IKEv2 配置实验
Branch:
1.配置proposal
crypto ikev2 proposal ikev2-proposal
encryption 3des aes-cbc-256
integrity sha256 sha512
group 2 5 14
2.配置 policy(可选)
crypto ikev2 policy ikev2-policy
proposal ikev2-proposal
3.配置keyring(必须)
crypto ikev2 keyring ikev2-keyring
peer center-asa
address 202.100.1.10
pre-shared-key pre-key
4.配置profile(必须)
crypto ikev2 profile ikev2-profile
match identity remote address 202.100.1.10 255.255.255.255
identity local address 162.106.1.1
authentication remote pre-share
authentication local pre-share
keyring local ikev2-keyring
5.配置transform-set(可选)
crypto ipsec transform-set trans1 esp-des esp-md5-hmac
mode tunnel
crypto ipsec transform-set trans2 esp-3des esp-sha256-hmac
mode tunnel
show crypto ipsec transform-set
6.配置感兴趣流(必须)
ip access-list extended ***
permit ip 192.168.1.0(本端) 0.0.0.255 192.168.2.0(对端) 0.0.0.255
7.配置crypto map(必须)
crypto map crypto-map 10 ipsec-isakmp
set peer 202.100.1.10
set transform-set trans1 trans2
set ikev2-profile ikev2-profile
match address ***
8.接口调用map(必须)
interface f0/1
ip add 162.100.1.1 255.255.255.0
crypto map crypto-map
ASA:
1.相关接口激活ikev2
crypto ikev2 enable outside
2.配置policy
crypto ikev2 policy 10
encryption aes-256 des
integrity sha256 sha
group 2 1
prf sha256 sha
lifetime seconds 86400
tunnel-group 162.106.1.1 type ipsec-l2l
tunnel-group 162.106.1.1 ipsec-attributes
ikev2 remote-authentication pre-shared-key pre-key
ikev2 local-authentication pre-shared-key pre-key
3.配置transform-set
crypto ipsec ikev2 ipsec-proposal trans
protocol esp encryption aes-192 des
protocol esp integrity sha-1 md5
4.配置感兴趣流
access-list *** extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0
5.配置crypto map
crypto map crypto-map 10 match address ***
crypto map crypto-map 10 set peer 162.106.1.1
crypto map crypto-map 10 set ikev2 ipsec-proposal trans
crypto map crypto-map interface outside
--------------------------------
状态检查:
B#ping 192.168.2.1 so 192.168.1.1
*Mar 2 01:13:44.517: %SYS-5-CONFIG_I: Configured from console by console
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.2.1, timeout is 2 seconds:
Packet sent with a source address of 192.168.1.1
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 20/30/40 ms
Branch#show crypto session
Crypto session current status
Interface: GigabitEthernet0/1
Profile: ikev2-profile
Session status: UP-ACTIVE
Peer: 202.100.1.10 port 500
Session ID: 1
IKEv2 SA: local 162.106.1.1/500 remote 202.100.1.10/500 Active
IPSEC FLOW: permit ip 192.168.1.0/255.255.255.0 192.168.2.0/255.255.255.0
Active SAs: 2, origin: crypto map
Branch#show crypto ipsec sa
interface: GigabitEthernet0/1
Crypto map tag: crypto-map, local addr 162.106.1.1
protected vrf: (none)
local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (192.168.2.0/255.255.255.0/0/0)
current_peer 202.100.1.10 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 9, #pkts encrypt: 9, #pkts digest: 9
#pkts decaps: 9, #pkts decrypt: 9, #pkts verify: 9
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
Branch#show crypto ikev2 sa
IPv4 Crypto IKEv2 SA
Tunnel-id Local Remote fvrf/ivrf Status
1 162.106.1.1/500 202.100.1.10/500 none/none READY
Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:2, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 86400/156 sec
IPv6 Crypto IKEv2 SA
Branch#show crypto engine connections active
Crypto Engine Connections
ID Type Algorithm Encrypt Decrypt LastSeqN IP-Address
1 IPsec DES+MD5 114 0 0 162.106.1.1
2 IPsec DES+MD5 0 114 114 162.106.1.1
1001 IKEv2 SHA256+AES256 0 0 0 162.106.1.1
show crypto ipsec status
ASA# show crypto ipsec sa
interface: outside
Crypto map tag: crypto-map, seq num: 10, local addr: 202.100.1.10
access-list *** extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0
local ident (addr/mask/prot/port): (192.168.2.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
current_peer: 162.106.1.1
#pkts encaps: 9, #pkts encrypt: 9, #pkts digest: 9
#pkts decaps: 9, #pkts decrypt: 9, #pkts verify: 9
转载于:https://blog.51cto.com/adamcrab/1959666