This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| cisco:books:ccnp_300-730:ch3:001 [2025/08/31 17:17] – Name | cisco:books:ccnp_300-730:ch3:001 [2025/08/31 17:54] (current) – Name | ||
|---|---|---|---|
| Line 491: | Line 491: | ||
| | | ||
| * At first glance, it seems the ACL is correct, but the permit line is subtly backwards. Flip the hosts around and test again. | * At first glance, it seems the ACL is correct, but the permit line is subtly backwards. Flip the hosts around and test again. | ||
| - | < | + | * The next step is for demonstration purposes to show what happens when the access-list in-use is attempted to be edited. |
| + | < | ||
| + | Enter configuration commands, one per line. End with CNTL/Z. | ||
| + | r2-spoke(config)# | ||
| + | r2-spoke(config-ext-nacl)# | ||
| + | %ACL castle-acl can not be modified/ | ||
| + | %Please first remove the ACL from crypto map or remove the crypto map from the interface</ | ||
| + | * This is the correct procedure to migrate the ACL entry to the end. | ||
| + | < | ||
| + | Enter configuration commands, one per line. End with CNTL/Z. | ||
| + | r2-spoke(config)# | ||
| + | r2-spoke(config-if)# | ||
| + | r2-spoke(config-if)# | ||
| + | *Aug 31 17: | ||
| + | r2-spoke(config-if)# | ||
| + | *Aug 31 17: | ||
| + | r2-spoke(config-if)# | ||
| + | r2-spoke(config-ext-nacl)# | ||
| + | r2-spoke(config-ext-nacl)# | ||
| + | * Verify the ACL is correct. | ||
| + | < | ||
| + | ip access-list extended castle-acl | ||
| + | 10 permit ip host 12.1.1.2 host 12.1.1.1</ | ||
| + | * The ACL is now correct. Next, add the crypto map back on the interface. | ||
| + | < | ||
| + | r2-spoke(config-if)# | ||
| + | * Turn debugging off on the hub and spoke. | ||
| + | < | ||
| + | All possible debugging has been turned off</ | ||
| + | < | ||
| + | All possible debugging has been turned off</ | ||
| + | * Test with a ping again from either the hub or spoke. | ||
| + | < | ||
| + | Type escape sequence to abort. | ||
| + | Sending 5, 100-byte ICMP Echos to 12.1.1.2, timeout is 2 seconds: | ||
| + | !!!!! | ||
| + | Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms</ | ||
| + | < | ||
| + | Type escape sequence to abort. | ||
| + | Sending 5, 100-byte ICMP Echos to 12.1.1.1, timeout is 2 seconds: | ||
| + | !!!!! | ||
| + | Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms</ | ||
| + | * Success. Verify the crypto sa. | ||
| + | < | ||
| + | IPv4 Crypto IKEv2 SA | ||
| + | Tunnel-id Local | ||
| + | 1 | ||
| + | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
| + | Life/Active Time: 86400/276 sec</ | ||
| + | < | ||
| + | IPv4 Crypto IKEv2 SA | ||
| - | + | Tunnel-id Local | |
| - | + | 1 | |
| - | + | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | |
| - | + | | |
| - | + | * One last check with Wireshark while pinging. | |
| - | + | {{ : | |
| - | + | ||
| - | + | ||
| - | * Packet Capture on r1-hub e0/0 interface. | + | |
| - | {{ : | + | |