This is an old revision of the document!
}
The traffic flowing between R1’s lo1 interface and R3’s lo1 interface is to be encapsulated using the GRE protocol.
gre ip
R#clear ip ospf process
R#clear ip eigrp <AS_number>
Follow the next steps so that traffic between R1 Loopback0 and R3 Loopback0 is encrypted using IPSec.
Configure the following ISAKMP policy on both R1 and R3
The syntax for configuring the policy is the following:
R(config)#crypto isakmp policy <policy_number> R(config-isakmp)#authentication <pre-share | rsa-encr | rsa-sig> R(config-isakmp)#encryption <des | 3des | aes> <key-length> R(config-isakmp)#hash <md5 | sha> R(config-isakmp)#group <diffie_hellman_group_number> R(config-isakmp)#lifetime <lifetime_in_seconds>
Configure “srs!@#” as a pre-shared key on both R1 and R3. The pre-shared key is configured using the crypto isakmp key command:
R(config)#crypto isakmp key <key_index> <key_string> address <peer_address>
Configure the following transform set on both R1 and R3:
The commands for configuring a transform-set are the following:
R(config)#crypto ipsec transform-set <transform_set_name> <tranform_set_parameters> R(config-trans)#mode < transport | tunnel>
Construct an access-list that will match the traffic that you want to encrypt.
Create a crypto-map called TUNNEL_MAP on both R1 and R3.
The steps for configuring the crypto-map are the following:
R(config)#crypto map <name> <sequence_no> ipsec-isakmp R(config-crypto-map)#set peer <peer_IP> R(config-crypto-map)#match address <acl_no | acl_name> R(config-crypto-map)#set transform-set <transform_set_name>
Apply the crypto map on interface F0/0 of R1 and F0/1 of R3 using the following command:
R(config-if)#crypto map <crypto_map_name>
Verify that the traffic is encrypted.
capture R2 F0/0 tunnel.cap
command in the dynagen console to start a capture on R2’s F0/0 interfaceno capture R2 F0/0
command in the dynagen console.