| 用dynamipsgui做了个拓扑,想做vpn,但配了好多次都不成功,哪位高手帮忙给看看,我配的究竟哪有错误) _5 C2 b+ ]) o' h5 A 7 C" _/ }8 Q- F& _5 i  p1 ^0 N
 : L9 S  N# q. P  b0 f
 R1------R2------R3- O$ R8 s# x. B3 G' @, ]2 }" @/ T
 R1 G4/0(200.0.0.1) <----> R2 G4/0(200.0.0.2)          200.0.0.0 255.255.255.252
 & d7 R$ N; a% ZR2 G5/0 (200.0.0.5)<----> R3 G5/0(200.0.0.6)          200.0.0.4 255.255.255.252
 4 H6 H$ a& b; g/ Y0 J/ nVPCS V0/1 (1.1.1.2)<----> R1 F0/0(1.1.1.1)            1.1.1.0 255.255.255.0- M, c! _$ D' `* A- e& F* F- J7 ]
 VPCS V0/2(2.2.2.1) <----> R3 F0/0 (2.2.2.2)           2.2.2.0 255.255.255.0 8 ?/ D! y/ z6 K, w9 P8 i8 h
 XPC P0/0(192.168.0.2) <----> R1 F1/0 (192.168.0.10)   192.168.0.0 255.255.255.0 真实内网
 ! m" v3 H% E( X4 H8 B( s5 B; U" V( E/ [+ \+ p3 I( s! W8 t
 R1#sh run             - ?: v# w- `) ^1 F
 Building configuration...
 6 I2 E% @5 [' w8 ~Current configuration : 1999 bytes& T; e/ n4 Z4 j! i! E& e
 !
 9 Y% @& l  `' n& D' s  eversion 12.4
 9 [0 ^& j5 _: j5 F' Xservice timestamps debug datetime msec
 % a% a  [" Y7 M3 tservice timestamps log datetime msec: |' f/ s, p+ P. \: _! _6 p
 no service password-encryption
 ( M' e" K4 Y! ~1 f!
 # e! l9 a2 a4 H* Chostname R11 C8 \" [8 D4 s
 !
 . ~9 w2 z6 w( ]boot-start-marker9 F/ e: c5 r6 m: t; x; h
 boot-end-marker5 N! a( S9 B4 j5 @# U- C
 !& o& I6 |2 K0 w# B! U
 enable password cisco, t% q& K, b5 B& ]% Z
 !
 * t/ A' ?$ U$ ono aaa new-model
 & X4 t) i4 _5 u+ o8 x4 Lip cef- C! R' G: G) H/ q* g* x* N
 !0 k" c0 j1 c" r! V; O+ T7 t2 v
 !5 ^# P3 x' H* A* V9 {
 !# r2 R: A  g+ |5 x
 !) {8 ]# L! e0 i: i' h" P9 B
 no ip domain lookup  F* r: W4 }/ [: s/ Z8 O
 !
 $ @2 f( q" z0 E7 s0 {multilink bundle-name authenticated/ a3 v- e) a8 `* E' _
 !0 R6 i# j* H1 g" ]3 P' i
 !5 P2 Q$ ^1 P+ m: g& f+ z" \* z* ?
 !
 ( R0 H5 ?- T# N6 h# u!
 8 |& a3 A7 [- \' L6 ~8 G4 w+ d!8 J; f1 \9 J% a
 !/ G" V# `- g% u. A# H! n
 !
 " T, Y/ X2 ]+ Q& z, F!2 l/ g. r- a3 a3 R' M2 H
 !
 3 F/ E7 Y" f# q) Y* ^3 U6 g- N!
 % X* T: i1 Q, A* M6 z+ q& Q1 x0 J/ i!
 % D. \; X) `4 P2 A3 G3 d!- w% d3 h" W. H8 k
 !; B& Y) ~! N; U
 !. U2 Y; a  X. M" m
 !4 c. v1 u/ m# K) u
 ! 2 D# r+ `7 {1 m" G6 }
 !
 . |( C( V% P) A" L2 Icrypto isakmp policy 25 i3 E3 Z8 _. D
 hash md51 Z: l% ?, L! R- }/ P: q
 authentication pre-share
 7 H9 \$ j. g, i* O" wcrypto isakmp key 123 address 200.0.0.6* M  U& y; d3 c& d
 !
