✖
每日一题
☺您本月已连续签到天,打败了0%的知了达人!
今日已答题
签到规则:
1.每日可签到答题一次,每签到一次可获得5积分,连续签到10天额外奖励50积分,连续签到20天以上额外奖励100积分;连续签到30天以上额外奖励200积分;
2.签到答题正确,获得经验值5点;
3.签到成功后,当天日期会有提示。
(0)
最佳答案
可以参照这个案例做一下
MSR G2总部一个模板对应多分支,建立ipsec的配置案例 http://kms2.h3c.com/View.aspx?id=51189
数据不存在啊
总部配置: interface LoopBack0 ip address 192.168.2.1 255.255.255.0 # ike keychain 1 pre-shared-key hostname fenzhi key cipher $c$3$MwE2I2T+/rGqiMawLbJL7d6rr+Tyci92og== # ike profile 1 keychain 1 exchange-mode aggressive local-identity user-fqdn zongbu match remote identity user-fqdn fenzhi # ike identity user-fqdn # ipsec transform-set 1 esp encryption-algorithm 3des-cbc esp authentication-algorithm md5 # ipsec policy-template 234 1 transform-set 1 local-address 2.2.2.1 ike-profile 1 # ipsec policy 1 1 isakmp template 234 # interface GigabitEthernet0/0 ip add 2.2.2.2 30 ipsec apply policy 1 # ip route-static 0.0.0.0 0 2.2.2.1 nat 出口设备配置: interface GigabitEthernet0/0 ip address 2.2.2.1 30 interface GigabitEthernet0/1 ip add ress 1.1.1.1 30 nat outbound nat server protocol udp global 1.1.1.1 4500 inside 2.2.2.1 4500 nat server protocol udp global 1.1.1.1 500 inside 2.2.2.1 500 # ip route-static 0.0.0.0 0 1.1.1.2 分支配置: interface LoopBack0 ip address 192.168.1.1 255.255.255.0 # acl advanced 3001 rule 0 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 # acl advanced 3002 rule 0 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 rule 10 permit ip # ike keychain 1 pre-shared-key address 1.1.1.1 255.255.255.255 key cipher $c$3$iiIqE5PzIk4BBxipMZnMgDALf5j9zlxNYA== # ike identity user-fqdn # ike profile 1 keychain 1 exchange-mode aggressive local-identity user-fqdn fenzhi match remote identity fqdn zongbu # ipsec transform-set 1 esp encryption-algorithm 3des-cbc esp authentication-algorithm md5 # ipsec policy 1 1 isakmp transform-set 1 security acl 3001 remote-address 1.1.1.1 ike-profile 1 # interface GigabitEthernet0/0 port link-mode route ip address 1.1.1.2 255.255.255.0 nat outbound 3002 ipsec apply policy 1 # ip route-static 0.0.0.0 0 1.1.1.1 配置关键点及注意事项 其他分支就参考分支1进行配置即可,只需要将感兴趣流进行修改即可; 总部的keychain中可以有两种配置方法: ike keychain 1 pre-shared-key hostname fenzhi key cipher $c$3$MwE2I2T+/rGqiMawLbJL7d6rr+Tyci92og== 或者: ike keychain 1 pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$c7JSl6LqgoMQ6jN7zpzUSxdfz7dWeHvHDg==
该问题暂时没有网友解答
你正在编辑答案
如果你要对问题或其他回答进行点评或询问,请使用评论功能。
分享扩散:
亲~登录后才可以操作哦!
亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册
注册后可访问此模块
你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
泄露了我的隐私
侵犯了我企业的权益
抄袭了我的内容
原文链接或出处
诽谤我
对根叔社区有害的内容
不规范转载
举报说明
数据不存在啊
总部配置: interface LoopBack0 ip address 192.168.2.1 255.255.255.0 # ike keychain 1 pre-shared-key hostname fenzhi key cipher $c$3$MwE2I2T+/rGqiMawLbJL7d6rr+Tyci92og== # ike profile 1 keychain 1 exchange-mode aggressive local-identity user-fqdn zongbu match remote identity user-fqdn fenzhi # ike identity user-fqdn # ipsec transform-set 1 esp encryption-algorithm 3des-cbc esp authentication-algorithm md5 # ipsec policy-template 234 1 transform-set 1 local-address 2.2.2.1 ike-profile 1 # ipsec policy 1 1 isakmp template 234 # interface GigabitEthernet0/0 ip add 2.2.2.2 30 ipsec apply policy 1 # ip route-static 0.0.0.0 0 2.2.2.1 nat 出口设备配置: interface GigabitEthernet0/0 ip address 2.2.2.1 30 interface GigabitEthernet0/1 ip add ress 1.1.1.1 30 nat outbound nat server protocol udp global 1.1.1.1 4500 inside 2.2.2.1 4500 nat server protocol udp global 1.1.1.1 500 inside 2.2.2.1 500 # ip route-static 0.0.0.0 0 1.1.1.2 分支配置: interface LoopBack0 ip address 192.168.1.1 255.255.255.0 # acl advanced 3001 rule 0 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 # acl advanced 3002 rule 0 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 rule 10 permit ip # ike keychain 1 pre-shared-key address 1.1.1.1 255.255.255.255 key cipher $c$3$iiIqE5PzIk4BBxipMZnMgDALf5j9zlxNYA== # ike identity user-fqdn # ike profile 1 keychain 1 exchange-mode aggressive local-identity user-fqdn fenzhi match remote identity fqdn zongbu # ipsec transform-set 1 esp encryption-algorithm 3des-cbc esp authentication-algorithm md5 # ipsec policy 1 1 isakmp transform-set 1 security acl 3001 remote-address 1.1.1.1 ike-profile 1 # interface GigabitEthernet0/0 port link-mode route ip address 1.1.1.2 255.255.255.0 nat outbound 3002 ipsec apply policy 1 # ip route-static 0.0.0.0 0 1.1.1.1 配置关键点及注意事项 其他分支就参考分支1进行配置即可,只需要将感兴趣流进行修改即可; 总部的keychain中可以有两种配置方法: ike keychain 1 pre-shared-key hostname fenzhi key cipher $c$3$MwE2I2T+/rGqiMawLbJL7d6rr+Tyci92og== 或者: ike keychain 1 pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$c7JSl6LqgoMQ6jN7zpzUSxdfz7dWeHvHDg==