Вы здесь

Построение ASA VPN Site-to-Site с использованием IKEv2 IPSec

postroenie_asa_vpn_site-to-site_s_ispolzovaniem_ikev2_ipsec_01_ciscomaster.ru.jpg

Появилась необходимость построить туннель между двумя ASA версий 9.2(2)4 и не удалось завести IKEv1 IPSec.
Заработал только IKEv2 IPSec со следующей конфигурацией:

Step1: Configure Interesting Traffic to be encrypted
asa-vist

access-list 33_to_center_acl extended permit ip 192.168.33.0 255.255.255.0 192.168.10.0 255.255.255.0

vpn2

access-list center_to_33_acl extended permit ip 192.168.10.0 255.255.255.0 192.168.33.0 255.255.255.0

NAT Exclusion for VPN Traffic
asa-vist

object-group network obj-local network-object 192.168.33.0 255.255.255.0 ! object-group network obj-remote network-object 192.168.10.0 255.255.255.0 ! nat (inside,outside) source static obj-local obj-local destination static obj-remote obj-remote no-proxy-arp route-lookup

vpn2

NAT Exclusion for VPN Traffic object-group network obj-local network-object 192.168.10.0 255.255.255.0 ! object-group network obj-remote network-object 192.168.33.0 255.255.255.0 ! nat (inside,outside2) source static obj-local obj-local destination static obj-remote obj-remote no-proxy-arp route-lookup

###
Step2: Configure IKEv2 Policy (similar to Phase1 in IKEv1)
asa-vist

crypto ikev2 policy 1 encryption des integrity sha group 2 prf sha lifetime seconds 43200

vpn2

crypto ikev2 policy 1 encryption des integrity sha group 2 prf sha lifetime seconds 43200

###
Step3: Configure IKEv2 IPSEC Proposal (similar to transform-set in IKEv1)
asa-vist

crypto ipsec ikev2 ipsec-proposal DES protocol esp encryption des protocol esp integrity sha-1 md5

vpn2

crypto ipsec ikev2 ipsec-proposal DES protocol esp encryption des protocol esp integrity sha-1 md5

###

Step4: Configure IKEv1 Policies and Transform Sets
asa-vist

crypto ikev1 policy 10 authentication pre-share encryption des hash sha group 2 lifetime 86400 ! crypto isakmp identity address ! crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac

vpn2

crypto ikev1 policy 10 authentication pre-share encryption des hash sha group 2 lifetime 86400 ! crypto isakmp identity address ! crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac

###
Step5: Configure a Group Policy to allow both IKEv1 and IKEv2
asa-vist

group-policy GroupPolicy_90.154.106.115 internal group-policy GroupPolicy_90.154.106.115 attributes vpn-tunnel-protocol ikev1 ikev2

vpn2

group-policy GroupPolicy_89.175.185.150 internal group-policy GroupPolicy_89.175.185.150 attributes vpn-tunnel-protocol ikev1 ikev2

###
Step6: Configure Crypto Maps with both IKEv1 and IKEv2 IPSEC Profiles
asa-vist

crypto map outside_map 1 match address 33_to_center_acl crypto map outside_map 1 set peer 90.154.106.115 crypto map outside_map 1 set ikev1 transform-set ESP-DES-SHA crypto map outside_map 1 set ikev2 ipsec-proposal DES crypto map outside_map interface outside

vpn2

crypto map outside_map 1 match address center_to_33_acl crypto map outside_map 1 set peer 89.175.185.150 crypto map outside_map 1 set ikev1 transform-set ESP-DES-SHA crypto map outside_map 1 set ikev2 ipsec-proposal DES crypto map outside_map interface outside2

###

Step7: Configure Crypto Maps with both IKEv1 and IKEv2 IPSEC Profiles
asa-vist

tunnel-group 90.154.106.115 type ipsec-l2l tunnel-group 90.154.106.115 general-attributes default-group-policy GroupPolicy_90.154.106.115 tunnel-group 90.154.106.115 ipsec-attributes ikev1 pre-shared-key cisco123 ikev2 remote-authentication pre-shared-key cisco1234 ikev2 local-authentication pre-shared-key cisco1

vpn2

tunnel-group 89.175.185.150 type ipsec-l2l tunnel-group 89.175.185.150 general-attributes default-group-policy GroupPolicy_89.175.185.150 tunnel-group 89.175.185.150 ipsec-attributes ikev1 pre-shared-key cisco123 ikev2 remote-authentication pre-shared-key cisco1 ikev2 local-authentication pre-shared-key cisco1234

###
Step8: Enable both IKEv1 and IKEv2 on outside interface
asa-vist

crypto ikev2 enable outside crypto ikev1 enable outside

vpn2

crypto ikev2 enable outside crypto ikev1 enable outside

Проверка

От asa-vist:
ping tcp inside 192.168.10.45 80 source 192.168.33.10 1036

show crypto isakmp sa
postroenie_asa_vpn_site-to-site_s_ispolzovaniem_ikev2_ipsec_02_ciscomaster.ru.jpg

show crypto ipsec sa
postroenie_asa_vpn_site-to-site_s_ispolzovaniem_ikev2_ipsec_03_ciscomaster.ru.jpg

Комментарии

А для какой цели пользовать и разрешать обе версии IKE?

Добавить комментарий

Filtered HTML

  • Адреса страниц и электронной почты автоматически преобразуются в ссылки.
  • Допустимые HTML-теги: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Строки и абзацы переносятся автоматически.

Plain text

  • HTML-теги не обрабатываются и показываются как обычный текст
  • Адреса страниц и электронной почты автоматически преобразуются в ссылки.
  • Строки и абзацы переносятся автоматически.
CAPTCHA
Этот вопрос задается для того, чтобы выяснить, являетесь ли Вы человеком или представляете из себя автоматическую спам-рассылку.
Target Image