 + Q# t: I  u& }& B* i!         6 f8 z) I- Z5 p0 f
 crypto ipsec transform-set toR3 esp-des
 9 u8 R. ?+ K4 T0 D+ y!1 g, O; n- x; W* t1 J  z& l
 crypto map VPN 10 ipsec-isakmp : w& F# ?9 Y7 n7 N
 set peer 200.0.0.6# V9 _9 s3 h7 z! \" a
 set transform-set toR3 8 H# e5 X# r# d0 O7 W# ?" e
 match address 110
 $ i. Z' |0 k# H+ a# k!0 q: v9 p3 I! t6 l+ k7 W4 M
 !4 b2 k- E. n/ ]  Q
 !& c9 F+ f" c5 _, h# d6 G% `3 M' @
 !; f( ~* w% x' @
 !7 E; t6 m4 b, v- [
 interface FastEthernet0/0# S; q4 |' S7 ], Q% f9 L9 w
 ip address 1.1.1.1 255.255.255.0
 $ h5 q* [, D1 K9 `8 Eduplex half  e& e, u" f1 u+ [
 !8 [" d5 W8 D' J" {
 interface FastEthernet1/0
 8 c$ E# V- e' t/ @. v% c0 f' Z7 Tip address 192.168.0.10 255.255.255.03 w# m; Z, B5 }* n0 O2 l. p
 duplex auto9 l2 p) t5 C& D' R* K
 speed auto! o/ m# ]0 ]3 C5 I$ J% G
 !$ d; ^! |. F& U# W
 interface FastEthernet1/1! X" L+ H6 d3 W( {+ ]
 no ip address9 G' d! \3 T- L  c2 A4 J
 shutdown
 4 Q+ p' ~* y6 o0 |1 d1 iduplex auto
 " H, i" ]4 I! Y; R+ C) n0 O8 f1 mspeed auto. S! t) W; h2 U3 j
 !
 : C7 Q0 B. z$ C( |& C$ Zinterface FastEthernet2/02 d  s. ?3 ?# q& ^9 R$ {) |
 no ip address
 8 B8 ]7 K: i+ {9 ]3 ~5 g7 w$ }shutdown- z( S. V) P: G* {" \  v
 duplex auto
 ' G( C/ {( G% w# F1 uspeed auto
 $ R0 F' L0 x! M5 `/ ~. p5 v!
 # ~5 Z& N, h  H) u. M: Minterface FastEthernet2/1
 % E' R) r. d, p6 q7 zno ip address
 " H% b+ ]9 ?# }2 l6 H3 ]" t! Ashutdown
 & Y+ s% l# f/ y$ |) }) Mduplex auto% F. g  I# K2 V/ U: N: z: i
 speed auto
 2 P# k* t, y1 f) _% x  G3 {8 I* {!
 ) v2 l& p0 F* U' yinterface Serial3/0
 ! X# G7 K  i, ]no ip address
 6 |1 Y0 H% }, k* g, oshutdown
 2 G, A0 l3 G$ l% Hserial restart-delay 0
 & d$ I7 ]" N( _; {, V* ^!$ y" W) T7 _# p: X/ c
 interface Serial3/1
 # k, z- S& a  F( R# z1 E# U8 Uno ip address. _- a, x% `" A3 n, `( _! K
 shutdown 7 y( {; R7 o: [, X- ^0 r5 r
 serial restart-delay 0
 + M) h6 [6 C4 S4 A!2 [2 h4 A' K, ~  T6 i7 L6 M
 interface Serial3/2
 # l  p" \/ b- H( N, I, u$ k" wno ip address( e1 ?- H, X( |& j0 V* H! m
 shutdown
 . n# x2 F, a" ^* o9 r! dserial restart-delay 0' I; `" G& g* c6 ^
 !
 ! R9 v9 R4 f" Z9 {+ @" binterface Serial3/3
 5 @/ e* |4 a& N' Y' j$ d/ lno ip address
 . }# E* j! s8 Gshutdown; G2 S; j5 t. a5 c3 E6 }4 G+ B: ?
 serial restart-delay 0' j' A' t& b$ w) U9 U# u
 !
