本站已运行

攻城狮论坛

作者: fvillman
查看: 613|回复: 0

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[路由交换] 用dynamipsgui做了个拓扑,想做ipsec vpn,但配了好多次都不成功

[复制链接]
查看: 613|回复: 0
开通VIP 免金币+免回帖+批量下载+无广告
用dynamipsgui做了个拓扑,想做vpn,但配了好多次都不成功,哪位高手帮忙给看看,我配的究竟哪有错误) _5 C2 b+ ]) o' h5 A
7 C" _/ }8 Q- F& _5 i  p1 ^0 N
: L9 S  N# q. P  b0 f
R1------R2------R3- O$ R8 s# x. B3 G' @, ]2 }" @/ T
R1 G4/0(200.0.0.1) <----> R2 G4/0(200.0.0.2)          200.0.0.0 255.255.255.252
& d7 R$ N; a% ZR2 G5/0 (200.0.0.5)<----> R3 G5/0(200.0.0.6)          200.0.0.4 255.255.255.252   
4 H6 H$ a& b; g/ Y0 J/ nVPCS V0/1 (1.1.1.2)<----> R1 F0/0(1.1.1.1)            1.1.1.0 255.255.255.0- M, c! _$ D' `* A- e& F* F- J7 ]
VPCS V0/2(2.2.2.1) <----> R3 F0/0 (2.2.2.2)           2.2.2.0 255.255.255.0 8 ?/ D! y/ z6 K, w9 P8 i8 h
XPC P0/0(192.168.0.2) <----> R1 F1/0 (192.168.0.10)   192.168.0.0 255.255.255.0 真实内网
! m" v3 H% E( X4 H8 B( s5 B; U" V( E/ [+ \+ p3 I( s! W8 t
R1#sh run             - ?: v# w- `) ^1 F
Building configuration...
6 I2 E% @5 [' w8 ~Current configuration : 1999 bytes& T; e/ n4 Z4 j! i! E& e
!
9 Y% @& l  `' n& D' s  eversion 12.4
9 [0 ^& j5 _: j5 F' Xservice timestamps debug datetime msec
% a% a  [" Y7 M3 tservice timestamps log datetime msec: |' f/ s, p+ P. \: _! _6 p
no service password-encryption
( M' e" K4 Y! ~1 f!
# e! l9 a2 a4 H* Chostname R11 C8 \" [8 D4 s
!
. ~9 w2 z6 w( ]boot-start-marker9 F/ e: c5 r6 m: t; x; h
boot-end-marker5 N! a( S9 B4 j5 @# U- C
!& o& I6 |2 K0 w# B! U
enable password cisco, t% q& K, b5 B& ]% Z
!
* t/ A' ?$ U$ ono aaa new-model
& X4 t) i4 _5 u+ o8 x4 Lip cef- C! R' G: G) H/ q* g* x* N
!0 k" c0 j1 c" r! V; O+ T7 t2 v
!5 ^# P3 x' H* A* V9 {
!# r2 R: A  g+ |5 x
!) {8 ]# L! e0 i: i' h" P9 B
no ip domain lookup  F* r: W4 }/ [: s/ Z8 O
!
$ @2 f( q" z0 E7 s0 {multilink bundle-name authenticated/ a3 v- e) a8 `* E' _
!0 R6 i# j* H1 g" ]3 P' i
!5 P2 Q$ ^1 P+ m: g& f+ z" \* z* ?
!
( R0 H5 ?- T# N6 h# u!
8 |& a3 A7 [- \' L6 ~8 G4 w+ d!8 J; f1 \9 J% a
!/ G" V# `- g% u. A# H! n
!
" T, Y/ X2 ]+ Q& z, F!2 l/ g. r- a3 a3 R' M2 H
!
3 F/ E7 Y" f# q) Y* ^3 U6 g- N!
% X* T: i1 Q, A* M6 z+ q& Q1 x0 J/ i!
% D. \; X) `4 P2 A3 G3 d!- w% d3 h" W. H8 k
!; B& Y) ~! N; U
!. U2 Y; a  X. M" m
!4 c. v1 u/ m# K) u
! 2 D# r+ `7 {1 m" G6 }
!
