 u! ?3 Z" h) j' o+ w
!
" V0 x/ h; v( q. [4 q!' I) t0 V+ b8 Q
!5 d+ W/ |5 d4 ?; q$ [
!
& a# u7 O. e; V3 ?* i7 sinterface FastEthernet0/0. K: O* ~1 g( D' F. C
no ip address  E1 y) N: e# J, ]2 w0 l& y
shutdown
, `. S( r, u0 \* n' V' m3 [duplex half
, i" X, _& P: c& s. L!7 l; }; A' t( X" S& W9 p
interface FastEthernet1/0
$ j9 W! V" c4 [# {' G- e. Pno ip address# q; m4 }( F9 o
shutdown
4 }2 f; C2 {8 B8 Q4 v# Wduplex auto
9 ?1 f+ J* [% z) {, espeed auto/ ~. k6 m% {9 {
!7 a- ^4 C+ r  w, ^+ D
interface FastEthernet1/1
9 n3 O1 c) G1 B) |7 B6 [no ip address
6 _) V* s2 H) ?  f6 W+ F4 Fshutdown
2 M4 _- P+ l! v: zduplex auto) Y/ [9 m( C. B9 p$ z& E
speed auto
8 p5 I' R, @9 Z!
" z+ J" n; V6 ?2 B0 Hinterface FastEthernet2/0
. E; ]0 q! M, z' w6 G5 \! lno ip address
4 }+ y1 q: C* J( q6 Z3 `5 J3 jshutdown
+ y* n0 U. R7 z0 bduplex auto
: {) A3 O" r5 d* h5 espeed auto
) p( [$ e1 B" W' \!7 f0 r7 M$ D1 X/ p
interface FastEthernet2/1
9 T3 L0 Y+ {0 `! @no ip address( e9 u. H! x+ n) A# o) p7 F% j
shutdown* B: g9 k7 A8 m" Q1 i- M; z( B8 j
duplex auto* d! T$ ], g$ {# n4 D
speed auto
0 A2 [0 T. ?" q+ X, l9 a0 U!
' _  p/ L' O8 u4 z; Q3 Tinterface Serial3/0
- l6 B% m* f$ z% Y/ S' V6 Hno ip address
  F. l: `. j) jshutdown" `; H  M4 ?; x" Y
serial restart-delay 0
9 k8 W9 C# D; z3 P! [!; [2 \4 y  @" t& \; S
interface Serial3/1
1 B# e3 [, W. a* l# @no ip address
$ c' U- U  e) o& `- Hshutdown$ e8 a& e: i- z$ P; ]; F
serial restart-delay 01 b2 [/ S. Z1 o4 n2 ^2 D7 G
!
5 @/ z' T+ ~# \% j( X% c5 tinterface Serial3/2
: z( X8 b0 G6 Q( z" fno ip address2 g! W1 o! u. }7 ^# O9 ?& ~
shutdown1 v- m' s3 j  c7 @# p6 r9 {( B
serial restart-delay 0
0 O. m# N: `$ N; i; b, l!
$ k8 G6 h5 }7 G; O- d, m7 D$ a/ jinterface Serial3/3
. A. U! H, Y4 E- t+ u; ~  Yno ip address
8 x; J) V2 H+ S" N0 B) Eshutdown7 Q, N2 U, s$ r- G) Y# q
serial restart-delay 0
. l1 \6 p: ^& E, `: M!
, i* G8 ^* W0 Q9 V# F! c  n9 Finterface GigabitEthernet4/0( Q8 c- E1 ]# H$ l
ip address 200.0.0.2 255.255.255.2524 C9 C9 B/ b. @9 E
negotiation auto1 h! B7 T' N5 H) ~* N1 ~
!4 x; @0 \0 C# Z0 P
interface GigabitEthernet5/0- y, A( e9 S4 c' Q0 d! E
ip address 200.0.0.5 255.255.255.252* B3 M5 E, Q% r7 b% H+ s
negotiation auto
% Y8 ^/ s' e) v0 |% r2 I7 o" M!) N# `3 z1 R. I
router ospf 1
# o) L7 Q$ L; x3 A, I  Z2 ]# a; Jlog-adjacency-changes7 f9 Q' w4 X9 T. R! P" Y" R3 Y
network 200.0.0.0 0.0.0.3 area 0/ r+ j: g$ k( h8 r2 @
network 200.0.0.4 0.0.0.3 area 0( I! y) D- \( m- x+ D
!5 N0 G( j$ S7 n: Q
no ip http server
9 `0 S9 a* \' w0 c" }no ip http secure-server
+ P8 ^+ X" n, H3 f!
