This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| cisco:labs:ios-xe:lab17 [2025/10/04 12:05] – Name | cisco:labs:ios-xe:lab17 [2025/10/04 21:19] (current) – [Answer Section] Name | ||
|---|---|---|---|
| Line 13: | Line 13: | ||
| - Configure crypto ipsec-isakmp map. | - Configure crypto ipsec-isakmp map. | ||
| - Configure the crypto map on the physical interface. | - Configure the crypto map on the physical interface. | ||
| - | - Configure r1 in BGP AS 65000. | + | - Verify crypto ipsec sa (may need to ping neighbor first). |
| - | - Configure r4 in BGP AS 65001. | + | - Verify crypto IKEv2 sa. |
| - | - Configure r1 and r4 to form an eBGP neighborship. | + | - Verify crypto between r2 and r3 using Wirehsark (optional). |
| - | - Verify BGP neighborship is Established. | + | |
| {{: | {{: | ||
| Line 111: | Line 110: | ||
| ===Task 9=== | ===Task 9=== | ||
| r2 | r2 | ||
| - | < | + | < |
| + | |||
| + | interface: GigabitEthernet2 | ||
| + | Crypto map tag: svpn-map, local addr 23.1.1.2 | ||
| + | |||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | #pkts encaps: 8, #pkts encrypt: 8, #pkts digest: 8 | ||
| + | #pkts decaps: 8, #pkts decrypt: 8, #pkts verify: 8 | ||
| + | #pkts compressed: 0, #pkts decompressed: | ||
| + | #pkts not compressed: 0, #pkts compr. failed: 0 | ||
| + | #pkts not decompressed: | ||
| + | #send errors 0, #recv errors 0 | ||
| + | |||
| + | local crypto endpt.: 23.1.1.2, remote crypto endpt.: 23.1.1.3 | ||
| + | | ||
| + | | ||
| + | PFS (Y/N): N, DH group: none | ||
| + | |||
| + | | ||
| + | spi: 0xCDBEBD9A(3451829658) | ||
| + | transform: esp-aes esp-sha512-hmac , | ||
| + | in use settings ={Tunnel, } | ||
| + | conn id: 2006, flow_id: CSR:6, sibling_flags FFFFFFFF80000048, | ||
| + | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
| + | IV size: 16 bytes | ||
| + | replay detection support: Y | ||
| + | Status: ACTIVE(ACTIVE) | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | spi: 0xF48D2703(4102891267) | ||
| + | transform: esp-aes esp-sha512-hmac , | ||
| + | in use settings ={Tunnel, } | ||
| + | conn id: 2005, flow_id: CSR:5, sibling_flags FFFFFFFF80000048, | ||
| + | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
| + | IV size: 16 bytes | ||
| + | replay detection support: Y | ||
| + | Status: ACTIVE(ACTIVE) | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| r3 | r3 | ||
| - | < | + | < |
| + | |||
| + | interface: GigabitEthernet2 | ||
| + | Crypto map tag: svpn-map, local addr 23.1.1.3 | ||
| + | |||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | #pkts encaps: 8, #pkts encrypt: 8, #pkts digest: 8 | ||
| + | #pkts decaps: 8, #pkts decrypt: 8, #pkts verify: 8 | ||
| + | #pkts compressed: 0, #pkts decompressed: | ||
| + | #pkts not compressed: 0, #pkts compr. failed: 0 | ||
| + | #pkts not decompressed: | ||
| + | #send errors 0, #recv errors 0 | ||
| + | |||
| + | local crypto endpt.: 23.1.1.3, remote crypto endpt.: 23.1.1.2 | ||
| + | | ||
| + | | ||
| + | PFS (Y/N): N, DH group: none | ||
| + | |||
| + | | ||
| + | spi: 0xF48D2703(4102891267) | ||
| + | transform: esp-aes esp-sha512-hmac , | ||
| + | in use settings ={Tunnel, } | ||
| + | conn id: 2005, flow_id: CSR:5, sibling_flags FFFFFFFF80000048, | ||
| + | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
| + | IV size: 16 bytes | ||
| + | replay detection support: Y | ||
| + | Status: ACTIVE(ACTIVE) | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | spi: 0xCDBEBD9A(3451829658) | ||
| + | transform: esp-aes esp-sha512-hmac , | ||
| + | in use settings ={Tunnel, } | ||
| + | conn id: 2006, flow_id: CSR:6, sibling_flags FFFFFFFF80000048, | ||
| + | sa timing: remaining key lifetime (k/sec): (4607999/ | ||
| + | IV size: 16 bytes | ||
| + | replay detection support: Y | ||
| + | Status: ACTIVE(ACTIVE) | ||
| + | |||
| + | | ||
| + | |||
| + | | ||
| + | * Notice the inbound and outbound esp sas are populated. | ||
| ---- | ---- | ||
| ===Task 10=== | ===Task 10=== | ||
| r2 | r2 | ||
| - | < | + | < |
| + | IPv4 Crypto IKEv2 SA | ||
| + | |||
| + | Tunnel-id Local | ||
| + | 1 | ||
| + | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
| + | Life/Active Time: 86400/411 sec</ | ||
| r3 | r3 | ||
| - | < | + | < |
| + | IPv4 Crypto IKEv2 SA | ||
| + | |||
| + | Tunnel-id Local | ||
| + | 1 | ||
| + | Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:14, Auth sign: PSK, Auth verify: PSK | ||
| + | Life/Active Time: 86400/449 sec</ | ||
| ---- | ---- | ||
| ===Task 11=== | ===Task 11=== | ||
| - | r2 | + | {{: |
| - | < | + | * In a later lab, all transit traffic will be encrypted through a tunnel interface. |
| - | r3 | + | |
| - | < | + | |
| ---- | ---- | ||
| + | |||
| =====Backlinks===== | =====Backlinks===== | ||
| [[: | [[: | ||