Phase 1 With IPsec
Tentu kalian sudah tau, apa yang akan kita bahas pada blogg ini yaitu Phase 1 With IPsec... Jadi intinya disini kita akan menggunakan IPsec agar komunikasi dari Router HUB ke Spoke lebih aman...
👉https://insinyurbocah2109.blogspot.com/2020/11/belajar-vpn-gre-tunnel.html
BELAJAR VPN ( GRE TUNNEL ) - Lab 1 VPN
👉https://insinyurbocah2109.blogspot.com/2020/11/belajar-vpn-ipsec-tunnel-mode.html
BELAJAR VPN ( IPSEC Tunnel Mode ) - Lab 2 VPN
👉https://insinyurbocah2109.blogspot.com/2020/11/belajar-bgp-dmvpn.html
BELAJAR VPN ( DMVPN ) - Lab 3 VPN
👉https://insinyurbocah2109.blogspot.com/2020/11/belajar-vpn-phase-1-dynamic-mapping.html
BELAJAR VPN ( Phase 1 Dynamic Mapping With EIGRP ) - Lab 4 VPN
👉https://insinyurbocah2109.blogspot.com/2020/11/belajar-vpn-phase-1-dynamic-mapping_9.html
BELAJAR VPN ( Phase 1 Dynamic Mapping With OSPF ) - Lab 5 VPN
Kalo gitu, kita langsung aja ke konfigurasinyaa
TOPOLOGI
R1
HUB(config)#cryp
HUB(config)#crypto isakmp policy 10
HUB(config-isakmp)#authent
HUB(config-isakmp)#authentication pre-share
HUB(config-isakmp)#encryp aes128
HUB(config-isakmp)#group 5
HUB(config-isakmp)#hash sha
HUB(config-isakmp)#exit
HUB(config)#
R3
Spoke-1(config)#cryp
Spoke-1(config)#crypto isakmp policy 10
Spoke-1(config-isakmp)#authentication pre-share
Spoke-1(config-isakmp)#encryption aes128
Spoke-1(config-isakmp)#
Spoke-1(config-isakmp)#group 5
Spoke-1(config-isakmp)#hash sha
Spoke-1(config-isakmp)#exit
R4
Spoke-2(config)#
Spoke-2(config)#crypto isakmp policy 10
Spoke-2(config-isakmp)#authent
Spoke-2(config-isakmp)#authentication pre-share
Spoke-2(config-isakmp)#encryp aes128
Spoke-2(config-isakmp)#
Spoke-2(config-isakmp)#group 5
Spoke-2(config-isakmp)#
Spoke-2(config-isakmp)#hash sha
Nah setelah kkonfigurasi di sisi HUB,Spoke-1,Spoke-2. Langkah berikutnya kita konfigurasi peering ke sisi ipsec pada router masing-masing baik hub dan spoke nya,.
R1
HUB(config)#
HUB(config)#crypto isakmp key IDN_MANTAB address 23.23.23.1
HUB(config)#
HUB(config)#
HUB(config)#crypto isakmp key IDN_MANTAB address 24.24.24.1
HUB(config)#
HUB(config)#crypto ipsec trans
HUB(config)#crypto ipsec transform-set IDN_TRANSFORM esp-aes esp-shahmac
HUB(cfg-crypto-trans)#mode trans
HUB(cfg-crypto-trans)#mode transport
HUB(cfg-crypto-trans)#exit
HUB(config)#
HUB(config)#
HUB(config)#crypto ipsec profile IDN_PROFILE
HUB(ipsec-profile)#set transf
HUB(ipsec-profile)#set transform-set IDN_TRANSFORM
Spoke-1(config)#crypto isa
Spoke-1(config)#crypto isakmp key IDN_MANTAB add 12.12.12.1
Spoke-1(config)#crypto ipsec transform
Spoke-1(config)#crypto ipsec transform-set IDN_TRANSFORM esp-aes esp-sha-hmac
Spoke-1(cfg-crypto-trans)#mode transport
Spoke-1(cfg-crypto-trans)#exit
Spoke-1(config)#
Spoke-1(config)#
Spoke-1(config)#crypto ipsec profile IDN_PROFILE
Spoke-1(ipsec-profile)#set transform-set IDN_TRANSFORM
Spoke-1(ipsec-profile)#exit
Spoke-1(config)#
R4
Spoke-2(config)#crypto isakmp key IDN_MANTAB address 12.12.12.1
Spoke-2(config)#
Spoke-2(config)#crypto ipsec transform-set IDN_TRANSFORM esp-aes esp-sha-hmac
Spoke-2(cfg-crypto-trans)#
Spoke-2(cfg-crypto-trans)#mode trans
Spoke-2(cfg-crypto-trans)#exit
Spoke-2(cfg-crypto-trans)#
Spoke-2(config)#crypto ipsec profile IDN_PROFILE
Spoke-2(ipsec-profile)#set transform-set IDN_TRANSFORM
Spoke-2(ipsec-profile)#exit
Nahh...Karena ip-sec cara kerja nya sama dengan vlan yang dimana harus di pasang di interface nya. Begitu pula dengan IPsec yang harus dipasang di interface
R1
HUB(config)#int tu 0
HUB(config-if)#
HUB(config-if)#
HUB(config-if)#tunnel pro
HUB(config-if)#tunnel protect ipsec prof
HUB(config-if)#tunnel protect ipsec profile IDN_PROFILE
HUB(config-if)#
HUB(config-if)#ex
HUB(config)#
R3
Spoke-1(config)#int tu 0
Spoke-1(config-if)#tunnel pro
Spoke-1(config-if)#tunnel protect ipsec prof
Spoke-1(config-if)#tunnel protect ipsec profile IDN_PROFILE
Spoke-1(config-if)#
Spoke-1(config-if)#exit
R4
Spoke-2(config)#int tu 0
Spoke-2(config-if)#tunnel pro
Spoke-2(config-if)#tunnel protect ipsec prof
Spoke-2(config-if)#tunnel protect ipsec profile IDN_PROFILE
Spoke-2(config-if)#exit
Spoke-2(config)#
Dan selanjutnya kita tinggal lakukan pengeceekkan!!!
R1
HUB(config)#do show cryp isakmp sa IPv4 Crypto ISAKMP SA
dst src state conn-id status
23.23.23.1............... 12.12.12.1 QM_IDLE 1003 ACTIVE
12.12.12.1 24.24.24.1 QM_IDLE 1002 ACTIVE
12.12.12.1 23.23.23.1 QM_IDLE 1001 ACTIVE
24.24.24.1 12.12.12.1 QM_IDLE 1004 ACTIVE
R3
Spoke-1(config)#do show crypto isakmp sa IPv4 Crypto ISAKMP SA
dst src state conn-id status
12.12.12..1............... 23.23.23.1 QM_IDLE 1001 ACTIVE
23.23.23.1 12.12.12.1 QM_IDLE 1002 ACTIVE
R4
Spoke-2(config)#do show crypto isakmp sa IPv4 Crypto ISAKMP SA
dst src state conn-id status
12.12.12..1............... 24.24.24.1 QM_IDLE 1001 ACTIVE
24.24.24.1 12.12.12.1 QM_IDLE 1002 ACTIVE
DONE!!😊😊😊
TERIMAKASIH
WASSALAMUALAIKUM WR.WB
0 comments:
Post a Comment