R-MAIN#sh run
/...вырезано.../
crypto isakmp key 7 ^bn UjbsdfgsujGsdf address 1.1.1.2
/...вырезано.../
Bu kalit o’zgarganini anglatmaydi, balki shivrlangan ko’rinishda tasvilnaganini anglatadi.
E’tibor qarating, har bir ofisda biz qo’shni tarmoq tashqi manzilini ko’rsatyapmiz.
3-qadam. Tunnelli interfeyslarni yaratish
Har bir marshrutizatorda virtual tunnelli interfeys yaratamiz. Bosh ofisda:
R-MAIN(config)#
interface Tunnel1
description Link to R-BRANCH
ip address 10.0.0.1 255.255.255.252
tunnel source FastEthernet 0/0
tunnel destination 2.2.2.2
tunnel mode ipsec ipv4
tunnel protection ipsec profile VTI_PROF
|
ip address 10.0.0.1 255.255.255.252 — virtual tunneling o’z manzili
tunnel source FastEthernet 0/0 — marshrutizatorning xususiy tashqi interfeysi
tunnel destination 2.2.2.2 — filial marshrutizatorining tashqi manzili
tunnel mode ipsec ipv4 — shifrlash turi
tunnel protection ipsec profile VTI_PROF — shifrlash usuli
Muhim!
Agar sizda oxirgi ikki satrni kiritishda xató haqidagi xabar paydo bo’lsa va marshrutizator ushbu buyruqlarni qabul qilmasa, u holda shifrlash profilini quyidagi buyruq orqali olib tashlang
Do'stlaringiz bilan baham: |