![](/images/new-backgrounds/1124276/12427653x1.webp)
Example 2: Single Proposal: Tun-
Black Box1/configure/interface/bundle wan1> | link t1 1 | ||
Black Box1/configure/interface/bundle wan1> | encapsulation ppp | ||
Black Box1/configure/interface/bundle wan1> | ip address 172.16.0.1 24 | ||
Black | Box1/configure/interface/bundle | wan1> | crypto untrusted |
Black | Box1/configure/interface/bundle | wan1> | exit |
Step 2: Configure the Ethernet interface with trusted network type
Black Box1/configure> interface ethernet 0
message: Configuring existing Ethernet interface
Black Box1/configure interface/ethernet 0> ip address 10.0.1.1 24
Black Box1/configure/interface/ethernet 0> crypto trusted
Black Box1/configure/interface/ethernet 0> exit
Step 3: Display the crypto interfaces
Blackbox> show crypto interfaces
Interface | Network |
Name | Type |
wan1 | Untrusted |
ethernet0 | trusted |
Blackbox>
Step 4: Add route to peer LAN
Black Box1/configure> ip route 10.0.2.0 24 wan1
Step 5: Configure IKE to the peer gateway
Black Box1/configure> crypto ike policy Black Box2 172.16.0.2
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2>
message: Default proposal created with
message: Key String has to be configured by the user.
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2> key secretkey Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2> proposal 1
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2/proposal 1>
Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2> proposal 1> exit Black Box1/configure/crypto/ike/policy Black Box2 172.16.0.2> exit
Black Box1/configure/crypto/exit Black Box1/configure>
Step 6: Display IKE policies
Blackbox> show crypto ike policy all
Policy | Peer | Mode | Transform |
Black Box 172.14.0.2 | Main | P1 |
Blackbox>
Step 7: Configure IPSec tunnel to the remote host
Black Box1/configure/crypto> ipsec policy Black Box2 172.16.0.2
Black Box1/configure/crypto/ipsec/policy Black Box2 172.16.0.2> match address 10.0.1.0 24 10.0.2.0 24
NOTE
29