
我按秦老大的REMOTE VPN的实验,但是ping不同内网,查看客户机,发现只有加密的包没有解密的包,show R1的isa sa 没有任何信息
1 h$ {0 y. l+ W) ], f请问是怎么回事:7 B' r l, y6 n: l5 T
R1
0 }: R9 m. W4 O& n, v2 C; {. z9 \1 C0 E' ~
!/ U8 [& w0 {+ J t, x; C8 q
version 12.4! a- i, u8 p) ]; a
service timestamps debug datetime msec
' s2 T, s: k5 Iservice timestamps log datetime msec. s, @0 @# R! |" p. x- V: v+ x+ }
no service password-encryption3 q2 l! [; W/ i. F1 }8 o
!6 {1 i, \# X$ u" s5 K7 p4 A4 u% R" R4 h
hostname R15 d+ P4 w# M E. [8 z; q
!: l4 \$ p. L) g8 A- d# J* ]0 }
boot-start-marker. h* w7 a) x& L% N! p6 I8 ^
boot-end-marker% n' i' k( ?; e% f& `
!1 c7 n7 ^& O2 z2 m4 k
!2 _# w9 W' S! O, O5 A$ o: R" Y
aaa new-model
) r* \4 q4 q4 n" W! P4 a1 r!
. h1 n! P V* ]9 t5 q0 |!# G i$ V8 p( a& i# o! S
aaa authentication login remote local
. P' F# q8 M: D0 ]8 G* A% g8 ^aaa authorization network remote local
4 b: Q- l0 g6 k6 Y) Q& ~- W!: o! D$ v2 Y& k, `7 r* l6 k
!
' v1 s! C: b4 S) {, ?aaa session-id common
3 _% T" p! C2 P9 umemory-size iomem 5
! G% F' ^/ h$ Q/ L+ H! X2 ?' Hip cef
9 [ V7 N( F, [1 j5 W!
/ G2 J) \ p E$ S3 c' y+ F!
$ k1 n, E) g' ~6 G; F! , {) ~/ [ }' \' m( N
!
/ w$ ?9 `2 J/ jno ip domain lookup% E b2 D& h h5 T1 a: f
!
# k4 v% c- T8 v" i5 l4 {multilink bundle-name authenticated. J/ D; {- {* H
! - Y! |7 f3 r: | g
!
5 m: E3 [% h9 W3 Y0 w! # t, y0 c/ M6 W3 d1 S
! ' V& W: I% S* C
! # s# P7 y- j! C; B) l9 M% t
username remote password 0 cisco
/ c. M6 q O& N8 k9 C!
( {, ?6 n0 h4 M! F! & m( J( o; l6 y: Z* N3 K
!
' M( `6 D/ z( @) tcrypto isakmp policy 10 r( O) M! S; @# i$ i- T) u7 C
hash md5
4 ~4 Z8 c! n! J, O. \9 v j' uauthentication pre-share* ?0 {- _, |8 b8 k
group 2
. [/ ]3 b5 n$ h! # S4 R% _ o( a4 f* h
crypto isakmp client configuration group xiaoyu
( |+ W, n& K2 w4 u$ O1 f" F# b/ D' G' Ckey cisco* c& g3 p9 w/ Q. \) l# x1 R
pool xiaoyu
6 s* i$ d/ `6 X4 e _acl 106 P; L8 N% t5 D- O" }
crypto isakmp profile xiaoyu' n- W. b2 Y7 O! D- R
match identity group xiaoyu+ p8 Q8 z$ p/ s
client authentication list remote/ h2 U$ x! z& o* @ b
isakmp authorization list remote
) P5 f1 I d6 N; ~) Iclient configuration address respond
. ?3 \0 G4 @/ N7 y! 4 M6 S: `, c& F8 J: y: i9 }
! % e" J1 s2 j7 H9 u O6 D7 E! z) ^7 {0 W
crypto ipsec transform-set trans esp-des esp-md5-hmac - P. s6 l' r$ [! Z
!
4 r) y" Y0 d# n8 t Y/ l9 ccrypto dynamic-map cisco 10
& I8 A& \, Q. yset transform-set trans ' o% n3 `0 w" E5 Z% ^' e
set isakmp-profile xiaoyu
/ y/ c! R4 \9 @; mreverse-route4 ^5 [: \3 z/ V5 k8 v$ O h
! ' p( G7 d* o& k9 J! D5 l) g
! 7 K# T% o! D6 @6 ?6 {3 L+ j
crypto map cisoc 10 ipsec-isakmp dynamic cisco 6 R' p" F( G+ F$ |3 D
!
, P. U0 D$ w, \3 a- V8 q!
. u& \* E9 p) S5 K' K1 l!
' f* A3 r' Q' o6 V2 _!
3 l" G M3 P* Q3 Q5 ]8 v9 E5 jinte**ce FastEthernet0/0- p: W: P6 [7 S. n5 p# Q
ip address 192.168.1.10 255.255.255.0" i1 s3 x, Y+ \, S2 s
duplex auto
' O7 i- W( G8 X5 rspeed auto! O" Z# x) H" y
crypto map cisoc- u6 H. N% |& G# U/ K3 ^
! 3 J6 h: ?! ~. C3 j5 ]0 m. ~+ t7 X
inte**ce FastEthernet0/1
4 u; k5 V: a9 L3 a- lip address 10.1.1.1 255.255.255.0
. A* M- P- [ @4 C: q6 ^) Tduplex auto
! q# V2 Q* \( jspeed auto) j- x& R* Y) m9 Q5 s
! + f* K. u9 h5 t1 F4 N+ H% \& Z
ip local pool xiaoyu 10.1.1.10 10.1.1.20' P' D7 Y% o+ ?$ {8 b
!