 / g# Y. r- ~, l, C. P0 F' \* cinterface GigabitEthernet4/03 X' @2 \  @1 t# D7 D$ W
 ip address 200.0.0.1 255.255.255.2529 N* U+ z% y. K) {: X
 negotiation auto% d' j/ T7 k: ^
 crypto map VPN8 X7 G& a( B6 S" `/ s% m
 !( P0 w7 {8 E7 T; l+ X/ a6 x
 interface GigabitEthernet5/0
 - O) }' b; b: t: bno ip address3 t5 I5 a, f5 C% m7 o7 E( q
 shutdown
 ; d2 M/ m3 \4 n0 G$ Z' |$ Enegotiation auto
 $ D& w6 p: f3 d5 E!5 s0 h. k3 C/ I' @- C
 router ospf 1* y8 U  n# f2 q1 U6 n  {. E% ?
 log-adjacency-changes
 . w0 E% S6 ]0 u# ynetwork 200.0.0.0 0.0.0.3 area 0
 . h  m8 z7 \% d4 m1 [2 i; q!. `, r, W; m& O  d$ v3 g7 S: B6 o2 I
 no ip http server
 ! ?9 M0 P$ m4 C6 lno ip http secure-server
 * y3 z# z( h/ [" A!9 F5 ^  c3 M) H, q$ `
 !
 , q7 l# o* H  f" r( c2 P!
 6 [6 [6 h2 m  b" tlogging alarm informational
 c- X" h- r. o: Iaccess-list 110 permit tcp 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255
 P. I/ c6 j! uaccess-list 110 permit tcp 192.168.0.0 0.0.0.255 2.2.2.0 0.0.0.255+ P" `  h5 w9 W
 !
 & J& B& q9 p5 |3 p$ q6 n!) d( I6 z3 [, i5 x2 f- y, b
 !
 , n# i: U# l) V8 G!; |0 `2 R$ c+ j, D; P* W
 !- q, n7 {& H7 d$ _/ o
 control-plane' W& ^: J3 L& ^9 Y9 m+ l
 !
 " Y; I9 b2 U/ S9 h. k!$ l. m2 p9 q0 w3 c7 e% K
 !
 + _9 I8 X3 ^: `+ V!/ L+ w) ?* W4 d; B
 !
 ! Q* D' p8 H6 F7 E4 E!         - B" U$ B. \1 U% u, l1 H" I
 gatekeeper
 ' f/ Y5 e! P& s0 ?shutdown+ e. c( A  O! Z% ^" v9 S6 D
 !& z: q$ u5 ^9 `4 z
 !  h$ @& M4 X3 D8 n) ?+ _
 line con 0
 % g1 z  Q8 z0 z, f2 w" w6 Kexec-timeout 0 0- @3 s) j1 J) G  _# c
 logging synchronous
 3 |' {! s$ ?8 z" P. s  ~  Wstopbits 1
 % o6 H4 _1 [/ R! f) q0 e' \4 oline aux 0
 5 s6 u0 v5 F2 H1 B, dstopbits 1
 . j0 t& s  q1 [8 ?, P8 nline vty 0 4
 4 j, U9 h. f1 ~exec-timeout 0 03 }$ a2 N% J# Q
 logging synchronous
 4 i$ M; l1 Q! Q; @  Y6 {0 vno login" I$ g: [" Y! R& w
 line vty 5 1869
 s8 y% Y9 d4 D! F' p+ Mexec-timeout 0 0
 ' C& y+ i- G- {: S' blogging synchronous
 , g0 O1 v" v( b# M6 qno login
 8 [; d6 i+ u& S! V7 }3 j!
 3 `9 b" r% f3 w- T" ~!
 1 T, C8 d) v% \" Qend
 8 O; f- h0 {; X, H3 V. l, |$ m( i4 H2 E" n) Q- F
 R2#sh run
 , }; P! ^" @; C% z/ m# BBuilding configuration...
 : e" s! w6 J. b2 }Current configuration : 1633 bytes
 0 h; R) W9 \+ ?!