. |( C( V% P) A" L2 Icrypto isakmp policy 25 i3 E3 Z8 _. D
hash md51 Z: l% ?, L! R- }/ P: q
authentication pre-share
7 H9 \$ j. g, i* O" wcrypto isakmp key 123 address 200.0.0.6* M  U& y; d3 c& d
!
+ Q# t: I  u& }& B* i!         6 f8 z) I- Z5 p0 f
crypto ipsec transform-set toR3 esp-des
9 u8 R. ?+ K4 T0 D+ y!1 g, O; n- x; W* t1 J  z& l
crypto map VPN 10 ipsec-isakmp : w& F# ?9 Y7 n7 N
set peer 200.0.0.6# V9 _9 s3 h7 z! \" a
set transform-set toR3 8 H# e5 X# r# d0 O7 W# ?" e
match address 110
$ i. Z' |0 k# H+ a# k!0 q: v9 p3 I! t6 l+ k7 W4 M
!4 b2 k- E. n/ ]  Q
!& c9 F+ f" c5 _, h# d6 G% `3 M' @
!; f( ~* w% x' @
!7 E; t6 m4 b, v- [
interface FastEthernet0/0# S; q4 |' S7 ], Q% f9 L9 w
ip address 1.1.1.1 255.255.255.0
$ h5 q* [, D1 K9 `8 Eduplex half  e& e, u" f1 u+ [
!8 [" d5 W8 D' J" {
interface FastEthernet1/0
8 c$ E# V- e' t/ @. v% c0 f' Z7 Tip address 192.168.0.10 255.255.255.03 w# m; Z, B5 }* n0 O2 l. p
duplex auto9 l2 p) t5 C& D' R* K
speed auto! o/ m# ]0 ]3 C5 I$ J% G
!$ d; ^! |. F& U# W
interface FastEthernet1/1! X" L+ H6 d3 W( {+ ]
no ip address9 G' d! \3 T- L  c2 A4 J
shutdown
4 Q+ p' ~* y6 o0 |1 d1 iduplex auto
" H, i" ]4 I! Y; R+ C) n0 O8 f1 mspeed auto. S! t) W; h2 U3 j
!
: C7 Q0 B. z$ C( |& C$ Zinterface FastEthernet2/02 d  s. ?3 ?# q& ^9 R$ {) |
no ip address
8 B8 ]7 K: i+ {9 ]3 ~5 g7 w$ }shutdown- z( S. V) P: G* {" \  v
duplex auto
' G( C/ {( G% w# F1 uspeed auto
$ R0 F' L0 x! M5 `/ ~. p5 v!
# ~5 Z& N, h  H) u. M: Minterface FastEthernet2/1
% E' R) r. d, p6 q7 zno ip address
" H% b+ ]9 ?# }2 l6 H3 ]" t! Ashutdown
& Y+ s% l# f/ y$ |) }) Mduplex auto% F. g  I# K2 V/ U: N: z: i
speed auto
2 P# k* t, y1 f) _% x  G3 {8 I* {!
) v2 l& p0 F* U' yinterface Serial3/0
! X# G7 K  i, ]no ip address
6 |1 Y0 H% }, k* g, oshutdown
2 G, A0 l3 G$ l% Hserial restart-delay 0
& d$ I7 ]" N( _; {, V* ^!$ y" W) T7 _# p: X/ c
interface Serial3/1
# k, z- S& a  F( R# z1 E# U8 Uno ip address. _- a, x% `" A3 n, `( _! K
shutdown 7 y( {; R7 o: [, X- ^0 r5 r
serial restart-delay 0
+ M) h6 [6 C4 S4 A!2 [2 h4 A' K, ~  T6 i7 L6 M
interface Serial3/2
# l  p" \/ b- H( N, I, u$ k" wno ip address( e1 ?- H, X( |& j0 V* H! m
shutdown
. n# x2 F, a" ^* o9 r! dserial restart-delay 0' I; `" G& g* c6 ^
!
