{"id":638,"date":"2010-04-05T08:40:24","date_gmt":"2010-04-05T07:40:24","guid":{"rendered":"http:\/\/mccltd.net\/blog\/?p=638"},"modified":"2010-04-05T08:51:30","modified_gmt":"2010-04-05T07:51:30","slug":"quick-practice-lab-configure-ipsec-tunnel-between-two-cisco-routers","status":"publish","type":"post","link":"http:\/\/darenmatthews.com\/blog\/?p=638","title":{"rendered":"Quick Practice Lab: Configure IPsec Tunnel between two Cisco routers"},"content":{"rendered":"<p>Try this quick and simple practice lab, where a secure IPsec tunnel is configured between two routers.\u00a0 Use debug to see ISAKMP and IPsec working.<\/p>\n<p><!--more--><\/p>\n<div id=\"attachment_639\" style=\"width: 473px\" class=\"wp-caption alignnone\"><a rel=\"attachment wp-att-639\" href=\"http:\/\/darenmatthews.com\/blog\/?attachment_id=639\"><img aria-describedby=\"caption-attachment-639\" loading=\"lazy\" class=\"size-full wp-image-639\" title=\"IPSEC Tunnel - Lab Practice\" src=\"http:\/\/darenmatthews.com\/blog\/wp-content\/uploads\/2010\/04\/IPSEC-Tunnel-Lab-Practice.JPG\" alt=\"IPSEC Tunnel - Lab Practice\" width=\"463\" height=\"395\" srcset=\"http:\/\/darenmatthews.com\/blog\/wp-content\/uploads\/2010\/04\/IPSEC-Tunnel-Lab-Practice.JPG 463w, http:\/\/darenmatthews.com\/blog\/wp-content\/uploads\/2010\/04\/IPSEC-Tunnel-Lab-Practice-300x255.jpg 300w\" sizes=\"(max-width: 463px) 100vw, 463px\" \/><\/a><p id=\"caption-attachment-639\" class=\"wp-caption-text\">IPSEC Tunnel - Lab Practice<\/p><\/div>\n<p>R1 Configuration:<\/p>\n<blockquote><p>crypto isakmp policy 10<br \/>\nencr aes 256<br \/>\nauthentication pre-share<br \/>\ngroup 5<br \/>\nlifetime 3600<br \/>\n!<br \/>\ncrypto isakmp key cisco address 192.168.23.3<br \/>\n!<br \/>\ncrypto ipsec transform-set 50 ah-sha-hmac esp-aes 256 esp-sha-hmac<br \/>\n!<br \/>\ncrypto map MYMAP 10 ipsec-isakmp<br \/>\nset peer 192.168.23.3<br \/>\nset pfs group5<br \/>\nset security-association lifetime seconds 900<br \/>\nset transform-set 50<br \/>\nmatch address 101<br \/>\n!<br \/>\ninterface Loopback0<br \/>\nip address 172.16.1.1 255.255.255.0<br \/>\n!<br \/>\ninterface FastEthernet0\/0<br \/>\nip address 192.168.12.1 255.255.255.0<br \/>\nduplex auto<br \/>\nspeed auto<br \/>\ncrypto map MYMAP<br \/>\n!<br \/>\naccess-list 101 permit ip 172.16.1.0 0.0.0.255 172.16.3.0 0.0.0.255<\/p><\/blockquote>\n<p>R3 Configuration:<\/p>\n<blockquote><p>crypto isakmp policy 10<br \/>\nencr aes 256<br \/>\nauthentication pre-share<br \/>\ngroup 5<br \/>\nlifetime 3600<br \/>\n!<br \/>\ncrypto isakmp key cisco address 192.168.12.1<br \/>\n!<br \/>\ncrypto ipsec security-association lifetime seconds 1800<br \/>\n!<br \/>\ncrypto ipsec transform-set 50 ah-sha-hmac esp-aes 256 esp-sha-hmac<br \/>\n!<br \/>\ncrypto map MYMAP 10 ipsec-isakmp<br \/>\nset peer 192.168.12.1<br \/>\nset pfs group5<br \/>\nset security-association lifetime seconds 900<br \/>\nset transform-set 50<br \/>\nmatch address 101<br \/>\n!<br \/>\ninterface Loopback0<br \/>\nip address 172.16.3.1 255.255.255.0<br \/>\n!<br \/>\ninterface Serial0\/0\/0<br \/>\nip address 192.168.23.3 255.255.255.0<br \/>\ncrypto map MYMAP<br \/>\n!<br \/>\naccess-list 101 permit ip 172.16.3.0 0.0.0.255 172.16.1.0 0.0.0.255<\/p><\/blockquote>\n<p>Success Criteria:<\/p>\n<blockquote><p>R1#sh crypto isa sa<br \/>\nIPv4 Crypto ISAKMP SA<br \/>\ndst\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 src\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 state\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 conn-id slot status<br \/>\n192.168.23.3\u00a0\u00a0\u00a0 192.168.12.1\u00a0\u00a0\u00a0 QM_IDLE\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 1077\u00a0\u00a0\u00a0 0 ACTIVE<\/p>\n<p>IPv6 Crypto ISAKMP SA<\/p>\n<p>R1#sh crypto ipsec sa<\/p>\n<p>interface: FastEthernet0\/0<br \/>\nCrypto map tag: MYMAP, local addr 192.168.12.1<\/p>\n<p>protected vrf: (none)<br \/>\nlocal\u00a0 ident (addr\/mask\/prot\/port): (172.16.1.0\/255.255.255.0\/0\/0)<br \/>\nremote\u00a0 ident (addr\/mask\/prot\/port): (172.16.3.0\/255.255.255.0\/0\/0)<br \/>\ncurrent_peer 192.168.23.3 port 500<br \/>\nPERMIT, flags={origin_is_acl,}<br \/>\n#pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4<br \/>\n#pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4<br \/>\n#pkts compressed: 0, #pkts decompressed: 0<br \/>\n#pkts not compressed: 0, #pkts compr. failed: 0<br \/>\n#pkts not decompressed: 0, #pkts decompress failed: 0<br \/>\n#send errors 1, #recv errors 0<\/p>\n<p>local crypto endpt.: 192.168.12.1, remote crypto endpt.:192.168.23.3<br \/>\npath mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0\/0<br \/>\ncurrent outbound spi: 0x0(0)<\/p>\n<p>inbound esp sas:<\/p>\n<p>inbound ah sas:<\/p>\n<p>inbound pcp sas:<\/p>\n<p>outbound esp sas:<\/p>\n<p>outbound ah sas:<\/p>\n<p>outbound pcp sas:<\/p>\n<p>R1#<\/p><\/blockquote>\n<blockquote><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Try this quick and simple practice lab, where a secure IPsec tunnel is configured between two routers.\u00a0 Use debug to see ISAKMP and IPsec working.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[83,13],"tags":[36],"_links":{"self":[{"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/638"}],"collection":[{"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=638"}],"version-history":[{"count":4,"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/638\/revisions"}],"predecessor-version":[{"id":643,"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/638\/revisions\/643"}],"wp:attachment":[{"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=638"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/darenmatthews.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}