 ; i% P  z9 u& ]  ]0 nversion 12.4) L( y/ q  z: o# h( S+ u0 z6 A
 service timestamps debug datetime msec8 n# j0 h' g* I7 `4 l( M6 D, X( C
 service timestamps log datetime msec. _# E) g( m( S% S* s& T) j
 no service password-encryption  b: @4 K: _6 o2 N
 !
 " @. @7 b. I; Phostname R2, ?" q$ u5 }8 p& \0 V$ `
 !
 ( D/ H: S2 I* i8 p, P0 c2 qboot-start-marker- w- m) V/ i- I
 boot-end-marker+ I( I9 k. t+ Q; j: K& t$ w
 !  y( I/ U" s' F, Z+ r0 K+ p- K
 enable password cisco' D: N4 ?: _! O3 i% S; q5 @
 !
 I1 S# D( Q. Q9 `6 Hno aaa new-model( Y. g; [6 i. _% m3 M  W, i
 ip cef7 j0 B4 f* W: g8 Y. T6 P( {
 !5 C( }5 ]1 Z" v, k4 ^, F" D) X
 !
 $ s  @$ z- O8 [! D+ i1 C!# n, P; I) _) [
 !' k% I) Y+ Q$ H8 W+ r; H! }3 x% y
 no ip domain lookup
 8 d& K4 z( X/ v  \. s% b!% ^% |2 m' q& q% q  o$ z
 multilink bundle-name authenticated
 2 f- G+ k$ N+ {" g% t!' N% t1 d: t5 e* i" \) a
 !
 ) F+ E* h% T$ \3 M# ~!, T. w+ I0 y" K" q
 !; y* l+ k8 t5 Y* g( @2 r1 M
 !
 ' h- V% r8 n+ p% w. R!) F; ?& Y; n" e% S1 T# ?
 !& |# z" I+ i, ]# V& e, W
 !' l8 I+ w6 K4 \% P: F
 !" R) m9 Z% f$ d( ^9 h1 e, C) ^0 t, \
 !
 # g. c! }& c6 E- M9 f( O! Z!: }0 y9 _( p9 Z1 E" U
 !
 & {$ g9 {9 L# z1 q5 Z, H!5 y0 y8 \# d5 \) t. H
 !5 x) g' d6 c8 W1 o; `0 o# U
 !
 9 F: E2 L( z: |" _" O!
 b: @/ z( ~$ T/ `2 o, x$ [/ c!: Q# y9 n' r$ H
 !
 6 @, y3 G' n7 S/ K!3 Q- w4 `% K' T. j
 !( g  N$ U( P9 R: K; ~& p, y
 !
 % [1 M( x2 d; j& q& n8 d5 H  S% ninterface FastEthernet0/04 |2 {) P+ _9 @5 E! v" `
 no ip address
 % d/ A; g/ n& q) g' f- j8 hshutdown
 ; a- `4 p+ E) Vduplex half: }2 q6 K" P* h. \2 z
 !
 7 j: R8 {2 a! Q" {& s5 [interface FastEthernet1/02 l, ?. V! u, t$ e1 w
 no ip address
 ' y" L. X# n1 ]# ushutdown! R2 \  H8 F# X. E) l$ s
 duplex auto# ^/ |$ Q1 D; b1 u; h2 q
 speed auto
 % }! `# ~0 K; I7 E: J) b/ D3 X!7 t5 O; }, R$ L' }2 \6 x
 interface FastEthernet1/1( ?0 {9 v5 D! L/ X! q) H8 {+ G# `
 no ip address4 [1 R, i' q! A0 B9 {& g0 K
 shutdown3 U' e3 a, V4 q
 duplex auto
 5 S5 H; v; r$ ^' k* B# zspeed auto
 ) _" E6 u( x- E+ E) Y* e!3 o1 [' r6 K3 F! ?6 M9 F( `
 interface FastEthernet2/0
 6 r8 f4 }1 w. @: z4 ?7 [: ^; zno ip address
 , o( x- y% v4 U# kshutdown
 : z$ }6 C" l  o( _duplex auto
 " g% ~2 T8 ?: e( @% Xspeed auto: J0 P) M/ H0 w' W& _) B
 !