! R9 v9 R4 f" Z9 {+ @" binterface Serial3/3
5 @/ e* |4 a& N' Y' j$ d/ lno ip address
. }# E* j! s8 Gshutdown; G2 S; j5 t. a5 c3 E6 }4 G+ B: ?
serial restart-delay 0' j' A' t& b$ w) U9 U# u
!
/ g# Y. r- ~, l, C. P0 F' \* cinterface GigabitEthernet4/03 X' @2 \  @1 t# D7 D$ W
ip address 200.0.0.1 255.255.255.2529 N* U+ z% y. K) {: X
negotiation auto% d' j/ T7 k: ^
crypto map VPN8 X7 G& a( B6 S" `/ s% m
!( P0 w7 {8 E7 T; l+ X/ a6 x
interface GigabitEthernet5/0
- O) }' b; b: t: bno ip address3 t5 I5 a, f5 C% m7 o7 E( q
shutdown
; d2 M/ m3 \4 n0 G$ Z' |$ Enegotiation auto
$ D& w6 p: f3 d5 E!5 s0 h. k3 C/ I' @- C
router ospf 1* y8 U  n# f2 q1 U6 n  {. E% ?
log-adjacency-changes
. w0 E% S6 ]0 u# ynetwork 200.0.0.0 0.0.0.3 area 0
. h  m8 z7 \% d4 m1 [2 i; q!. `, r, W; m& O  d$ v3 g7 S: B6 o2 I
no ip http server
! ?9 M0 P$ m4 C6 lno ip http secure-server
* y3 z# z( h/ [" A!9 F5 ^  c3 M) H, q$ `
!
, q7 l# o* H  f" r( c2 P!
6 [6 [6 h2 m  b" tlogging alarm informational
  c- X" h- r. o: Iaccess-list 110 permit tcp 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255
  P. I/ c6 j! uaccess-list 110 permit tcp 192.168.0.0 0.0.0.255 2.2.2.0 0.0.0.255+ P" `  h5 w9 W
!
& J& B& q9 p5 |3 p$ q6 n!) d( I6 z3 [, i5 x2 f- y, b
!
, n# i: U# l) V8 G!; |0 `2 R$ c+ j, D; P* W
!- q, n7 {& H7 d$ _/ o
control-plane' W& ^: J3 L& ^9 Y9 m+ l
!
" Y; I9 b2 U/ S9 h. k!$ l. m2 p9 q0 w3 c7 e% K
!
+ _9 I8 X3 ^: `+ V!/ L+ w) ?* W4 d; B
!
! Q* D' p8 H6 F7 E4 E!         - B" U$ B. \1 U% u, l1 H" I
gatekeeper
' f/ Y5 e! P& s0 ?shutdown+ e. c( A  O! Z% ^" v9 S6 D
!& z: q$ u5 ^9 `4 z
!  h$ @& M4 X3 D8 n) ?+ _
line con 0
% g1 z  Q8 z0 z, f2 w" w6 Kexec-timeout 0 0- @3 s) j1 J) G  _# c
logging synchronous
3 |' {! s$ ?8 z" P. s  ~  Wstopbits 1
% o6 H4 _1 [/ R! f) q0 e' \4 oline aux 0
5 s6 u0 v5 F2 H1 B, dstopbits 1
. j0 t& s  q1 [8 ?, P8 nline vty 0 4
4 j, U9 h. f1 ~exec-timeout 0 03 }$ a2 N% J# Q
logging synchronous
4 i$ M; l1 Q! Q; @  Y6 {0 vno login" I$ g: [" Y! R& w
line vty 5 1869
  s8 y% Y9 d4 D! F' p+ Mexec-timeout 0 0
' C& y+ i- G- {: S' blogging synchronous
, g0 O1 v" v( b# M6 qno login
8 [; d6 i+ u& S! V7 }3 j!
3 `9 b" r% f3 w- T" ~!
1 T, C8 d) v% \" Qend
8 O; f- h0 {; X, H3 V. l, |$ m( i4 H2 E" n) Q- F
R2#sh run
, }; P! ^" @; C% z/ m# BBuilding configuration...
