Example 1: Managing the Black
Blackbox> show crypto interfaces
Interface | Network |
Name | Type |
wan1 | Untrusted |
ethernet0 | trusted |
Blackbox>
Step 4: Add route to peer LAN
Black Box1/configure> ip route 10.0.2.0 24 wan1
Step 5: Configure IKE to the peer gateway
Black Box1/configure> crypto ike policy Black Box2 172.16.0.2
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2>
message: Default proposal created with
message: Key String has to be configured by the user.
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2> key secretkey Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2> proposal 1
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2/proposal 1>
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2/proposal 1> exit Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2> exit
Step 6: Display IKE policies
Blackbox> show crypto ike policy all
Policy | Peer | Mode | Transform |
Black Box 172.14.0.2 | Main | P1 |
Blackbox>
Step 7: Display IKE policies in detail
Displays the encryption algorithm, hash algorithm, authentication mode, and other details of the IKE policies.
Step 8: Configure the IPSec tunnel to the remote host
Black Box1/configure/crypto> ipsec policy Black Box2 172.16.0.2
Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2> match address 172.16.0.1 32 10.0.2.0 24
message: Default proposal created with
Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2> proposal 1 Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2/proposal 1>
Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2/proposal 1> exit Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2> exit
Step 9: Display IPSec policies
Displays the policy just added.
Step 10: Display IPSec policies in detail
Shows the details of the IPSec policies.
25