O'Reilly logo

CCIE Security Practice Labs by Fahim Hussain Yusuf Bhaiji

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Section 5.0: IPSec Configuration

5.1. IPSec LAN-to-LAN Router-to-Router

  1. Configure a LAN-to-LAN tunnel between R5 and R6 for Loopback5 networks, as demonstrated in the following example:

     ! <snip from R5 config> hostname R5 ! crypto isakmp policy 10 authentication pre-share crypto isakmp key cisco address 173.5.1.130 ! ! crypto ipsec transform-set lab5 esp-des ! ! ! crypto map lab5 10 ipsec-isakmp set peer 173.5.1.130 set transform-set lab5 match address 101 ! interface Loopback5 ip address 192.168.1.1 255.255.255.0 ! ! interface Serial1/0 ip address 173.5.1.129 255.255.255.128 crypto map lab5 ! ip route 192.168.2.0 255.255.255.0 Serial1/0 ! access-list 101 permit icmp 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255 ! <snip from R6 config> hostname ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required