: e" s! w6 J. b2 }Current configuration : 1633 bytes
0 h; R) W9 \+ ?!
; i% P  z9 u& ]  ]0 nversion 12.4) L( y/ q  z: o# h( S+ u0 z6 A
service timestamps debug datetime msec8 n# j0 h' g* I7 `4 l( M6 D, X( C
service timestamps log datetime msec. _# E) g( m( S% S* s& T) j
no service password-encryption  b: @4 K: _6 o2 N
!
" @. @7 b. I; Phostname R2, ?" q$ u5 }8 p& \0 V$ `
!
( D/ H: S2 I* i8 p, P0 c2 qboot-start-marker- w- m) V/ i- I
boot-end-marker+ I( I9 k. t+ Q; j: K& t$ w
!  y( I/ U" s' F, Z+ r0 K+ p- K
enable password cisco' D: N4 ?: _! O3 i% S; q5 @
!
  I1 S# D( Q. Q9 `6 Hno aaa new-model( Y. g; [6 i. _% m3 M  W, i
ip cef7 j0 B4 f* W: g8 Y. T6 P( {
!5 C( }5 ]1 Z" v, k4 ^, F" D) X
!
$ s  @$ z- O8 [! D+ i1 C!# n, P; I) _) [
!' k% I) Y+ Q$ H8 W+ r; H! }3 x% y
no ip domain lookup
8 d& K4 z( X/ v  \. s% b!% ^% |2 m' q& q% q  o$ z
multilink bundle-name authenticated
2 f- G+ k$ N+ {" g% t!' N% t1 d: t5 e* i" \) a
!
) F+ E* h% T$ \3 M# ~!, T. w+ I0 y" K" q
!; y* l+ k8 t5 Y* g( @2 r1 M
!
' h- V% r8 n+ p% w. R!) F; ?& Y; n" e% S1 T# ?
!& |# z" I+ i, ]# V& e, W
!' l8 I+ w6 K4 \% P: F
!" R) m9 Z% f$ d( ^9 h1 e, C) ^0 t, \
!
# g. c! }& c6 E- M9 f( O! Z!: }0 y9 _( p9 Z1 E" U
!
& {$ g9 {9 L# z1 q5 Z, H!5 y0 y8 \# d5 \) t. H
!5 x) g' d6 c8 W1 o; `0 o# U
!
9 F: E2 L( z: |" _" O!
  b: @/ z( ~$ T/ `2 o, x$ [/ c!: Q# y9 n' r$ H
!
6 @, y3 G' n7 S/ K!3 Q- w4 `% K' T. j
!( g  N$ U( P9 R: K; ~& p, y
!
% [1 M( x2 d; j& q& n8 d5 H  S% ninterface FastEthernet0/04 |2 {) P+ _9 @5 E! v" `
no ip address
% d/ A; g/ n& q) g' f- j8 hshutdown
; a- `4 p+ E) Vduplex half: }2 q6 K" P* h. \2 z
!
7 j: R8 {2 a! Q" {& s5 [interface FastEthernet1/02 l, ?. V! u, t$ e1 w
no ip address
' y" L. X# n1 ]# ushutdown! R2 \  H8 F# X. E) l$ s
duplex auto# ^/ |$ Q1 D; b1 u; h2 q
speed auto
% }! `# ~0 K; I7 E: J) b/ D3 X!7 t5 O; }, R$ L' }2 \6 x
interface FastEthernet1/1( ?0 {9 v5 D! L/ X! q) H8 {+ G# `
no ip address4 [1 R, i' q! A0 B9 {& g0 K
shutdown3 U' e3 a, V4 q
duplex auto
5 S5 H; v; r$ ^' k* B# zspeed auto
) _" E6 u( x- E+ E) Y* e!3 o1 [' r6 K3 F! ?6 M9 F( `
interface FastEthernet2/0
6 r8 f4 }1 w. @: z4 ?7 [: ^; zno ip address
, o( x- y% v4 U# kshutdown
: z$ }6 C" l  o( _duplex auto
" g% ~2 T8 ?: e( @% Xspeed auto: J0 P) M/ H0 w' W& _) B
!
