Difference between revisions of "Netband Project - IPSec/Gre"

From Teknologisk videncenter
Jump to: navigation, search
m (Configuration for the Head-End)
(Configuration for the Head-End)
Line 12: Line 12:
 
  group 5
 
  group 5
 
  lifetime 1000
 
  lifetime 1000
 +
!
 
crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0
 
crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0
crypto ipsec transform-set tset-AES256-SHA esp-aes 256 esp-sha-hmac
+
!
crypto dynamic-map test-dynamic 40
+
crypto ipsec transform-set Netband-AES256-SHA esp-aes 256 esp-sha-hmac
 +
!
 +
crypto dynamic-map Netband-dynamic 10
 
  description Hmmm
 
  description Hmmm
 
  set transform-set tset-AES256-SHA tset-TDES-SHA
 
  set transform-set tset-AES256-SHA tset-TDES-SHA
crypto map test-crypto 40 ipsec-isakmp dynamic test-dynamic
+
!
interface Tunnel2
+
crypto map Netband-crypto 40 ipsec-isakmp dynamic test-dynamic
 +
!
 +
interface Tunnel0
 
  ip address 10.255.0.9 255.255.255.252
 
  ip address 10.255.0.9 255.255.255.252
 
  ip mtu 1420
 
  ip mtu 1420
  ip flow ingress
+
  tunnel source Loopback0
  ip rip advertise 10
+
  tunnel destination 10.0.0.21
tunnel source Loopback1
+
!
  tunnel destination 192.168.6.5
+
interface Loopback0
 +
  ip address 10.0.0.11 255.255.255.255
 
!
 
!
ip route 192.168.6.5 255.255.255.255 89.150.154.1
+
ip route 10.0.0.21 255.255.255.255 192.168.0.1
 
</pre>
 
</pre>

Revision as of 08:35, 14 April 2009

<accesscontrol>NetBand</accesscontrol>

Netband Project - IPSec/GRE

This page is part of the Netband Project

Configuration for the Head-End

This configuration is for the "server" part og the tunnel, with the static IP.

crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 5
 lifetime 1000
!
crypto isakmp key CiscoDisco address 0.0.0.0 0.0.0.0
!
crypto ipsec transform-set Netband-AES256-SHA esp-aes 256 esp-sha-hmac
!
crypto dynamic-map Netband-dynamic 10
 description Hmmm
 set transform-set tset-AES256-SHA tset-TDES-SHA
!
crypto map Netband-crypto 40 ipsec-isakmp dynamic test-dynamic
!
interface Tunnel0
 ip address 10.255.0.9 255.255.255.252
 ip mtu 1420
 tunnel source Loopback0
 tunnel destination 10.0.0.21
!
interface Loopback0
 ip address 10.0.0.11 255.255.255.255
!
ip route 10.0.0.21 255.255.255.255 192.168.0.1