 3 [0 A- `! ]. r. s% J4 f8 r/ Tinterface FastEthernet2/1! L+ }0 B3 p: K6 M; Z$ v
 no ip address
 0 W, Y3 J  _) ashutdown% S* I/ {& r+ w$ v2 g
 duplex auto3 S7 M* n8 Y' v4 f& q/ w
 speed auto
 % q8 N( \  ^  q* ]!1 B: r* g3 x4 _6 P- R9 M
 interface Serial3/0
 % l1 ?' B( O3 d- fno ip address8 z  I4 c# i% O% I6 {+ K3 y
 shutdown% A; k1 t: @' a) x; L* |
 serial restart-delay 0
 $ {1 ]- U* K& W0 c2 S8 B8 \' J+ S!8 o7 q3 i- n; w; j  b
 interface Serial3/1" l% Y0 O& a2 }% `' O
 no ip address
 : Z8 P% w5 I. Q. C1 hshutdown
 ) C2 h1 [1 M  ~. G$ q' cserial restart-delay 0& R4 o, ~9 Z' d" o* m
 !7 Y( e' I* N; J1 O# Q% I
 interface Serial3/2  T  ^3 [& l4 X% T6 h9 O
 no ip address
 5 x3 N6 l0 P% m- V/ D. g( Dshutdown4 @9 N/ y; ]* N" Q3 g9 U
 serial restart-delay 0
 2 N5 ~6 ?" a% m: N& j!
 * C$ q2 Z, X, S% \& V' o. v& finterface Serial3/3
 ( D) y, Q8 f3 H) kno ip address" ?8 m' b0 @0 U- n1 o
 shutdown7 q/ K6 g. @$ t( `" s) S
 serial restart-delay 0# l6 y" l% W# p- c
 !+ a7 K/ ~) u0 W3 ?! d
 interface GigabitEthernet4/0
 9 ^: t( _+ B, a2 z, g3 P0 Z2 bip address 200.0.0.2 255.255.255.252
 6 M, ^1 C. l  Q9 {+ m0 z7 Inegotiation auto0 e6 |6 g* G5 F3 Y$ Y: D
 !
 ! n6 O; U: ^# H& j2 Q( O* Zinterface GigabitEthernet5/0
 , E$ T2 o! j; E& T) \ip address 200.0.0.5 255.255.255.252) }/ g5 ]/ Q4 k$ W& H% A2 a! G0 o
 negotiation auto
 ! d( l2 K" a8 j9 t!
 0 n; m8 y5 k9 Z+ q7 Z' xrouter ospf 1
 - C$ H* W7 G/ B( Glog-adjacency-changes4 [1 U3 U- m7 k! E
 network 200.0.0.0 0.0.0.3 area 04 N  Q3 C  X$ U' M
 network 200.0.0.4 0.0.0.3 area 02 J' `. Y2 U' N. O: o( f( S
 !
 8 ]2 }% |5 h2 @$ C7 S+ s: Gno ip http server( O# ?5 Q2 y0 w3 `( Y& b) r  Q
 no ip http secure-server
 0 C, ?7 n4 X* r7 F. k!
 3 b( h# Y) [$ T/ j) T!
 / l2 P4 e5 Q' e- |. Q' a!
 ! y  p: T; d/ c7 U9 T( C" z7 _& |logging alarm informational3 V6 q% d. b3 ~  u* ], Y. ^6 I
 !
 8 O6 |0 E8 D6 o0 _. }!
 " X1 t0 R5 d0 U/ f* {!           \4 ?+ A/ p* W$ R* G
 !
 ' Q/ l- L9 I* u5 G!3 g# `6 ~, G3 j% U% X$ M/ w( v/ z
 control-plane8 v9 L# u2 @6 W+ X1 K) o
 !
 ; {* j# u$ h9 ]!
 * h: b+ K2 _! ^( x4 f+ P2 B( J!
 , R, y# e; F$ ]5 ^4 ?!' c$ {1 y, B* t$ K, Q
 !7 t! n3 D. E+ }4 s. U% }
 !2 @7 B# A3 c3 F: a4 i( J" X
 gatekeeper
 1 w" O# |# O, fshutdown
 2 `8 G/ G( l7 c) u/ A5 d% I$ d!0 J3 y5 @# x- H9 A
 !
