This is an old revision of the document!
r2
ip access-list extended castle-acl 10 remark Permit statements equal traffic that shall be encrypted. 10 permit ip host 23.1.1.2 host 23.1.1.3
r3
ip access-list extended castle-acl 10 remark Permit statements equal traffic that shall be encrypted. 10 permit ip host 23.1.1.3 host 23.1.1.2
r2
crypto ikev2 proposal rook-proposal encryption aes-cbc-256 integrity sha512 group 14
r3
crypto ikev2 proposal rook-proposal encryption aes-cbc-256 integrity sha512 group 14
r2
crypto ikev2 policy svpn-policy proposal rook-proposal
r3
crypto ikev2 policy svpn-policy proposal rook-proposal
r2
crypto ikev2 keyring lion-key peer peer-remote address 23.1.1.3 pre-shared-key cisco
r3
crypto ikev2 keyring lion-key peer peer-remote address 23.1.1.2 pre-shared-key cisco
r2
crypto ikev2 profile side-profile match identity remote address 23.1.1.3 255.255.255.255 authentication remote pre-share authentication local pre-share keyring local lion-key
r3
crypto ikev2 profile side-profile match identity remote address 23.1.1.2 255.255.255.255 authentication remote pre-share authentication local pre-share keyring local lion-key
r2
crypto ipsec transform-set tset esp-aes esp-sha512-hmac mode tunnel
r3
crypto ipsec transform-set tset esp-aes esp-sha512-hmac mode tunnel
r2
crypto map svpn-map 10 ipsec-isakmp set peer 23.1.1.3 set transform-set tset set pfs group14 set ikev2-profile side-profile match address castle-acl
r3
crypto map svpn-map 10 ipsec-isakmp set peer 23.1.1.2 set transform-set tset set pfs group14 set ikev2-profile side-profile match address castle-acl/code> ---- ===Task 8=== r2 <code>interface GigabitEthernet2 crypto map svpn-map
r3
interface GigabitEthernet2 crypto map svpn-map
r2
r3
r2
r3
r2
r3