This is an old revision of the document!
References:
Rob Riker Teaching VPN Concepts on YouTube
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
r1-hub
en conf t hostname r1-hub line con 0 logg syn exec-timeout 0 0 width 512 exit interface Loopback0 no shutdown ip address 1.1.1.1 255.255.255.255 ! interface Ethernet0/0 shutdown ip address 12.1.1.1 255.255.255.0 ! ip access-list extended castle-acl remark Permit statements equal traffic that shall be encrypted. permit ip host 12.1.1.1 host 12.1.1.2 ! crypto ikev2 proposal rook-proposal encryption aes-cbc-256 integrity sha512 group 14 ! crypto ikev2 policy svpn-policy proposal rook-proposal ! crypto ikev2 keyring lion-key peer peer-remote address 12.1.1.2 pre-shared-key cisco ! crypto ikev2 profile side-profile match identity remote address 12.1.1.2 255.255.255.255 authentication remote pre-share authentication local pre-share keyring local lion-key ! crypto ipsec transform-set tset esp-aes esp-sha512-hmac mode tunnel ! crypto map svpn-map 10 ipsec-isakmp set peer 12.1.1.2 set transform-set tset set pfs group14 set ikev2-profile side-profile match address castle-acl ! interface Ethernet0/0 crypto map svpn-map no shutdown ! end wr
r2-spoke
en conf t hostname r2-spoke line con 0 logg syn exec-timeout 0 0 width 512 exit interface Loopback0 no shutdown ip address 2.2.2.2 255.255.255.255 ! interface Ethernet0/0 shutdown ip address 12.1.1.2 255.255.255.0 ! ip access-list extended castle-acl remark Permit statements equal traffic that shall be encrypted. permit ip host 12.1.1.2 host 12.1.1.1 ! crypto ikev2 proposal rook-proposal encryption aes-cbc-256 integrity sha512 group 14 ! crypto ikev2 policy svpn-policy proposal rook-proposal ! crypto ikev2 keyring lion-key peer peer-remote address 12.1.1.1 pre-shared-key cisco ! crypto ikev2 profile side-profile match identity remote address 12.1.1.1 255.255.255.255 authentication remote pre-share authentication local pre-share keyring local lion-key ! crypto ipsec transform-set tset esp-aes esp-sha512-hmac mode tunnel ! crypto map svpn-map 10 ipsec-isakmp set peer 12.1.1.1 set transform-set tset set pfs group14 set ikev2-profile side-profile match address castle-acl ! interface Ethernet0/0 crypto map svpn-map no shutdown ! end wr
Verification
r1-hub#ping 12.1.1.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 12.1.1.2, timeout is 2 seconds: .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 5/5/6 ms