Hookah Forum Impressum Sitemap Forum Gästebuch Index
Hauptseite
Shisha Forum
Wasserpfeifen Portal
Shisha Statistik
Community
Registrieren
Mitglieder
Hookah Suchen
Partner
Kalender
Shisha Hilfe
Kontakt
Team
Impressum

Kopfberreich

Aitai and Cisco do IPSEC VPN

Shisha - Wasserpfeifen - Hookah Forum » Wasserpfeifen Bestandteile » Shisha Tabaksorten » Aitai and Cisco do IPSEC VPN » Hallo Gast [Anmelden|Registrieren]
Letzter Beitrag | Erster ungelesener Beitrag Druckvorschau | An Freund senden | Thema zu Favoriten hinzufügen
Neue Diskussion starten! Antwort erstellen!
Zum Ende der Seite springen Aitai and Cisco do IPSEC VPN « Vorheriges Thema | Nächstes Thema »
User Profil
Message: | Verfasst: 11.01.2018 06:05
meishengchao meishengchao ist männlich

Wasserpfeifen Kenner
Dabei seit: 21.07.2015
Beiträge: 423
Herkunft: shanghai

meishengchao ist offline

<p> A, Cisco (RouteB) </p>
<p> 1.CiscoACL
Cisco Catalyst 3750X Series 10G Ethernet Switch Ws C3750X 24P S configuration (mainly refer to IPSec configuration which flow) </p>
<p> router (config) #access-list110permitIP192.168.11.00.0.0.255192.168.100.00.0.0.255</p>
<p> router (config) # access-list110permitIP192.168.100.00.0.0.255192.168.11.00.0.0.255</p>
<p> 2. the first phase of the IKE configuration of </p>
<p> I. use and shared key authentication and shared key encryption algorithm for cisco1122</p>
<p> ii.: des</p>
<p> III. certification md5</p>
<p> algorithm: iv.DH group: group2</p>
<p> v. SA </p>
<p> router the first phase of 28800
Amazing Price Huawei Echolife Hn8245Q Gpon Ont 4Ge 2Ports Wifi Modem seconds (config) #cryptoisakmpenable # IKE enabled (default startup) </p>
<p> router (config) #cryptoisakmppolicy100 IKE # establishment strategy, the priority is 100</p>
<p> router (config-isakmp) authenticationpre-share # # using pre shared Password authentication </p>
<p> router (config-isakmp) #encryptiondes # using DES encryption mode </p>
<p> (config-isakmp) router #group2 # specifies the key figures, group2 more secure, but more consumption of cpu</p>
<p> router (config-isakmp) #hashmd5 # specifies the hash algorithm for the MD5 (the other way: Sha, RSA) </p>
<p> router (config-isakmp) #lifetime28880 # designated SA valid time. The default is 86400 seconds, at both ends of </p>
<p> router (config) #cryptoisakmpkeycisco1122address192.168.0.124# configuration pre shared key (Cisco to specify the other address) </p>
<p> 3.IPSec </p>
<p> I. IPSec second stage configuration configuration: the actual exchange set is the definition of encryption and authentication algorithm in the second stage, subsequent references to </p>
<p> encryption algorithm: DES algorithm: MD5; authentication; encapsulation protocol: ESP</p>
<p> router (config) #cryptoipsectransform-setabcesp-desesp-md5-hmac</p>
<p> configuration IPSec exchange set the name ABC can be taken, both ends of the name can also be different, but other parameters should be consistent. </p>
<p> ii. configuration IPSec encryption map: actually identifies the identity of the other party, which flow to do IPSec, the survival of the second stage SA and the </p>
<p> router exchange set reference (config) #cryptomapmymap100ipsec-isakmp # create encrypted graph mymap can be custom name </p>
<p> router (config-crypto-map) #matchaddress110 # uses ACL to define the encrypted communications </p>
<p> router (config-crypto-map) #setpeer192.168.0.124 the other # ID router IP address </p>
<p> router (config-crypto-map) #settransform-setabc # specifies the encryption map using IPSEC </p>
<p> router (config-crypto-map) exchange in #setsecurity-associationlifetime86400 # specified second stage survival of SA </p>
<p> 4. will be applied to the interface on </p>
<p> Map Encryption router (config) #interfaceethernet0/1 WAN router # into port </p>
<p> (config-if) cryptomapmamap # # encryption Map is applied to the interface of </p>
<p> 5. configuration NONAT: to ensure the access to IPSec is not enabled NAT to end network 192.168.11.0/24, IPSec </p>
<p> router (config) #nat tunnel (inside)
Huawei E9000 12U Chassis Server Racks Cabinets 0access-list110</p>
<p> 6. note do not enable PFS</p>
<p> two and UTT2512 in Cisco (RouterA)
configuration</p>



Outdoor Decking Floor and Composite Decking Price
PROFIL :: EMAIL :: WEBSITE :: SUCHEN :: BUDDY ZITAT :: EDIT :: MELDEN

Baumstruktur | Brettstruktur
Shisha - Wasserpfeifen - Hookah Forum » Wasserpfeifen Bestandteile » Shisha Tabaksorten » Aitai and Cisco do IPSEC VPN
Gehe zu:
Neue Diskussion starten! Antwort erstellen!

Forensoftware: Burning Board 2.3.6, entwickelt von WoltLab GmbH | österreichische Weine