' K0 u% F Q1 }% m% n!
, C( ~9 Y! z3 J2 p, Jip http server+ V. {; z$ H# v8 g! @$ M$ D6 f
no ip http secure-server2 h5 P2 V$ p" S% m% k
! ! c$ @! f$ w8 m
access-list 106 permit ip 10.1.1.0 0.0.0.255 any
8 `2 C; Z* F! @, T: d+ V# _3 _!
2 N" D5 z7 a$ b2 q+ H! 1 q8 y4 \6 f& Y
!
; I0 B( a! W+ v4 a6 Q, z!
4 U" ?6 h0 q' A8 K; A! $ Z U$ j) Z5 m4 H
control-plane( B+ g" n( Y9 {3 d3 Y! J
! * A! S& D& E; K9 d' S
! 5 n. E; a% u i4 ?
! 9 j- J& j2 E) D7 |
line con 0
4 a$ w& i0 ~/ \/ e8 R, a" D- mexec-timeout 0 0. r1 ]6 U1 a- K
logging synchronous
: z) ~, `! c8 B; q% f2 S. Yline aux 0
8 a. n7 Q9 K: \5 }. bline vty 0 4
1 U: S8 K9 g9 T2 B! ! {/ q$ W' \ B, F9 j' P9 m
!
) J2 \) E1 ? J r# h$ Rend * ^, ?1 v* M! w6 y7 s& P/ O9 ~
: J* ^; b/ s' g5 N) f" mR2
# U3 y) z6 i" z4 B( W4 H) L2 w0 \
+ Z9 Z" y$ u4 ~- B5 f. l1 z! }" s7 dversion 12.4- F' F/ L( p6 \2 D
service timestamps debug datetime msec/ D! H+ v; B$ z0 m% d2 `- i
service timestamps log datetime msec
$ e J' A2 a3 D9 Z$ s. Cno service password-encryption
+ l: Z' c( m$ L. o# i' Z& K' E!: ?* O2 m, D3 M1 I, T
hostname R20 d! r* H) M6 G5 L# U# M0 p
!1 [ [* X9 `0 b4 |1 U
boot-start-marker
: a! ` A! U) _% k- M; ^boot-end-marker
) s' r+ Y+ Z! s!5 j4 s: W1 o7 d
!8 ~* c$ ?5 I) m. Q5 l
no aaa new-model
- c* s2 E K" K% j$ r: Z! ^memory-size iomem 5
! d8 p. H" v+ `0 c2 fip cef
( E; S8 A8 v/ u6 C& D!6 _, g7 l! y0 Q+ w# D* y3 c
!3 o) k! U. `" E. i
!; z6 G* W% e7 w* H9 M
!
3 k2 a* }0 f, I0 G; hno ip domain lookup# e3 x/ g+ }0 o
!* z' u: U4 o9 S+ c2 S
multilink bundle-name authenticated8 y6 D5 {$ j3 M% y
! - X) K3 v2 e" n O5 ]. k7 v
!
2 b% z+ O' ~% ?& a' [, i1 ~6 C: e! 4 B7 h) |' I4 o, ^% y7 N o
!
2 ?8 t- U9 D4 D* Y+ N: R E!
0 C, B2 T* S$ y! $ P$ U: P* s; d6 K0 F0 s( W
!
3 y, C$ L/ Y: m6 G% }" N2 a; a, h! t! / f T5 A I. x
! ' ?5 d& x$ C8 E" U/ D- H* Q
! Q. Z: n9 ]; j+ f. h
! * R3 s- p% c& X$ x8 b
inte**ce FastEthernet0/09 Q$ s2 S0 l" b
no ip address
# h2 r4 d: }6 B' z7 Zshutdown 5 Z# J! M: ~9 g) v9 D* {
duplex auto8 Z4 x# b& {- u* j
speed auto) V4 O! t1 g0 _5 q
!
4 b2 x4 c. ?* Pinte**ce FastEthernet0/1
7 U1 J; y1 [# [5 u5 tip address 10.1.1.2 255.255.255.0
& x' u) m2 y4 e# k/ G. E% T- o; {duplex auto
: u6 R4 L' v# @# j+ q @2 h1 Aspeed auto g$ n) Y" y8 I {% C/ j9 x \; x
! % l9 F9 x: @# j& v T
ip route 0.0.0.0 0.0.0.0 10.1.1.1# }# z3 c4 Y* D8 v( a- H, _
! 9 I* V. t' d$ x: t3 l3 |0 Y, Y
! $ M6 p5 R/ {3 q+ _0 D$ P
ip http server
1 h+ A% ? |9 L0 {0 u* C" U' sno ip http secure-server
2 e3 l, P, O1 F0 {5 Y; @!
, B. F. A) J6 C! 2 k `9 [) i8 L0 _' q
!
# B5 ^: H* T. ~- z! }$ W3 e3 k y, A2 _" h
!
( o# l" p5 s5 R" z& _: q# [# P! 3 _8 I7 t7 ^1 M4 B( H" s
control-plane5 }. k, l2 y9 ]: F/ ^( \/ C/ F
! 1 U4 @% N. f5 H& n9 l6 g$ S
!
. }# w# K9 Q/ t- q- Z!
) p. A0 T6 |" N4 \line con 0+ f8 A5 d4 U* K" B5 p* t5 d, K
exec-timeout 0 0
4 H/ g- i% d; b6 K( xlogging synchronous' r t, U1 M% j \
line aux 0
* ^4 H$ K ~% J; O% g! y" lline vty 0 44 h* Z5 {0 a# f* w+ y! b1 E9 G: F
!
4 _% p0 Z( a# \, l# b) | o; x4 t!
2 k( b4 D1 ~# O: v/ b% F }$ l9 I) ]end |
|