3 [0 A- `! ]. r. s% J4 f8 r/ Tinterface FastEthernet2/1! L+ }0 B3 p: K6 M; Z$ v
no ip address
0 W, Y3 J  _) ashutdown% S* I/ {& r+ w$ v2 g
duplex auto3 S7 M* n8 Y' v4 f& q/ w
speed auto
% q8 N( \  ^  q* ]!1 B: r* g3 x4 _6 P- R9 M
interface Serial3/0
% l1 ?' B( O3 d- fno ip address8 z  I4 c# i% O% I6 {+ K3 y
shutdown% A; k1 t: @' a) x; L* |
serial restart-delay 0
$ {1 ]- U* K& W0 c2 S8 B8 \' J+ S!8 o7 q3 i- n; w; j  b
interface Serial3/1" l% Y0 O& a2 }% `' O
no ip address
: Z8 P% w5 I. Q. C1 hshutdown
) C2 h1 [1 M  ~. G$ q' cserial restart-delay 0& R4 o, ~9 Z' d" o* m
!7 Y( e' I* N; J1 O# Q% I
interface Serial3/2  T  ^3 [& l4 X% T6 h9 O
no ip address
5 x3 N6 l0 P% m- V/ D. g( Dshutdown4 @9 N/ y; ]* N" Q3 g9 U
serial restart-delay 0
2 N5 ~6 ?" a% m: N& j!
* C$ q2 Z, X, S% \& V' o. v& finterface Serial3/3
( D) y, Q8 f3 H) kno ip address" ?8 m' b0 @0 U- n1 o
shutdown7 q/ K6 g. @$ t( `" s) S
serial restart-delay 0# l6 y" l% W# p- c
!+ a7 K/ ~) u0 W3 ?! d
interface GigabitEthernet4/0
9 ^: t( _+ B, a2 z, g3 P0 Z2 bip address 200.0.0.2 255.255.255.252
6 M, ^1 C. l  Q9 {+ m0 z7 Inegotiation auto0 e6 |6 g* G5 F3 Y$ Y: D
!
! n6 O; U: ^# H& j2 Q( O* Zinterface GigabitEthernet5/0
, E$ T2 o! j; E& T) \ip address 200.0.0.5 255.255.255.252) }/ g5 ]/ Q4 k$ W& H% A2 a! G0 o
negotiation auto
! d( l2 K" a8 j9 t!
0 n; m8 y5 k9 Z+ q7 Z' xrouter ospf 1
- C$ H* W7 G/ B( Glog-adjacency-changes4 [1 U3 U- m7 k! E
network 200.0.0.0 0.0.0.3 area 04 N  Q3 C  X$ U' M
network 200.0.0.4 0.0.0.3 area 02 J' `. Y2 U' N. O: o( f( S
!
8 ]2 }% |5 h2 @$ C7 S+ s: Gno ip http server( O# ?5 Q2 y0 w3 `( Y& b) r  Q
no ip http secure-server
0 C, ?7 n4 X* r7 F. k!
3 b( h# Y) [$ T/ j) T!
/ l2 P4 e5 Q' e- |. Q' a!
! y  p: T; d/ c7 U9 T( C" z7 _& |logging alarm informational3 V6 q% d. b3 ~  u* ], Y. ^6 I
!
8 O6 |0 E8 D6 o0 _. }!
" X1 t0 R5 d0 U/ f* {!           \4 ?+ A/ p* W$ R* G
!
' Q/ l- L9 I* u5 G!3 g# `6 ~, G3 j% U% X$ M/ w( v/ z
control-plane8 v9 L# u2 @6 W+ X1 K) o
!
; {* j# u$ h9 ]!
* h: b+ K2 _! ^( x4 f+ P2 B( J!
, R, y# e; F$ ]5 ^4 ?!' c$ {1 y, B* t$ K, Q
!7 t! n3 D. E+ }4 s. U% }
!2 @7 B# A3 c3 F: a4 i( J" X
gatekeeper
1 w" O# |# O, fshutdown
2 `8 G/ G( l7 c) u/ A5 d% I$ d!0 J3 y5 @# x- H9 A
!
