This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| cisco:books:ccnp_300-730:ch3:001 [2025/08/31 16:36] – Name | cisco:books:ccnp_300-730:ch3:001 [2025/08/31 17:54] (current) – Name | ||
|---|---|---|---|
| Line 16: | Line 16: | ||
| < | < | ||
| conf t | conf t | ||
| + | no ip domain lookup | ||
| hostname r1-hub | hostname r1-hub | ||
| line con 0 | line con 0 | ||
| + | history size 256 | ||
| logg syn | logg syn | ||
| exec-timeout 0 0 | exec-timeout 0 0 | ||
| Line 26: | Line 28: | ||
| ip address 1.1.1.1 255.255.255.255 | ip address 1.1.1.1 255.255.255.255 | ||
| ! | ! | ||
| - | interface | + | interface |
| | | ||
| ip address 12.1.1.1 255.255.255.0 | ip address 12.1.1.1 255.255.255.0 | ||
| Line 63: | Line 65: | ||
| match address castle-acl | match address castle-acl | ||
| ! | ! | ||
| - | interface | + | interface |
| | | ||
| no shutdown | no shutdown | ||
| Line 73: | Line 75: | ||
| < | < | ||
| conf t | conf t | ||
| + | no ip domain lookup | ||
| hostname r2-spoke | hostname r2-spoke | ||
| line con 0 | line con 0 | ||
| + | history size 256 | ||
| logg syn | logg syn | ||
| exec-timeout 0 0 | exec-timeout 0 0 | ||
| Line 83: | Line 87: | ||
| ip address 2.2.2.2 255.255.255.255 | ip address 2.2.2.2 255.255.255.255 | ||
| ! | ! | ||
| - | interface | + | interface |
| | | ||
| ip address 12.1.1.2 255.255.255.0 | ip address 12.1.1.2 255.255.255.0 | ||
| Line 120: | Line 124: | ||
| match address castle-acl | match address castle-acl | ||
| ! | ! | ||
| - | interface | + | interface |
| | | ||
| no shutdown | no shutdown | ||
| Line 140: | Line 144: | ||
| < | < | ||
| 12.1.1.2/32 | 12.1.1.2/32 | ||
| - | attached to Ethernet0/0</ | + | attached to GigabitEthernet1</ |
| * The hub's CEF table has the correct entry. This tells us that layers 1-3 are correct. If you want, you can view the ARP table to confirm. | * The hub's CEF table has the correct entry. This tells us that layers 1-3 are correct. If you want, you can view the ARP table to confirm. | ||
| < | < | ||
| Protocol | Protocol | ||
| - | Internet | + | Internet |
| * A packet capture on the hub's interface (or spoke) will reveal that their are no ESP packets being exchanged. | * A packet capture on the hub's interface (or spoke) will reveal that their are no ESP packets being exchanged. | ||
| * The following packet capture is taken when trying to ping the spoke from the hub. | * The following packet capture is taken when trying to ping the spoke from the hub. | ||
| Line 443: | Line 447: | ||
| r2-spoke# | r2-spoke# | ||
| * The spoke is not generating the same style output as the hub. Lets verify the crypto configuration on the interface first. | * The spoke is not generating the same style output as the hub. Lets verify the crypto configuration on the interface first. | ||
| - | < | + | < |
| Building configuration... | Building configuration... | ||
| - | Current configuration : 98 bytes | + | Current configuration : 138 bytes |
| ! | ! | ||
| - | interface | + | interface |
| ip address 12.1.1.2 255.255.255.0 | ip address 12.1.1.2 255.255.255.0 | ||
| - | duplex | + | negotiation |
| + | no mop enabled | ||
| + | no mop sysid | ||
| | | ||
| end</ | end</ | ||
| * The interface configuration looks correct. Next is to verify the crypto configuration and double-check the mapping. | * The interface configuration looks correct. Next is to verify the crypto configuration and double-check the mapping. | ||
| < | < | ||
| + | ! Ignore the PKI cert info at the top. | ||
| crypto ikev2 proposal rook-proposal | crypto ikev2 proposal rook-proposal | ||
| | | ||
| Line 484: | Line 491: | ||
| | | ||
| * At first glance, it seems the ACL is correct, but the permit line is subtly backwards. Flip the hosts around and test again. | * At first glance, it seems the ACL is correct, but the permit line is subtly backwards. Flip the hosts around and test again. | ||
| - | < | + | * The next step is for demonstration purposes to show what happens when the access-list in-use is attempted to be edited. |
| - | + | < | |
| - | + | Enter configuration commands, one per line. End with CNTL/Z. | |
| - | + | r2-spoke(config)# | |
| - | + | r2-spoke(config-ext-nacl)# | |
| - | + | %ACL castle-acl can not be modified/ | |
| - | + | %Please first remove the ACL from crypto map or remove the crypto map from the interface</ | |
| - | + | * This is the correct procedure to migrate the ACL entry to the end. | |
| + | < | ||
| + | Enter configuration commands, one per line. End with CNTL/Z. | ||
| + | r2-spoke(config)# | ||
| + | r2-spoke(config-if)# | ||
| + | r2-spoke(config-if)# | ||
| + | *Aug 31 17: | ||
| + | r2-spoke(config-if)# | ||
| + | *Aug 31 17: | ||
| + | r2-spoke(config-if)# | ||
| + | r2-spoke(config-ext-nacl)# | ||
| + | r2-spoke(config-ext-nacl)# | ||
| + | * Verify the ACL is correct. | ||
| + | < | ||
| + | ip access-list extended castle-acl | ||
| + | 10 permit ip host 12.1.1.2 host 12.1.1.1</ | ||
| + | * The ACL is now correct. Next, add the crypto map back on the interface. | ||
| + | < | ||
| + | r2-spoke(config-if)# | ||
| + | * Turn debugging off on the hub and spoke. | ||
| + | < | ||
| + | All possible debugging has been turned off</ | ||
| + | < | ||
| + | All possible debugging has been turned off</ | ||
| + | * Test with a ping again from either the hub or spoke. | ||
| + | < | ||
| + | Type escape sequence to abort. | ||
| + | Sending 5, 100-byte ICMP Echos to 12.1.1.2, timeout is 2 seconds: | ||
| + | !!!!! | ||
| + | Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms</ | ||
| + | < | ||
| + | Type escape sequence to abort. | ||
| + | Sending 5, 100-byte ICMP Echos to 12.1.1.1, timeout is 2 seconds: | ||
| + | !!!!! | ||
| + | Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms</ | ||
| + | * Success. Verify the crypto sa. | ||
| + | < | ||
| + | IPv4 Crypto IKEv2 SA | ||
| + | Tunnel-id Local | ||
| + | 1 | ||
| + | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
| + | Life/Active Time: 86400/276 sec</ | ||
| + | < | ||
| + | IPv4 Crypto IKEv2 SA | ||
| - | * Packet Capture on r1-hub e0/0 interface. | + | Tunnel-id Local |
| - | {{ : | + | 1 |
| + | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
| + | Life/Active Time: 86400/313 sec</ | ||
| + | * One last check with Wireshark while pinging. | ||
| + | {{ : | ||