# o, \. b# x1 s4 E2 [3 T!- _2 M' I$ v7 X% U9 w9 V: Z
!
) a6 {0 Y8 G4 l% Q2 T, \logging alarm informational
& z/ l) J: j1 o0 j0 ?! F!
0 I( @: L0 Z% J, a* I( O3 M% K!
1 {$ O$ ~) {" T! n+ y: G6 t!         
4 w1 l. N+ O$ ?& F9 ?" O!
/ u7 d, ?9 R- I!: U  R1 h+ [) d- v( X* r
control-plane8 t: `& ?* O# l, F/ P
!+ \6 S+ X7 `" S$ w5 w1 M
!; \# S# y' R$ ^# h$ X; C
!+ a: v# i' E. Y
!& W$ o/ e. I/ @* ]' y4 G( H
!
4 T. w7 i5 }* E$ a!
* H* M( o/ w1 E$ X& ^* e" T: |gatekeeper
: N) k% a: x  M  d6 w! [$ H& I' p* I, d/ rshutdown
/ j, D% Y' ~# u" ?3 \!7 Z0 i+ h9 {$ [2 l$ k' s# @8 ~
!
5 h8 r+ m8 g: Q7 c: nline con 0
) d- z* f5 K, J2 {exec-timeout 0 00 `5 d5 {6 R5 v6 X
logging synchronous
" _; F# \: i+ V, V% }; I% ostopbits 1
0 ]) }. R. c6 `8 P; Tline aux 0
- [2 _5 K* ]- `4 s+ Hstopbits 1
6 n( r4 @4 {4 y# nline vty 0 4. p8 f* e2 O6 s3 |/ ^: W* X+ j: B, S
exec-timeout 0 02 l4 z# w; ^: S2 d! ?
logging synchronous
6 `+ x5 v3 S% B1 n4 Eno login # w( f! M& Z; z9 i' u+ _6 D
line vty 5 1869
2 D2 W! w: b  C4 W+ R8 g. S% y5 Pexec-timeout 0 0
3 F+ C% l$ M  N' x" p3 }# blogging synchronous+ D3 o1 S& D0 p5 `# Y) A
no login
# S( D  a  T4 ?" O' F  I!
' z( b" b- S# l1 j  B1 O! Z!0 r% l% w4 Q) X: }- y0 U, \8 L
end; q  x, @& O# r! ?
3 k$ A8 }5 \) w' D
R3(config-if)#do sh run
, _& d/ Z  h. f; A0 ]Building configuration...) a0 h, q: w7 ]* j1 e# c, _* S' y
Current configuration : 1976 bytes  \" L5 e$ S# r8 m! P& ?
!4 C7 S% F; U0 U& [% F4 N7 x
version 12.4! s2 r) U; k/ H& v; y7 p
service timestamps debug datetime msec
2 G+ E% c' S( }1 p7 Rservice timestamps log datetime msec
; t# k; o# d4 i, a' d/ }no service password-encryption
/ y0 `# K3 q" q+ i. v!
6 F# E+ U2 Q3 i+ y; c# Chostname R3
3 G8 @' i9 ^5 \0 f  C7 F7 ^!
$ a! ~) S% s/ p$ x9 uboot-start-marker
: _7 V; f# v; j' l/ B/ Wboot-end-marker
0 P4 r+ g$ }3 I. ^!* x% G5 @$ {3 e  F
enable password cisco
) v8 C+ ?8 F1 |" C6 b2 N  Z!
, F6 E9 _" _  q. t# g* W4 @6 mno aaa new-model
7 C4 E, R5 r# f+ qip cef
' H+ e  x  T& {# d7 n) s!; D" s# y/ u- U1 S# M! w
!
, r! Q. g! U3 Y+ I* l!
9 w9 ^; f7 R# i" x7 j! O# I!( f4 u& U' i& D( A  J: F  s( A9 E
no ip domain lookup
4 S1 e3 o, j4 _: i, [* K8 P- h!$ V7 A) g, W1 ~$ u
multilink bundle-name authenticated
% z3 z# l& [5 ^$ Q; m" z( d1 D!8 x' u0 F$ a# z- d6 W
!$ k% @1 M; K; T+ R
!5 N$ u' ]7 I! E. n
!6 e' n7 j; C8 X% ^8 R: c, c' ^0 l& [
!
5 e& q; q" C. E6 G4 w7 q!3 o8 I+ P# a1 |/ n  h5 o! N
!