5 K% z. `3 F) u3 z# g9 uline con 0( c. A& z, c' U8 l' `1 _6 Z' W# f
exec-timeout 0 0. M1 o6 h  N& Q1 Z$ f# L( @
logging synchronous
" ?2 F2 l& R: o* p; U0 J1 U7 rstopbits 1
; n% H8 p5 s$ ?# K9 p' ?5 E# qline aux 02 k% S* m; O7 b' V! g
stopbits 1" r* P) r- j/ q: F6 ~
line vty 0 4' `/ A' @( V1 i( `4 t! w
exec-timeout 0 0
' t/ x: K6 J$ c- o; `. Ylogging synchronous
5 f. K/ s" q6 W: A# f7 l+ Vno login
! V7 n" Z, ]& Kline vty 5 1869
; f8 s! [2 n. J/ C4 J7 Zexec-timeout 0 0: o( v! Y, y, [- w" K/ o* I
logging synchronous
* ?% u6 E4 k+ ?9 ono login
: B. E1 V* D. c% Z9 N5 {+ h!7 O; p, k7 T9 D  a3 a' ?3 n
!
' Y8 C- w# [& D9 I# Wend
- Z% F& w9 C2 C0 }2 l
1 u. Z+ S( e* n$ I5 t5 b: [- ?R3(config-if)#do sh run: ^  B4 u5 l3 Y  u0 j- }
Building configuration...
4 A- @( d! y, o9 nCurrent configuration : 1976 bytes
. f/ @  k2 A# ~+ K4 f4 H" q3 g' s!7 n8 x$ ]' ^* N" B2 }, D
version 12.4
9 [) x! f1 X1 Z' R2 o) @service timestamps debug datetime msec& H2 ]7 G4 W; |
service timestamps log datetime msec
6 X2 b5 D9 f% K/ Vno service password-encryption* L1 b; M6 Y1 E7 p5 G$ U
!
1 E. r- H2 t7 a2 N# F* s' Chostname R3- e" o: T2 D! G
!0 Q3 L3 g, E7 a& a. Q3 C! t* E
boot-start-marker
  G, X! e$ w3 s2 Y$ Lboot-end-marker
' ]- E+ t  f9 Z( D8 ?2 x6 a$ S!& H0 d' ^& r! _1 ~4 t% P5 \) w
enable password cisco
+ S2 l' |+ k* b, f!6 n- H+ D( G' r/ _4 H  M7 ?
no aaa new-model' d% m- ]+ x) S& f
ip cef" y0 z) D6 q8 ~" h
!
7 a, d# L" ]) h1 X& o0 E!
. u. b8 p' n6 u& ~% W9 D, ~!
$ Z0 Z9 m, k" N!
& G- y# `$ e! j3 a! Lno ip domain lookup& R5 |" i) J) s# L9 Z
!
6 I- M7 n5 x$ t/ I  G4 P" rmultilink bundle-name authenticated
9 `! r; x0 @! C) V" l!
! m/ r5 v$ j* A$ O9 i. `!, [& D2 I$ a3 a9 E7 b
!
" P' [9 B$ G" V!+ Z+ E- X$ I9 |+ d5 e% M
!! o* B6 B$ t! p) k
!
( R8 A! O0 c& u9 I/ F* U!
0 _( v9 ~4 _7 R/ a!3 R. M, ~2 L% z# \
!
# F# ~6 T$ u' L, P7 E" X/ p  t! B9 k!
7 }3 k) `$ T4 t3 x  Z7 z9 F. D!. D5 U+ V' s+ S# ]( H/ F0 t
!: w) Z+ }! D* Y8 r, x
!, f3 ^% O3 f: n. B8 u. j0 C
!
, x+ x0 k4 {* ^0 _4 o/ m; l! n- X!6 }0 C( Z& {; w+ x' l, ]
! ( T; r( s% a- @. p. n! _) a9 G6 r  i
!
  u2 Y5 I+ m' ncrypto isakmp policy 2
3 @+ J* L. I% d. ?hash md5
! v/ E8 I* i6 {/ f2 J4 _$ ^% ?+ x# |authentication pre-share/ G* |% B2 W" e2 L
crypto isakmp key 123 address 200.0.0.1
% C# f3 t% h) j# d; k. t4 O& c( L!* |. e) p6 z  B1 `
!         