 5 K% z. `3 F) u3 z# g9 uline con 0( c. A& z, c' U8 l' `1 _6 Z' W# f
 exec-timeout 0 0. M1 o6 h  N& Q1 Z$ f# L( @
 logging synchronous
 " ?2 F2 l& R: o* p; U0 J1 U7 rstopbits 1
 ; n% H8 p5 s$ ?# K9 p' ?5 E# qline aux 02 k% S* m; O7 b' V! g
 stopbits 1" r* P) r- j/ q: F6 ~
 line vty 0 4' `/ A' @( V1 i( `4 t! w
 exec-timeout 0 0
 ' t/ x: K6 J$ c- o; `. Ylogging synchronous
 5 f. K/ s" q6 W: A# f7 l+ Vno login
 ! V7 n" Z, ]& Kline vty 5 1869
 ; f8 s! [2 n. J/ C4 J7 Zexec-timeout 0 0: o( v! Y, y, [- w" K/ o* I
 logging synchronous
 * ?% u6 E4 k+ ?9 ono login
 : B. E1 V* D. c% Z9 N5 {+ h!7 O; p, k7 T9 D  a3 a' ?3 n
 !
 ' Y8 C- w# [& D9 I# Wend
 - Z% F& w9 C2 C0 }2 l
 1 u. Z+ S( e* n$ I5 t5 b: [- ?R3(config-if)#do sh run: ^  B4 u5 l3 Y  u0 j- }
 Building configuration...
 4 A- @( d! y, o9 nCurrent configuration : 1976 bytes
 . f/ @  k2 A# ~+ K4 f4 H" q3 g' s!7 n8 x$ ]' ^* N" B2 }, D
 version 12.4
 9 [) x! f1 X1 Z' R2 o) @service timestamps debug datetime msec& H2 ]7 G4 W; |
 service timestamps log datetime msec
 6 X2 b5 D9 f% K/ Vno service password-encryption* L1 b; M6 Y1 E7 p5 G$ U
 !
 1 E. r- H2 t7 a2 N# F* s' Chostname R3- e" o: T2 D! G
 !0 Q3 L3 g, E7 a& a. Q3 C! t* E
 boot-start-marker
 G, X! e$ w3 s2 Y$ Lboot-end-marker
 ' ]- E+ t  f9 Z( D8 ?2 x6 a$ S!& H0 d' ^& r! _1 ~4 t% P5 \) w
 enable password cisco
 + S2 l' |+ k* b, f!6 n- H+ D( G' r/ _4 H  M7 ?
 no aaa new-model' d% m- ]+ x) S& f
 ip cef" y0 z) D6 q8 ~" h
 !
 7 a, d# L" ]) h1 X& o0 E!
 . u. b8 p' n6 u& ~% W9 D, ~!
 $ Z0 Z9 m, k" N!
 & G- y# `$ e! j3 a! Lno ip domain lookup& R5 |" i) J) s# L9 Z
 !
 6 I- M7 n5 x$ t/ I  G4 P" rmultilink bundle-name authenticated
 9 `! r; x0 @! C) V" l!
 ! m/ r5 v$ j* A$ O9 i. `!, [& D2 I$ a3 a9 E7 b
 !
 " P' [9 B$ G" V!+ Z+ E- X$ I9 |+ d5 e% M
 !! o* B6 B$ t! p) k
 !
 ( R8 A! O0 c& u9 I/ F* U!
 0 _( v9 ~4 _7 R/ a!3 R. M, ~2 L% z# \
 !
 # F# ~6 T$ u' L, P7 E" X/ p  t! B9 k!
 7 }3 k) `$ T4 t3 x  Z7 z9 F. D!. D5 U+ V' s+ S# ]( H/ F0 t
 !: w) Z+ }! D* Y8 r, x
 !, f3 ^% O3 f: n. B8 u. j0 C
 !
 , x+ x0 k4 {* ^0 _4 o/ m; l! n- X!6 }0 C( Z& {; w+ x' l, ]
 ! ( T; r( s% a- @. p. n! _) a9 G6 r  i
 !
 u2 Y5 I+ m' ncrypto isakmp policy 2
 3 @+ J* L. I% d. ?hash md5
 ! v/ E8 I* i6 {/ f2 J4 _$ ^% ?+ x# |authentication pre-share/ G* |% B2 W" e2 L
 crypto isakmp key 123 address 200.0.0.1
 % C# f3 t% h) j# d; k. t4 O& c( L!* |. e) p6 z  B1 `
 !
