拓扑

步骤
IPsec
- crypto ipsec transform-set MT_TS esp-sha256-hmac esp-aes 256 前半部分是 auth,后半部分是 cipher
- ip access-list extended VPN_TRAFFIC permit ip 172.16.1.0 0.0.0.255 192.168.1.0 0.0.0.255 —— 其实设置的就是Proxy-ID
!!!!!!!!R1
crypto isakmp policy 1
encr aes 256
hash sha256
authentication pre-share
group 5
crypto isakmp key CISCO address 10.23.1.3
crypto ipsec transform-set MT_TS esp-sha256-hmac esp-aes 256
mode tunnel
crypto map MY_CRYPTO 10 ipsec-isakmp
set peer 10.23.1.3
set transform-set VPN_TS
match address VPN_TRAFFIC
!!!!!!!!!R3
crypto isakmp policy 1
encr aes 256
hash sha256
authentication pre-share
group 5
crypto isakmp key CISCO address 10.12.1.1
crypto ipsec transform-set MT_TS esp-sha256-hmac esp-aes 256
crypto map MY_CRYPTO_MAP 10 ipsec-isakmp
set peer 10.12.1.1
set transform-set VPN_TS
match address VPN_TRAFFIC
!!!!!
ip access-list extended VPN_TRAFFIC
permit ip 172.16.1.0 0.0.0.255 192.168.1.0 0.0.0.255
!!!!!
interface GigabitEthernet0/0
crypto map MY_CRYPTO_MAP
- ip access-list extended VPN_TRAFFIC permit ip 172.16.1.0 0.0.0.255 192.168.1.0 0.0.0.255 —— 这种配置方式,端口状态需要在有流量时才会被激活,当前是DOWN

- show crypto ipsec sa —— 查看Phase2 的结果
- Proxy-ID
- 数据包数量
- 建立IPsec 的地址/端口
- inbound 和 outbound SA

- show crypto isakmp sa —— 查看Phase1 的结果。此时状态为QM_IDLE (Phase 2的状态)

- 我们在R3 上修改key 为 CISOC123,然后清理下缓存 (clear crypto session),就可以看到网络断开。