5 q( \0 K; J! d" A" b5 R' H. `1 Y1 tcrypto ipsec transform-set toR1 esp-des , T3 R$ l+ C7 V" K. I
!8 c9 n9 w' Z4 R# x' }
crypto map VPN 10 ipsec-isakmp
3 h& S  u- T6 _. sset peer 200.0.0.1& Y$ H2 H/ t; s# W& Y- Y" {5 [
set transform-set toR1 " K7 I& y% E( X$ z, [$ n
match address 110
6 Y8 l( j. a: T3 C  d6 j* p!1 w3 ~' i1 V; [' @0 ^9 V3 _: k
!
) d8 h% t* w' M) m7 y9 N  w! S8 l8 l!
- o# F5 I: @) Z; m4 {+ t!
: `% w9 T$ d- `6 j!
% T2 B) Q) n' f& yinterface FastEthernet0/0' w" ?' E" j' [+ e# h1 P6 E
no ip address
/ Q3 g( U- R0 I( a/ s. ^shutdown7 m0 D/ O' _" h8 I
duplex half) _6 C, Y# ]9 ~' }+ L* J
!. U) n) ^8 h( h7 a3 l
interface FastEthernet1/0& V8 o2 s0 `3 k7 B; q
no ip address
' e* U; F( c7 w4 y* K$ F. tshutdown# q5 Q1 K) ?8 l& h4 ^. ~
duplex auto
! p) d7 r3 G( l+ X' k, dspeed auto
% e1 q9 Z" t( a) h4 e!
# n& c. E) Z4 g1 ]- g, T( tinterface FastEthernet1/1
. p' y1 Z, O. L. \3 fno ip address
* K: `# Y! |3 d2 n1 S2 W/ Nshutdown0 ?1 M5 `  ^: z) i
duplex auto7 Q" O) ~3 y% a
speed auto' }+ M6 Y- N. w
!/ E9 k3 s0 r; p: z  y/ E8 [
interface FastEthernet2/04 b  G' Q9 B4 W5 w2 h' D6 @
no ip address
6 i6 w6 w  I0 C( m4 I% B" ^shutdown" Q! P& C  W7 k, t8 g: v
duplex auto' V2 M: o. |0 y- M0 X" R
speed auto
: Q- V1 R4 h* \!
: `# `/ W$ V2 i2 ~" A+ C) J$ v$ sinterface FastEthernet2/14 |. b/ d; l2 v. M3 @" j' e9 W: O# R
no ip address
8 y$ ]. F; n/ ^+ ]$ T2 ]- xshutdown( Y# Q, P( c+ B
duplex auto8 G. e. Y4 u6 Q3 ?5 p, p$ F
speed auto) R0 {1 }5 f2 y2 [2 [
!, [7 U% J1 Y1 X: j  y- j
interface Serial3/0
0 p1 E/ Y' k/ w( D9 A% e: B, V9 i/ }no ip address
7 i9 w4 t% t; u1 i9 |shutdown1 }# x/ c' Z6 {9 N" M; U4 }
serial restart-delay 0/ o- ^7 p% S: D. Y- L" s8 @, _' r0 o
!
( d1 C! R5 b% Ginterface Serial3/1
' n  U0 X: S  {& p* H3 Lno ip address
$ L# X# }/ m. ^$ M! Y$ N( u. tshutdown
1 q" g2 s6 D8 tserial restart-delay 0
+ b. U! Z) h+ Y6 x. k2 u!
* c* n  k/ C' G. K* J( I7 Linterface Serial3/2
8 G2 B0 k! f4 X4 Eno ip address: X1 d  u1 H( {
shutdown9 I( \$ b4 G: A
serial restart-delay 0
5 G' }9 t. D5 J4 s!
* a9 w6 M3 u+ R( Z% `interface Serial3/3
. z; |6 [- a. l, O- fno ip address
  I- L0 Y) k1 a2 c4 {) dshutdown# Z& V/ X1 _* m4 q. o
serial restart-delay 0( S; w4 O. U5 J( W3 ?/ Y
!
