Security: Site to Site vpn

Knowledge without practice will be forgotten. So here’s my exercise for site to site vpn using two 1841 routers.

1841-1
ip access-list extended vpn-list
permit ip any any

crypto isakmp policy 1
encr aes
authentication pre-share
group 5
crypto isakmp key cisco address 192.168.1.2 255.255.255.252

crypto map mymap 1 ipsec-isakmp
set peer 192.168.1.2
set transform-set myset
match address vpn-list

interface FastEthernet0/1
ip address 192.168.1.1 255.255.255.252
duplex auto
speed auto
crypto map mymap
end

1841-2

access-list 100 permit ip any any

crypto isakmp policy 1
encr aes
authentication pre-share
group 5
crypto isakmp key cisco address 192.168.1.1 255.255.255.252

crypto map mymap 1 ipsec-isakmp
set peer 192.168.1.1
set transform-set myset
match address 100

interface FastEthernet0/1
ip address 192.168.1.2 255.255.255.252
duplex auto
speed auto
crypto map mymap
end

Verification

Send a ping from 1841-1 to 1841-2, or vice versa. A vpn tunnel will be established.

1841-2#sh crypto session
Crypto session current status

Interface: FastEthernet0/1
Session status: UP-ACTIVE
Peer: 192.168.1.1 port 500
IKE SA: local 192.168.1.2/500 remote 192.168.1.1/500 Active
IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0
Active SAs: 2, origin: crypto map

There should be two security associations, one is isakmp the other is ipsec.

1841-2#sh crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst             src             state          conn-id status
192.168.1.1     192.168.1.2     QM_IDLE           1002 ACTIVE

Advertisement

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s