 5 q( \0 K; J! d" A" b5 R' H. `1 Y1 tcrypto ipsec transform-set toR1 esp-des , T3 R$ l+ C7 V" K. I
 !8 c9 n9 w' Z4 R# x' }
 crypto map VPN 10 ipsec-isakmp
 3 h& S  u- T6 _. sset peer 200.0.0.1& Y$ H2 H/ t; s# W& Y- Y" {5 [
 set transform-set toR1 " K7 I& y% E( X$ z, [$ n
 match address 110
 6 Y8 l( j. a: T3 C  d6 j* p!1 w3 ~' i1 V; [' @0 ^9 V3 _: k
 !
 ) d8 h% t* w' M) m7 y9 N  w! S8 l8 l!
 - o# F5 I: @) Z; m4 {+ t!
 : `% w9 T$ d- `6 j!
 % T2 B) Q) n' f& yinterface FastEthernet0/0' w" ?' E" j' [+ e# h1 P6 E
 no ip address
 / Q3 g( U- R0 I( a/ s. ^shutdown7 m0 D/ O' _" h8 I
 duplex half) _6 C, Y# ]9 ~' }+ L* J
 !. U) n) ^8 h( h7 a3 l
 interface FastEthernet1/0& V8 o2 s0 `3 k7 B; q
 no ip address
 ' e* U; F( c7 w4 y* K$ F. tshutdown# q5 Q1 K) ?8 l& h4 ^. ~
 duplex auto
 ! p) d7 r3 G( l+ X' k, dspeed auto
 % e1 q9 Z" t( a) h4 e!
 # n& c. E) Z4 g1 ]- g, T( tinterface FastEthernet1/1
 . p' y1 Z, O. L. \3 fno ip address
 * K: `# Y! |3 d2 n1 S2 W/ Nshutdown0 ?1 M5 `  ^: z) i
 duplex auto7 Q" O) ~3 y% a
 speed auto' }+ M6 Y- N. w
 !/ E9 k3 s0 r; p: z  y/ E8 [
 interface FastEthernet2/04 b  G' Q9 B4 W5 w2 h' D6 @
 no ip address
 6 i6 w6 w  I0 C( m4 I% B" ^shutdown" Q! P& C  W7 k, t8 g: v
 duplex auto' V2 M: o. |0 y- M0 X" R
 speed auto
 : Q- V1 R4 h* \!
 : `# `/ W$ V2 i2 ~" A+ C) J$ v$ sinterface FastEthernet2/14 |. b/ d; l2 v. M3 @" j' e9 W: O# R
 no ip address
 8 y$ ]. F; n/ ^+ ]$ T2 ]- xshutdown( Y# Q, P( c+ B
 duplex auto8 G. e. Y4 u6 Q3 ?5 p, p$ F
 speed auto) R0 {1 }5 f2 y2 [2 [
 !, [7 U% J1 Y1 X: j  y- j
 interface Serial3/0
 0 p1 E/ Y' k/ w( D9 A% e: B, V9 i/ }no ip address
 7 i9 w4 t% t; u1 i9 |shutdown1 }# x/ c' Z6 {9 N" M; U4 }
 serial restart-delay 0/ o- ^7 p% S: D. Y- L" s8 @, _' r0 o
 !
 ( d1 C! R5 b% Ginterface Serial3/1
 ' n  U0 X: S  {& p* H3 Lno ip address
 $ L# X# }/ m. ^$ M! Y$ N( u. tshutdown
 1 q" g2 s6 D8 tserial restart-delay 0
 + b. U! Z) h+ Y6 x. k2 u!
 * c* n  k/ C' G. K* J( I7 Linterface Serial3/2
 8 G2 B0 k! f4 X4 Eno ip address: X1 d  u1 H( {
 shutdown9 I( \$ b4 G: A
 serial restart-delay 0
 5 G' }9 t. D5 J4 s!
 * a9 w6 M3 u+ R( Z% `interface Serial3/3
 . z; |6 [- a. l, O- fno ip address
 I- L0 Y) k1 a2 c4 {) dshutdown# Z& V/ X1 _* m4 q. o
 serial restart-delay 0( S; w4 O. U5 J( W3 ?/ Y
 !