& ]; z% I! F9 P& K! n+ ]interface GigabitEthernet4/0
" ~* ]* D; r$ {  Y, H6 dno ip address
3 [3 ]2 l/ Q% o  {, Bshutdown
4 M1 X  X: U$ R" q$ mnegotiation auto
7 K) l3 U; \- Q' p. I0 @!$ u0 h4 r9 T4 i3 ^) F
interface GigabitEthernet5/08 M4 G/ M- L% M8 Y! O
ip address 200.0.0.6 255.255.255.2522 F+ T4 G: H+ f
negotiation auto: Z8 s. h- ~8 o$ q5 f6 x% h/ U7 m
crypto map VPN
# i% H0 ?3 r) S8 y!! B! Y- \2 n! m2 R6 p6 m# p3 W4 ~
router ospf 1  |2 V2 s, t8 [
log-adjacency-changes
+ e) O" d1 z7 u: mnetwork 200.0.0.4 0.0.0.3 area 0% O0 b( \, s1 l; ]2 ?: T
!/ X- q% M& Z: s# p7 J
no ip http server, t4 Z% p* \" N1 t4 e& r: z
no ip http secure-server/ @& h& s: c2 I9 W' f
!
$ G8 q- A( T; B!& z( A6 u3 h4 [) Y" D% c, a- T, o
!
# }+ `# G; K8 k8 Qlogging alarm informational7 a* T/ r+ a8 ?- [
access-list 110 permit tcp 2.2.2.0 0.0.0.255 1.1.1.0 0.0.0.255
) V' k  b3 n2 G* s, S' G% U8 oaccess-list 110 permit tcp 2.2.2.0 0.0.0.255 192.168.0.0 0.0.0.2559 |( p' a: y0 x8 f( N& ~! m
!
* X2 a2 K  Y, G$ j$ B!
( ?) t+ I( i" n" _8 z. l( h!
/ _$ E- \4 c) B5 w$ [3 i!
- ~/ l: t8 c0 W2 C. O0 _% i!9 a- X7 R! x- q% H& Z4 Z9 }1 v2 L
control-plane* {" B- M# t5 f# ~
!
2 @- g, K: {7 p!
4 |, T+ {, D) V( ]; Z!
  i; [& m! B  o0 G!         6 G5 T( U2 W/ r/ d8 p' `
!3 [5 C  z* q/ E7 T: a, S7 h
!
  }' X1 q, s; |" r, m) xgatekeeper# B+ A2 S, O/ H( m: ?8 z7 S2 `
shutdown
% ^# S+ Z8 T4 y* X!. t; r( S% c) a. o; I8 f
!( O6 C7 m6 N# n
line con 0
7 D( F$ g, b  \4 h8 {1 Lexec-timeout 0 0! v, l1 i4 g& i+ g8 p1 V" w0 C+ b  E& {* q
logging synchronous4 S. I4 Q4 Y+ x. f3 z
stopbits 1
( ^' ^. v( V8 ~) U$ i& r# Vline aux 01 _( h  x, M  y0 Y* d
stopbits 1
# L1 }9 w* H- L; ?: F; K( Aline vty 0 46 s3 c' V0 ^( D% X
exec-timeout 0 0; |0 g  B" U( G( q4 A* S& z$ o
logging synchronous
9 \2 H" ]) x+ F7 \7 t' \! r- Jno login5 Q( p# e$ z/ \9 Z3 O" d( L
line vty 5 1869
4 y% I# \, U( c+ r( eexec-timeout 0 0
3 C6 e/ k5 p) M! D9 N# y& Q1 blogging synchronous) T/ Q4 ]! o9 e- ?  v9 d
no login$ ~( g. w: U. ~: l; Z# r0 g" u
!4 K, U* d7 K- h5 T. ~
!& o- g0 }; z" m7 y7 G+ h
end
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2025-10-31 05:12 , Processed in 0.111905 second(s), 18 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn