Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

S13.s2 - Guia de VPN - IPSec - Acceso Remoto

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

VPN Protocolo IPSEC: Acceso Remoto

Objetivos:

Implementar tecnologías y herramientas para el uso de VPN de tipo Acceso Remoto

Diagrama de Topología
CONFIDENCIALIDAD

INTEGRIDAD

AUTENTICACIÓN
En PC0

En PC1
En PC2

En Router1:
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#int fa0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown

R1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

R1(config-if)#int fa0/1
R1(config-if)#ip address 10.0.0.1 255.255.255.252
R1(config-if)#no shutdown

R1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
En Router2:

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#int fa0/0
R2 (config-if)#ip address 10.0.0.2 255.255.255.252
R2 (config-if)#no shutdown

Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

R2 (config-if)# int fa0/1


R2(config-if)#ip address 192.168.2.1 255.255.255.0
R2(config-if)#no shutdown

R2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up

Enrutamiento estático:

En Router1:
R1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip route 192.168.2.0 255.255.255.0 10.0.0.2
R1(config)#

En Router2:

R2> enable
R2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#ip route 192.168.1.0 255.255.255.0 10.0.0.1
R2(config)#
Pasos a seguir:

ip local pool PoolVPN 192.168.1.10 192.168.1.19


aaa new-model
aaa authentication login UsuariosVPN local
aaa authorization network GrupoVPN local
username alumnoutp secret cisco
username alumnoutp2 secret cisco
crypto isakmp policy 10
encryption aes 256
hash sha
authentication pre-share
group 5
crypto isakmp client configuration group GrupoVPN
key cisco
pool PoolVPN
crypto ipsec transform-set SetVPN esp-aes esp-sha-hmac
crypto dynamic-map DinamicoVPN 10
set transform-set SetVPN
reverse-route
crypto map MapaEstatico client configuration address respond
crypto map MapaEstatico client authentication list UsuariosVPN
crypto map MapaEstatico isakmp authorization list GrupoVPN
crypto map MapaEstatico 20 ipsec-isakmp dynamic DinamicoVPN
int fa0/1
crypto map MapaEstatico
Configuración VPN Protocolo IPSEC: Acceso Remoto

En Router1:

R1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ip local pool PoolVPN 192.168.1.10 192.168.1.19
R1(config)#aaa new-model
R1(config)#aaa authentication login UsuariosVPN local
R1(config)#aaa authorization network GrupoVPN local
R1(config)#username alumnoutp secret cisco
R1(config)#username alumnoutp2 secret cisco
R1(config)#crypto isakmp policy 10
R1(config-isakmp)#encryption aes 256
R1(config-isakmp)#hash sha
R1(config-isakmp)#authentication pre-share
R1(config-isakmp)#group 5
R1(config-isakmp)#crypto isakmp client configuration group GrupoVPN
R1(config-isakmp-group)#key cisco
R1(config-isakmp-group)#pool PoolVPN
R1(config-isakmp-group)#crypto ipsec transform-set SetVPN esp-aes esp-sha-hmac
R1(config)#crypto dynamic-map DinamicoVPN 10
R1(config-crypto-map)#set transform-set SetVPN
R1(config-crypto-map)#reverse-route
R1(config-crypto-map)#crypto map MapaEstatico client configuration address respond
R1(config)#crypto map MapaEstatico client authentication list UsuariosVPN
R1(config)#crypto map MapaEstatico isakmp authorization list GrupoVPN
R1(config)#crypto map MapaEstatico 20 ipsec-isakmp dynamic DinamicoVPN
R1(config)#int fa0/1
R1(config-if)#crypto map MapaEstatico
*Jan 3 07:16:26.785: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
R1(config-if)#
Probar la conectividad de la VPN
Dar doble click en la PC1:
GroupName: GrupoVPN
Group Key: cisco
Host IP (Server IP): 10.0.0.1
Usuario: alumnoutp
Password: cisco
Dar doble click en la PC2:
GroupName: GrupoVPN
Group Key: cisco
Host IP (Server IP): 10.0.0.1
Usuario: alumnoutp2
Password: cisco

You might also like