 & ]; z% I! F9 P& K! n+ ]interface GigabitEthernet4/0
 " ~* ]* D; r$ {  Y, H6 dno ip address
 3 [3 ]2 l/ Q% o  {, Bshutdown
 4 M1 X  X: U$ R" q$ mnegotiation auto
 7 K) l3 U; \- Q' p. I0 @!$ u0 h4 r9 T4 i3 ^) F
 interface GigabitEthernet5/08 M4 G/ M- L% M8 Y! O
 ip address 200.0.0.6 255.255.255.2522 F+ T4 G: H+ f
 negotiation auto: Z8 s. h- ~8 o$ q5 f6 x% h/ U7 m
 crypto map VPN
 # i% H0 ?3 r) S8 y!! B! Y- \2 n! m2 R6 p6 m# p3 W4 ~
 router ospf 1  |2 V2 s, t8 [
 log-adjacency-changes
 + e) O" d1 z7 u: mnetwork 200.0.0.4 0.0.0.3 area 0% O0 b( \, s1 l; ]2 ?: T
 !/ X- q% M& Z: s# p7 J
 no ip http server, t4 Z% p* \" N1 t4 e& r: z
 no ip http secure-server/ @& h& s: c2 I9 W' f
 !
 $ G8 q- A( T; B!& z( A6 u3 h4 [) Y" D% c, a- T, o
 !
 # }+ `# G; K8 k8 Qlogging alarm informational7 a* T/ r+ a8 ?- [
 access-list 110 permit tcp 2.2.2.0 0.0.0.255 1.1.1.0 0.0.0.255
 ) V' k  b3 n2 G* s, S' G% U8 oaccess-list 110 permit tcp 2.2.2.0 0.0.0.255 192.168.0.0 0.0.0.2559 |( p' a: y0 x8 f( N& ~! m
 !
 * X2 a2 K  Y, G$ j$ B!
 ( ?) t+ I( i" n" _8 z. l( h!
 / _$ E- \4 c) B5 w$ [3 i!
 - ~/ l: t8 c0 W2 C. O0 _% i!9 a- X7 R! x- q% H& Z4 Z9 }1 v2 L
 control-plane* {" B- M# t5 f# ~
 !
 2 @- g, K: {7 p!
 4 |, T+ {, D) V( ]; Z!
 i; [& m! B  o0 G!         6 G5 T( U2 W/ r/ d8 p' `
 !3 [5 C  z* q/ E7 T: a, S7 h
 !
 }' X1 q, s; |" r, m) xgatekeeper# B+ A2 S, O/ H( m: ?8 z7 S2 `
 shutdown
 % ^# S+ Z8 T4 y* X!. t; r( S% c) a. o; I8 f
 !( O6 C7 m6 N# n
 line con 0
 7 D( F$ g, b  \4 h8 {1 Lexec-timeout 0 0! v, l1 i4 g& i+ g8 p1 V" w0 C+ b  E& {* q
 logging synchronous4 S. I4 Q4 Y+ x. f3 z
 stopbits 1
 ( ^' ^. v( V8 ~) U$ i& r# Vline aux 01 _( h  x, M  y0 Y* d
 stopbits 1
 # L1 }9 w* H- L; ?: F; K( Aline vty 0 46 s3 c' V0 ^( D% X
 exec-timeout 0 0; |0 g  B" U( G( q4 A* S& z$ o
 logging synchronous
 9 \2 H" ]) x+ F7 \7 t' \! r- Jno login5 Q( p# e$ z/ \9 Z3 O" d( L
 line vty 5 1869
 4 y% I# \, U( c+ r( eexec-timeout 0 0
 3 C6 e/ k5 p) M! D9 N# y& Q1 blogging synchronous) T/ Q4 ]! o9 e- ?  v9 d
 no login$ ~( g. w: U. ~: l; Z# r0 g" u
 !4 K, U* d7 K- h5 T. ~
 !& o- g0 }; z" m7 y7 G+ h
 end
 |