7 V3 A( E" O, e, h!
. w" p+ [. ?" N7 C!
2 ?0 Q# p, {4 O, @!
  }# Y) ~* I# P8 j+ @!! d" x( }. Y6 k% B2 ?4 f
!
2 S% V) E* V5 l$ A!5 B0 S2 @; T- e
!
$ E; Z; F* {# S* b!, |) u! Q% e( i- s
!
% \# ?  ?1 F# ~4 k!8 G9 Z1 X9 T! D# ?7 A" l
crypto isakmp policy 29 V" ^  r3 y4 [. V
hash md5( t, H* d4 L# i4 g  i" m
authentication pre-share
; [# s* C, k1 V" H% G/ Q4 h' h1 fcrypto isakmp key 123 address 200.0.0.1
  w  a* z& G: J# ?- P, Y!8 S2 `) `( C7 _9 B. N" }8 a/ e
!         
* X* i0 K9 D1 @+ k3 F4 gcrypto ipsec transform-set toR1 esp-des
  h8 n. F& R2 i& R+ n  }!2 {3 x# B: ^! ?: U1 k' [7 I
crypto map VPN 10 ipsec-isakmp 0 r( _, @  b1 n! B. k
set peer 200.0.0.1
8 t) Q! `1 o( G5 b+ E# W- G; ?8 ]set transform-set toR1
3 A. J8 H$ ]3 }; V/ V$ K9 q8 C  Z4 m3 ematch address 1107 L" E9 l7 S2 w9 e$ K: O
!
, [+ R' E& }: r5 ]6 i!
" x' {: H; X6 N+ S9 Q  k5 u" ?!5 l" C/ \- B3 z/ e5 O
!* |5 P" `9 N  Q4 h7 c2 ]
!  ~% x, K: o8 k) l; f% m3 \
interface FastEthernet0/06 H3 b3 R0 b" A# I- e
no ip address+ D* c" _8 P+ |' X6 W! C) S
shutdown
- H( l' u- q+ j4 G( a% Dduplex half0 n! z' I6 C3 [+ ^8 e& M4 w
!
4 F; U! n; O- n' r+ B8 \9 dinterface FastEthernet1/0
% J% k$ s& Y3 I6 K) Uno ip address
5 M4 ?- @( j/ F# }' L" K3 sshutdown+ x( h7 j1 _& o
duplex auto
5 s$ H% i8 H5 s6 K9 y/ ?speed auto3 P; [9 m$ k+ Z$ ~( n0 X1 z
!
2 @8 l) D2 N$ y- q0 r) q2 Tinterface FastEthernet1/1
8 a- Y! A; a8 N4 E! f& `no ip address% f) U' `% k. A8 {' c0 }' F
shutdown0 a6 f: A7 l8 Y1 a$ }( J$ J) c, J
duplex auto; x; D  ~0 v  Y4 R
speed auto. w7 D7 Y! M5 q& }
!( O9 s5 L5 ~$ O* V" u: Q% V( j# l
interface FastEthernet2/0' q6 u/ H# r( a. w1 @1 t% _
no ip address
  ]0 d4 R6 u# a. d% Cshutdown
; A  P+ M5 k; ^8 t+ l( Aduplex auto
! ~  g7 j) a4 l: y/ C1 Uspeed auto$ ]& l* ~9 F$ V
!
. x5 s+ L1 j/ C! d' T5 G0 `interface FastEthernet2/1+ ]1 ~( e6 |0 n
no ip address* Y% R+ o8 q- I3 O4 C" d, O
shutdown! f1 X" C6 \# z. B$ Z7 k
duplex auto7 \" ]$ V$ p: r) _3 r8 t/ d
speed auto0 A- G. k+ w/ m/ D' g0 U8 K1 \
!
5 B1 t  N7 ~, s; F& u( ~5 M  X7 Iinterface Serial3/00 g% D6 V  X+ A+ r, J3 b- Y% H
no ip address* P, `1 P' p. W
shutdown% K- X: F/ y4 d% A  h% ~
serial restart-delay 04 S5 o5 I7 u: ~3 Y/ j. L9 _8 Y
!' \  F& B5 {8 @7 s
interface Serial3/1  K- D. _  {( _
no ip address8 i( X& g3 T) F
shutdown0 |# ~; U8 i0 h( M; c0 C
serial restart-delay 0
+ \0 }1 G) M) R5 \!
