Security Features

Step 15: Enable SNMP on the Router1 router:

Router1/configure/crypto/# exit

Router1/configure# snmp

Router1/configure/snmp# community public rw

Router1/configure/snmp# exit

Step 16: Display SNMP communities:

Router1# show snmp communities

Community = public, privilege=rw

Step 17: Repeat steps 1 - 16 with suitable modifications on Router2 prior to managing Router1 from Router2’s LAN side.

Step 18: Test the IPSec tunnel for managing the Router1 router from a host on Router2’s LAN.

Step 19: When the SNMP manager starts managing Router1 from Router2’s LAN, display the IKE and IPSec SA tables.

Router1# show crypto ike sa all

 

 

Policy

Peer

State

Bytes

Transform

------

----

-----

-----

---------

Router2

172.16.0.2

SA_MATURE

2020

pre-g1-3des-sha1

 

 

 

 

 

Router1# show crypto ike sa all detail

Crypto Policy name: Router2

Remote ident 172.16.0.2

Peer Address is 172.16.0.2

Transform: 3des, sha1, pre-shared-key

DH Group: group1

Bytes Processed 2020

State is SA_MATURE

Mode is Main

Remaining Time in Sec: 86084

Life Time in Sec: 86400, Life Time in Bytes is unlimited

Router1# show crypto ipsec sa all

 

 

Policy

Dest IP

Spi

Bytes

Transform

------

-------

---

-----

---------

INRouter2

172.16.0.1

0xe8453c2b

256

esp-aes-sha1-tunl

Router2

172.16.0.2

0xa1f673aa

256

esp-aes-sha1-tunl

 

 

 

 

 

June 2004

© 2004 Foundry Networks, Inc.

15 - 9

Page 234
Image 234
Foundry Networks AR1204, AR3202-CL, AR3201-CL, AR1216, AR1208 Enable Snmp on the Router1 router, Display Snmp communities