
R1:! _# z8 }8 P$ z
En# j+ a% x- U( a, S$ X
Conf t( L8 K. n$ g7 P% ?: Q" X8 s4 m
int F1/0
$ a) W) _9 T& V- ?; g( sip add 50.50.50.50 255.255.255.09 z+ H6 t$ G! U/ b- g
no shu
, _ q- J$ i/ l! x0 {5 S8 h1 ^( g$ rint s0/0# Y' N) s$ `/ D- n" ~9 h
ip add 20.20.20.20 255.255.255.0
9 Z* A1 l8 r8 v5 e, U% gno shu4 J y! f+ ^3 x0 d/ s; o5 y9 l
ip route 0.0.0.0 0.0.0.0 20.20.20.21
5 A h3 p0 _6 L& Pcrypto isakmp policy 1+ V/ ]6 A' D2 ^
authentication pre-share
' N! z5 F. G8 X/ [encryption 3des+ z: {1 P! x' f8 B9 S/ m& b% e
hash md5+ B* `1 I' g& q: m5 f* H6 t9 G
crypto isakmp key 0 123 address 20.20.20.21& P A+ h6 J( ^& a) r4 C: A9 _! Y- y
crypto ipsec transform-set zhao esp-3des esp-md5-hmac& R, F! }# B! C: _- ]. M/ S
access-list 101 permit ip 50.50.50.0 0.0.0.255 60.60.60.0 0.0.0.255
- n9 ?" T0 T1 J1 {& N+ xcrypto map jin 1 ipsec-isakmp
7 r+ h$ V- Z0 W' K/ lset peer 20.20.20.21( w( r. g2 P9 y% a
set transform-set zhao
4 z' L" C" N# i$ p9 r9 Amatch address 101
: g# L5 M( o" w, A$ N2 dint f1/0
# w! w$ X, O+ q* j. k/ }0 q3 I2 ]2 Icrypto map jin
% T& @' F# q1 a0 z7 w0 ], x9 Y
: w5 n! J+ s1 W6 r( O' g( M" x6 q5 w- t# ^1 O+ q, o& i; @
R2:% W( j8 m) O' @8 A. i
En
2 W% x: I( H' z8 z! EConf t
% f% o" r& b# } I$ e" M8 sint f1/0
& `, c7 a" `! p1 X" n$ Hip add 60.60.60.60 255.255.255.0
, W5 l; a: z' |6 U+ y3 Qno shu- N; `: L" |3 T# @( H5 j
int s0/0
% H' j* P( o" K5 H9 [ip add 20.20.20.21 255.255.255.05 d- H( X$ g3 ?, R: h
no shu
+ U+ c/ M; P2 y8 pip route 0.0.0.0 0.0.0.0 20.20.20.20- w, M2 S) V+ X; U* A4 Q1 x( e
crypto isakmp policy 13 F* c, ^" j, v$ }- R
authentication pre-share4 ?( L' \+ k6 c$ r, c6 g
encryption 3des
1 e: n5 e/ _ k$ Q3 Z: dhash md5) i5 z; P. | Y3 v! `; |
crypto isakmp key 0 123 address 20.20.20.20" x2 V& i$ r9 ~
crypto ipsec transform-set zhao esp-3des esp-md5-hmac
- v7 V+ F6 O# J, n# s3 Eaccess-list 101 permit ip 60.60.60.0 0.0.0.255 50.50.50.0 0.0.0.255
' b5 v4 O; O/ Q& Bcrypto map jin 1 ipsec-isakmp
9 d6 W R& J8 ^8 ^5 T' ]: E0 Bset peer 20.20.20.21: B/ E/ z+ R" _5 N* p
set transform-set zhao$ O( |% N& h/ T- n
match address 101
9 L: L( ]7 n& u8 i% i+ Wint f1/0! \: ^; f* q( {
crypto map jin
8 ]" z- R- g* S/ ^, A- n5 Z
" P$ @6 g& Z, B* E4 O! Z1 }. LR3:4 K* j8 V9 q2 U( O/ M6 D& x, F$ G
En$ E9 x ]4 h. ^: g/ M V. q* \ S
Conf t0 Y6 K& J3 G3 L/ V9 e& F1 M6 H
Int f0/0
# o7 A( J2 `% D: _" _( |' GNo shutdown0 z! [$ }. q9 t. U' ^# \( I7 T
Ip address 50.50.50.48 255.255.255.0, [! @1 ~! T; H! c* n* y
Exit' |0 P& n! k0 I6 V& n+ l: m% ]% U0 t4 S0 O
No ip routing5 u; f% t& E* O. q6 O, {3 C( H
Ip default-gateway 50.50.50.50, S& `# f k: y2 R% X# F( q
( e$ o4 E/ ]- F- xR4: ~- ~* o9 o( v
En
4 @! l! A: m! N1 A9 i8 f! ?" U) jConf t6 [; W m! {) j/ ^
Int f0/0
( L7 A+ i7 ?! ~. y# X. bNo shutdown
% ]3 }' Y) k# X0 S: jIp address 60.60.60.48 255.255.255.0& }( T+ ]3 H6 t2 t' k
Exit
8 A! A# G0 c( }3 k( m9 eNo ip routing( n. D7 [( R/ ?* [6 `
Ip default-gateway 60.60.60.60 |
|