% L! e9 x' D7 [# ?interface Serial3/2- }) T- g$ \. n5 s5 k: B# v
no ip address0 Y' S; w' s2 l5 c) p. r" s
shutdown$ P$ R: A& h) k  X: P/ K$ P, p
serial restart-delay 07 I! R- ^/ F1 E$ r# }
!7 A7 z0 }8 @; n9 N
interface Serial3/3
  b2 Z9 F0 x) \no ip address
5 t3 u$ T1 p, kshutdown
" o5 M9 t) g+ @1 f1 d6 z; c8 _  ?5 pserial restart-delay 0
) B& e3 J1 H- c8 u7 T% _!
" }7 o, M7 _# w  W3 A% W/ Ainterface GigabitEthernet4/0
& y. I& H: u* }$ b4 \no ip address/ w, t  \- J1 a+ W( ?! Q& b. K2 ]- a
shutdown% u0 Y4 w, A: @# K
negotiation auto
' E- t  E: i4 `9 E3 s: U- k" u!" h$ U9 M/ u1 f
interface GigabitEthernet5/0! b5 q0 N* O5 f. b  F# c; F9 I( ]' x
ip address 200.0.0.6 255.255.255.252% b4 X+ T7 q$ N2 X6 m0 `# w
negotiation auto) `) M1 M, |: z' g
crypto map VPN& W! B$ o; c& I/ `5 ?9 |8 j
!
9 j9 f  h: x. C/ B+ t5 ~4 }  P' @router ospf 1
' ^$ V! Y6 ]$ @8 X% ?/ b- E7 xlog-adjacency-changes
! ~  G8 R/ p7 J7 e+ v# Tnetwork 200.0.0.4 0.0.0.3 area 0
: j+ L  e0 y) L6 d; U+ o!% y  ^5 ]8 _& C+ j7 B
no ip http server& \* J8 |: g1 x( q3 v/ `
no ip http secure-server7 H+ I, K& W( j8 q
!' |$ m. v/ Z. G1 {# C: X& C9 ?
!4 k& M7 J( f  T6 w! D2 I# m. a
!
  I  }. b& l  P8 M+ }8 S2 i- Llogging alarm informational
8 E3 L! C2 w8 xaccess-list 110 permit tcp 2.2.2.0 0.0.0.255 1.1.1.0 0.0.0.255
. @# @* K2 e- Faccess-list 110 permit tcp 2.2.2.0 0.0.0.255 192.168.0.0 0.0.0.255( g( {0 V- w3 n  @
!
, z1 H( j* q# ]# H# e7 w) Y; x!
7 I& F1 s' C) L( H+ k0 `!* w# ]7 S' s& G4 |. \: ~
!% T9 f( e  _. k% {9 w/ c6 C2 @: `
!
$ ], z2 S* K1 Q; v% k. {control-plane- V/ ?2 T  v& O) q
!3 m# @2 {) G; t, p+ P
!
! |+ ?2 [& D$ f0 ]! t; I!$ @8 F1 i% b2 G6 n5 q- X
!         ! ?$ N  x6 C3 M
!9 s4 f4 T: {$ C- E+ k+ h' A0 C
!% O  |+ n: B: R
gatekeeper; h5 N3 \! t1 M/ k
shutdown
, G1 r! r: [) S0 O) i# I4 ^!9 M- m4 d% `$ {: @  ^) ?
!
6 _3 [3 x5 i) |. b+ @" G4 rline con 01 O  e$ t. K) I8 q
exec-timeout 0 0
, z' l+ n0 f- Slogging synchronous
7 A" I4 f: {- u9 \4 J4 P& Ystopbits 1
0 ]4 p  }5 O+ |/ y; p% iline aux 0
0 y- d4 f# _9 B- U% Estopbits 1
7 Q% \3 X) N5 H2 Y2 fline vty 0 4# l% l; H) g$ t  e$ a4 S  k
exec-timeout 0 0
+ v6 u( p) b9 x, T+ a  r; B8 j% ologging synchronous
" P0 F  J! F, b5 N+ L# j8 Eno login
8 Y2 A( N# z  R9 uline vty 5 1869
" n! N# }  ]8 {- [8 a3 fexec-timeout 0 0
6 j% f/ J; l8 G2 X9 Z: @7 U- M3 jlogging synchronous3 ^# m; K5 X, W: m! U" j7 R
no login; `3 g" S. f! y0 b( |
!
) v  j2 \1 L# {$ J  j!
# U& B0 y8 J' @8 R7 h- M* lend
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2025-10-31 05:12 , Processed in 0.116026 second(s), 13 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn