Difference between revisions of "Netband Project - IPSec/Gre"
From Teknologisk videncenter
m (→Netband Project - IPSec/GRE) |
m (→Configuration for the Head-End) |
||
Line 12: | Line 12: | ||
group 5 | group 5 | ||
lifetime 1000 | lifetime 1000 | ||
− | crypto isakmp key | + | crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0 |
crypto ipsec transform-set tset-AES256-SHA esp-aes 256 esp-sha-hmac | crypto ipsec transform-set tset-AES256-SHA esp-aes 256 esp-sha-hmac | ||
crypto dynamic-map test-dynamic 40 | crypto dynamic-map test-dynamic 40 | ||
Line 18: | Line 18: | ||
set transform-set tset-AES256-SHA tset-TDES-SHA | set transform-set tset-AES256-SHA tset-TDES-SHA | ||
crypto map test-crypto 40 ipsec-isakmp dynamic test-dynamic | crypto map test-crypto 40 ipsec-isakmp dynamic test-dynamic | ||
+ | interface Tunnel2 | ||
+ | ip address 10.255.0.9 255.255.255.252 | ||
+ | ip mtu 1420 | ||
+ | ip flow ingress | ||
+ | ip rip advertise 10 | ||
+ | tunnel source Loopback1 | ||
+ | tunnel destination 192.168.6.5 | ||
+ | ! | ||
+ | ip route 192.168.6.5 255.255.255.255 89.150.154.1 | ||
</pre> | </pre> |
Revision as of 08:30, 14 April 2009
<accesscontrol>NetBand</accesscontrol>
Netband Project - IPSec/GRE
This page is part of the Netband Project
Configuration for the Head-End
This configuration is for the "server" part og the tunnel, with the static IP.
crypto isakmp policy 10 encr aes 256 authentication pre-share group 5 lifetime 1000 crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0 crypto ipsec transform-set tset-AES256-SHA esp-aes 256 esp-sha-hmac crypto dynamic-map test-dynamic 40 description Hmmm set transform-set tset-AES256-SHA tset-TDES-SHA crypto map test-crypto 40 ipsec-isakmp dynamic test-dynamic interface Tunnel2 ip address 10.255.0.9 255.255.255.252 ip mtu 1420 ip flow ingress ip rip advertise 10 tunnel source Loopback1 tunnel destination 192.168.6.5 ! ip route 192.168.6.5 255.255.255.255 89.150.154.1