S13.s2 - Guia de VPN - IPSec - Acceso Remoto
S13.s2 - Guia de VPN - IPSec - Acceso Remoto
S13.s2 - Guia de VPN - IPSec - Acceso Remoto
Objetivos:
Diagrama de Topología
CONFIDENCIALIDAD
INTEGRIDAD
AUTENTICACIÓN
En PC0
En PC1
En PC2
En Router1:
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#int fa0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
R1(config-if)#int fa0/1
R1(config-if)#ip address 10.0.0.1 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
En Router2:
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#int fa0/0
R2 (config-if)#ip address 10.0.0.2 255.255.255.252
R2 (config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
R2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Enrutamiento estático:
En Router1:
R1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip route 192.168.2.0 255.255.255.0 10.0.0.2
R1(config)#
En Router2:
R2> enable
R2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#ip route 192.168.1.0 255.255.255.0 10.0.0.1
R2(config)#
Pasos a seguir:
En Router1:
R1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip local pool PoolVPN 192.168.1.10 192.168.1.19
R1(config)#aaa new-model
R1(config)#aaa authentication login UsuariosVPN local
R1(config)#aaa authorization network GrupoVPN local
R1(config)#username alumnoutp secret cisco
R1(config)#username alumnoutp2 secret cisco
R1(config)#crypto isakmp policy 10
R1(config-isakmp)#encryption aes 256
R1(config-isakmp)#hash sha
R1(config-isakmp)#authentication pre-share
R1(config-isakmp)#group 5
R1(config-isakmp)#crypto isakmp client configuration group GrupoVPN
R1(config-isakmp-group)#key cisco
R1(config-isakmp-group)#pool PoolVPN
R1(config-isakmp-group)#crypto ipsec transform-set SetVPN esp-aes esp-sha-hmac
R1(config)#crypto dynamic-map DinamicoVPN 10
R1(config-crypto-map)#set transform-set SetVPN
R1(config-crypto-map)#reverse-route
R1(config-crypto-map)#crypto map MapaEstatico client configuration address respond
R1(config)#crypto map MapaEstatico client authentication list UsuariosVPN
R1(config)#crypto map MapaEstatico isakmp authorization list GrupoVPN
R1(config)#crypto map MapaEstatico 20 ipsec-isakmp dynamic DinamicoVPN
R1(config)#int fa0/1
R1(config-if)#crypto map MapaEstatico
*Jan 3 07:16:26.785: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
R1(config-if)#
Probar la conectividad de la VPN
Dar doble click en la PC1:
GroupName: GrupoVPN
Group Key: cisco
Host IP (Server IP): 10.0.0.1
Usuario: alumnoutp
Password: cisco
Dar doble click en la PC2:
GroupName: GrupoVPN
Group Key: cisco
Host IP (Server IP): 10.0.0.1
Usuario: alumnoutp2
Password: cisco