全系列VPN技术集锦第一卷(Site-to-Site IPsec VPN)【DOC精选】.doc

全系列VPN技术集锦第一卷(Site-to-Site IPsec VPN)【DOC精选】.doc

  1. 1、本文档共8页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
全系列VPN技术集锦第一卷第2章(Site-to-Site IPsec VPN) 作者: 论坛整理 zdnet网络安全 CNETN 2008-01-19 13:29:21 关键词: 安全防护 防火墙 VPN 实例研究 使用预共享密钥作为认证机制的路由器到路由器的IPsec 这是IPsec VPN中最基本最常用的类型.这种类型的VPN属于LAN-to-LAN.这里使用的认证方法是预共享密钥.以后的实例研究有更安全的认证方法的例子. 在实例中我们将给出发起者路由器和响应者路由器的配置,同时也给出了DEBUG输出以及相关的SHOU命令输出,以便我们共同研究. 例1 作为IPsec协商的发起者的路由器配置 hostname Initiator The ISAKMP policy defines the attributes which will be negotiated with peers for the IKE SA. crypto isakmp policy 1 The encryption method defined below is used for encrypting the IKE negotiation packets using SKEYID_e encr 3des The hash algorithm defined below is used to generate the hashes which are used for IKE authetnication purposes. hash sha The line below defines the authentication method as pre-shared key authentication authentication pre-share The line below defines the pre-shared key for the peer at the IP address 0. Please note that the initiator will search through its config for this key using the source IP address of the IKE negotiation packets it is receiving. crypto isakmp key jw4ep9846804ijl address 0 The following line defines the transform set for use with IPsec. This transform set !specifies the name of the transform set as myset. The encapsulation method defined !is ESP and the encryption algorithm to use is 3DES (triple DES). The last part of !this command specifies MD5 as the ESP integrity checking hash. crypto ipsec transform-set myset esp-3des esp-md5-hmac The following configuration is for the crypto map named vpn. Crypto maps essentially bind the entire IPsec configuration together. Various elements of IPsec defined in various places in the configuration are tied together using the crypto map. 10 is the instance number for the map here. Instance numbers are used to specify the order in which multiple crypto maps are parsed in a config. The key word ipsec-isakmp is used to specify that this particular crypto map is to be used for IPsec rather than CET. crypto map vpn 10 ipsec-isakmp The command line be

文档评论(0)

taotao0c + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档