对齐方式 靠左 居中 靠右 hcl2.1.1中无法建立ike sa已确定路由可达,接口未应用策略时,10.1.1.1与10.1.2.1可互相ping通,但display ike sa,如下:无法建立ike sa,请问大神什么原因?配置如下:R1配置[r1] ip route-static 10.1.2.0 255.255.255.0 1.1.1.2# 定义要保护的数据流[r1] acl advanced 3101 [r1-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255 # 创建 IPsec 安全提议 tran1[r1] ipsec transform-set tran1 [r1-ipsec-transform-set-tran1] encapsulation-mode tunnel [r1-ipsec-transform-set-tran1] protocol esp [r1-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128 [r1-ipsec-transform-set-tran1] esp authentication-algorithm sha1 # 创建 IKE keychain[r1] ike keychain keychain1 [r1-ike-keychain-keychain1] pre-shared-key address 2.2.2.2 255.255.0.0 key simple 123456# 创建 IKE profile[r1] ike profile profile1 [r1-ike-profile-profile1] keychain keychain1 [r1-ike-profile-profile1] local-identity address 1.1.1.1 [r1-ike-profile-profile1] match remote identity address 2.2.2.2 255.255.0.0 # 创建IPsec安全策略,顺序号为 10[r1] ipsec policy map1 10 isakmp [r1-ipsec-policy-isakmp-map1-10] remote-address 2.2.2.2 [r1-ipsec-policy-isakmp-map1-10] security acl 3101 [r1-ipsec-policy-isakmp-map1-10] transform-set tran1 [r1-ipsec-policy-isakmp-map1-10] ike-profile profile1 # 在接口 上应用 IPsec 安全策略[r1] interface gigabitethernet 1/0/1 [r1-GigabitEthernet1/0/1] ipsec apply policy map1 R2配置[r2] ip route-static 10.1.1.0 255.255.255.0 2.2.2.1[r2] acl advanced 3101 [r2-acl-ipv4-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255 # 创建 IPsec 安全提议 tran1。[r2] ipsec transform-set tran1 [r2-ipsec-transform-set-tran1] encapsulation-mode tunnel [r2-ipsec-transform-set-tran1] protocol esp [r2-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128 [r2-ipsec-transform-set-tran1] esp authentication-algorithm sha1 # 创建 IKE keychain[r2]ike keychain keychain1 [r2-ike-keychain-keychain1] pre-shared-key address 1.1.1.1 255.255.0.0 key simple 123456# 创建 IKE profile[r2] ike profile profile1 [r2-ike-profile-profile1] keychain keychain1 [r2-ike-profile-profile1] local-identity address 2.2.2.2 [r2-ike-profile-profile1] match remote identity address 1.1.1.1 255.255.0.0 # 创建IPsec 安全策略[r2] ipsec policy use1 10 isakmp [r2-ipsec-policy-isakmp-use1-10] remote-address 1.1.1.1 [r2-ipsec-policy-isakmp-use1-10] security acl 3101 [r2-ipsec-policy-isakmp-use1-10] transform-set tran1 [r2-ipsec-policy-isakmp-use1-10] ike-profile profile1 # 在接口上应用 IPsec 安全策略[r2] interface gigabitethernet 1/0/1 @font-face{ font-family:"Times New Roman"; } @font-face{ font-family:"宋体"; } @font-face{ font-family:"Calibri"; } p.MsoNormal{ mso-style-name:正文; mso-style-parent:""; margin:0pt; margin-bottom:.0001pt; mso-pagination:none; text-align:justify; text-justify:inter-ideograph; font-family:Calibri; mso-fareast-font-family:宋体; mso-bidi-font-family:'Times New Roman'; font-size:10.5000pt; mso-font-kerning:1.0000pt; } span.msoIns{ mso-style-type:export-only; mso-style-name:""; text-decoration:underline; text-underline:single; color:blue; } span.msoDel{ mso-style-type:export-only; mso-style-name:""; text-decoration:line-through; color:red; } @page{mso-page-border-surround-header:no; mso-page-border-surround-footer:no;}@page Section0{ } div.Section0{page:Section0;}[r2-GigabitEthernet1/0/1] ipsec apply policy use1
