This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cisco:books:ccnp_300-730:ch3:001 [2025/08/31 17:17] – Name | cisco:books:ccnp_300-730:ch3:001 [2025/08/31 17:54] (current) – Name | ||
---|---|---|---|
Line 491: | Line 491: | ||
| | ||
* At first glance, it seems the ACL is correct, but the permit line is subtly backwards. Flip the hosts around and test again. | * At first glance, it seems the ACL is correct, but the permit line is subtly backwards. Flip the hosts around and test again. | ||
- | < | + | * The next step is for demonstration purposes to show what happens when the access-list in-use is attempted to be edited. |
+ | < | ||
+ | Enter configuration commands, one per line. End with CNTL/Z. | ||
+ | r2-spoke(config)# | ||
+ | r2-spoke(config-ext-nacl)# | ||
+ | %ACL castle-acl can not be modified/ | ||
+ | %Please first remove the ACL from crypto map or remove the crypto map from the interface</ | ||
+ | * This is the correct procedure to migrate the ACL entry to the end. | ||
+ | < | ||
+ | Enter configuration commands, one per line. End with CNTL/Z. | ||
+ | r2-spoke(config)# | ||
+ | r2-spoke(config-if)# | ||
+ | r2-spoke(config-if)# | ||
+ | *Aug 31 17: | ||
+ | r2-spoke(config-if)# | ||
+ | *Aug 31 17: | ||
+ | r2-spoke(config-if)# | ||
+ | r2-spoke(config-ext-nacl)# | ||
+ | r2-spoke(config-ext-nacl)# | ||
+ | * Verify the ACL is correct. | ||
+ | < | ||
+ | ip access-list extended castle-acl | ||
+ | 10 permit ip host 12.1.1.2 host 12.1.1.1</ | ||
+ | * The ACL is now correct. Next, add the crypto map back on the interface. | ||
+ | < | ||
+ | r2-spoke(config-if)# | ||
+ | * Turn debugging off on the hub and spoke. | ||
+ | < | ||
+ | All possible debugging has been turned off</ | ||
+ | < | ||
+ | All possible debugging has been turned off</ | ||
+ | * Test with a ping again from either the hub or spoke. | ||
+ | < | ||
+ | Type escape sequence to abort. | ||
+ | Sending 5, 100-byte ICMP Echos to 12.1.1.2, timeout is 2 seconds: | ||
+ | !!!!! | ||
+ | Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms</ | ||
+ | < | ||
+ | Type escape sequence to abort. | ||
+ | Sending 5, 100-byte ICMP Echos to 12.1.1.1, timeout is 2 seconds: | ||
+ | !!!!! | ||
+ | Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms</ | ||
+ | * Success. Verify the crypto sa. | ||
+ | < | ||
+ | IPv4 Crypto IKEv2 SA | ||
+ | Tunnel-id Local | ||
+ | 1 | ||
+ | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
+ | Life/Active Time: 86400/276 sec</ | ||
+ | < | ||
+ | IPv4 Crypto IKEv2 SA | ||
- | + | Tunnel-id Local | |
- | + | 1 | |
- | + | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | |
- | + | | |
- | + | * One last check with Wireshark while pinging. | |
- | + | {{ : | |
- | + | ||
- | + | ||
- | * Packet Capture on r1-hub e0/0 interface. | + | |
- | {{ : | + | |