This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cisco:labs:ios-xe:lab17 [2025/10/04 12:05] – Name | cisco:labs:ios-xe:lab17 [2025/10/04 21:19] (current) – [Answer Section] Name | ||
---|---|---|---|
Line 13: | Line 13: | ||
- Configure crypto ipsec-isakmp map. | - Configure crypto ipsec-isakmp map. | ||
- Configure the crypto map on the physical interface. | - Configure the crypto map on the physical interface. | ||
- | - Configure r1 in BGP AS 65000. | + | - Verify crypto ipsec sa (may need to ping neighbor first). |
- | - Configure r4 in BGP AS 65001. | + | - Verify crypto IKEv2 sa. |
- | - Configure r1 and r4 to form an eBGP neighborship. | + | - Verify crypto between r2 and r3 using Wirehsark (optional). |
- | - Verify BGP neighborship is Established. | + | |
{{: | {{: | ||
Line 111: | Line 110: | ||
===Task 9=== | ===Task 9=== | ||
r2 | r2 | ||
- | < | + | < |
+ | |||
+ | interface: GigabitEthernet2 | ||
+ | Crypto map tag: svpn-map, local addr 23.1.1.2 | ||
+ | |||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | #pkts encaps: 8, #pkts encrypt: 8, #pkts digest: 8 | ||
+ | #pkts decaps: 8, #pkts decrypt: 8, #pkts verify: 8 | ||
+ | #pkts compressed: 0, #pkts decompressed: | ||
+ | #pkts not compressed: 0, #pkts compr. failed: 0 | ||
+ | #pkts not decompressed: | ||
+ | #send errors 0, #recv errors 0 | ||
+ | |||
+ | local crypto endpt.: 23.1.1.2, remote crypto endpt.: 23.1.1.3 | ||
+ | | ||
+ | | ||
+ | PFS (Y/N): N, DH group: none | ||
+ | |||
+ | | ||
+ | spi: 0xCDBEBD9A(3451829658) | ||
+ | transform: esp-aes esp-sha512-hmac , | ||
+ | in use settings ={Tunnel, } | ||
+ | conn id: 2006, flow_id: CSR:6, sibling_flags FFFFFFFF80000048, | ||
+ | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
+ | IV size: 16 bytes | ||
+ | replay detection support: Y | ||
+ | Status: ACTIVE(ACTIVE) | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | spi: 0xF48D2703(4102891267) | ||
+ | transform: esp-aes esp-sha512-hmac , | ||
+ | in use settings ={Tunnel, } | ||
+ | conn id: 2005, flow_id: CSR:5, sibling_flags FFFFFFFF80000048, | ||
+ | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
+ | IV size: 16 bytes | ||
+ | replay detection support: Y | ||
+ | Status: ACTIVE(ACTIVE) | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
r3 | r3 | ||
- | < | + | < |
+ | |||
+ | interface: GigabitEthernet2 | ||
+ | Crypto map tag: svpn-map, local addr 23.1.1.3 | ||
+ | |||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | #pkts encaps: 8, #pkts encrypt: 8, #pkts digest: 8 | ||
+ | #pkts decaps: 8, #pkts decrypt: 8, #pkts verify: 8 | ||
+ | #pkts compressed: 0, #pkts decompressed: | ||
+ | #pkts not compressed: 0, #pkts compr. failed: 0 | ||
+ | #pkts not decompressed: | ||
+ | #send errors 0, #recv errors 0 | ||
+ | |||
+ | local crypto endpt.: 23.1.1.3, remote crypto endpt.: 23.1.1.2 | ||
+ | | ||
+ | | ||
+ | PFS (Y/N): N, DH group: none | ||
+ | |||
+ | | ||
+ | spi: 0xF48D2703(4102891267) | ||
+ | transform: esp-aes esp-sha512-hmac , | ||
+ | in use settings ={Tunnel, } | ||
+ | conn id: 2005, flow_id: CSR:5, sibling_flags FFFFFFFF80000048, | ||
+ | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
+ | IV size: 16 bytes | ||
+ | replay detection support: Y | ||
+ | Status: ACTIVE(ACTIVE) | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | spi: 0xCDBEBD9A(3451829658) | ||
+ | transform: esp-aes esp-sha512-hmac , | ||
+ | in use settings ={Tunnel, } | ||
+ | conn id: 2006, flow_id: CSR:6, sibling_flags FFFFFFFF80000048, | ||
+ | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
+ | IV size: 16 bytes | ||
+ | replay detection support: Y | ||
+ | Status: ACTIVE(ACTIVE) | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | * Notice the inbound and outbound esp sas are populated. | ||
---- | ---- | ||
===Task 10=== | ===Task 10=== | ||
r2 | r2 | ||
- | < | + | < |
+ | IPv4 Crypto IKEv2 SA | ||
+ | |||
+ | Tunnel-id Local | ||
+ | 1 | ||
+ | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
+ | Life/Active Time: 86400/411 sec</ | ||
r3 | r3 | ||
- | < | + | < |
+ | IPv4 Crypto IKEv2 SA | ||
+ | |||
+ | Tunnel-id Local | ||
+ | 1 | ||
+ | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
+ | Life/Active Time: 86400/449 sec</ | ||
---- | ---- | ||
===Task 11=== | ===Task 11=== | ||
- | r2 | + | {{: |
- | < | + | * In a later lab, all transit traffic will be encrypted through a tunnel interface. |
- | r3 | + | |
- | < | + | |
---- | ---- | ||
+ | |||
=====Backlinks===== | =====Backlinks===== | ||
[[: | [[: |