对齐方式 靠左 居中 靠右 hcl2.1.1中无法建立ike sa已确定路由可达,接口未应用策略时,10.1.1.1与10.1.2.1可互相ping通,但display ike sa,如下:无法建立ike sa,请问大神什么原因?配置如下:R1配置[r1] ip route-static 10.1.2.0 255.255.255.0 1.1.1.2# 定义要保护的数据流[r1] acl advanced 3101 [r1-acl-ipv4-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255 # 创建 IPsec 安全提议 tran1[r1] ipsec transform-set tran1 [r1-ipsec-transform-set-tran1] encapsulation-mode tunnel [r1-ipsec-transform-set-tran1] protocol esp [r1-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128 [r1-ipsec-transform-set-tran1] esp authentication-algorithm sha1 # 创建 IKE keychain[r1] ike keychain keychain1 [r1-ike-keychain-keychain1] pre-shared-key address 2.2.2.2 255.255.0.0 key simple 123456# 创建 IKE profile[r1] ike profile profile1 [r1-ike-profile-profile1] keychain keychain1 [r1-ike-profile-profile1] local-identity address 1.1.1.1 [r1-ike-profile-profile1] match remote identity address 2.2.2.2 255.255.0.0 # 创建IPsec安全策略,顺序号为 10[r1] ipsec policy map1 10 isakmp [r1-ipsec-policy-isakmp-map1-10] remote-address 2.2.2.2 [r1-ipsec-policy-isakmp-map1-10] security acl 3101 [r1-ipsec-policy-isakmp-map1-10] transform-set tran1 [r1-ipsec-policy-isakmp-map1-10] ike-profile profile1 # 在接口 上应用 IPsec 安全策略[r1] interface gigabitethernet 1/0/1 [r1-GigabitEthernet1/0/1] ipsec apply policy map1 R2配置[r2] ip route-static 10.1.1.0 255.255.255.0 2.2.2.1[r2] acl advanced 3101 [r2-acl-ipv4-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255 # 创建 IPsec 安全提议 tran1。[r2] ipsec transform-set tran1 [r2-ipsec-transform-set-tran1] encapsulation-mode tunnel [r2-ipsec-transform-set-tran1] protocol esp [r2-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128 [r2-ipsec-transform-set-tran1] esp authentication-algorithm sha1 # 创建 IKE keychain[r2]ike keychain keychain1 [r2-ike-keychain-keychain1] pre-shared-key address 1.1.1.1 255.255.0.0 key simple 123456# 创建 IKE profile[r2] ike profile profile1 [r2-ike-profile-profile1] keychain keychain1 [r2-ike-profile-profile1] local-identity address 2.2.2.2 [r2-ike-profile-profile1] match remote identity address 1.1.1.1 255.255.0.0 # 创建IPsec 安全策略[r2] ipsec policy use1 10 isakmp [r2-ipsec-policy-isakmp-use1-10] remote-address 1.1.1.1 [r2-ipsec-policy-isakmp-use1-10] security acl 3101 [r2-ipsec-policy-isakmp-use1-10] transform-set tran1 [r2-ipsec-policy-isakmp-use1-10] ike-profile profile1 # 在接口上应用 IPsec 安全策略[r2] interface gigabitethernet 1/0/1 @font-face{ font-family:"Times New Roman"; } @font-face{ font-family:"宋体"; } @font-face{ font-family:"Calibri"; } p.MsoNormal{ mso-style-name:正文; mso-style-parent:""; margin:0pt; margin-bottom:.0001pt; mso-pagination:none; text-align:justify; text-justify:inter-ideograph; font-family:Calibri; mso-fareast-font-family:宋体; mso-bidi-font-family:'Times New Roman'; font-size:10.5000pt; mso-font-kerning:1.0000pt; } span.msoIns{ mso-style-type:export-only; mso-style-name:""; text-decoration:underline; text-underline:single; color:blue; } span.msoDel{ mso-style-type:export-only; mso-style-name:""; text-decoration:line-through; color:red; } @page{mso-page-border-surround-header:no; mso-page-border-surround-footer:no;}@page Section0{ } div.Section0{page:Section0;}[r2-GigabitEthernet1/0/1] ipsec apply policy use1
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
确定两端参数一样