
ESR service routers. ESR-Series. Functionality description. Version 1.12.0
100
•
•
•
•
•
1.
authentication algorithm: SHA1.
IPsec:
encryption algorithm: 3DES;
authentication algorithm: SHA1.
XAUTH:
login: client1;
password: password123.
Solution:
R1 configuration
Configure external network interface and identify its inherence to a security zone:
esr# configure
esr(config)# security zone untrusted
esr(config-zone)# exit
esr(config)#
interface
gigabitethernet
1
/
0
/
1
esr(config-
if
-gi)# security-zone untrusted
esr(config-
if
-gi)# ip address
180.100
.
0.1
/
24
esr(config-
if
-gi)# exit
To configure security zones rules, you should create ISAKMP port profile:
esr(config)# object-group service ISAKMP
esr(config-object-group-service)# port-range
500
,
4500
esr(config-object-group-service)# exit
Create IKE protocol profile. Select Diffie-Hellman group 2, 3DES encryption algorithm and SHA1
authentication algorithm in the profile. The given security parameters are used for IKE connection
protection:
esr(config)# security ike proposal IKEPROP
esr(config-ike-proposal)# dh-group
2
esr(config-ike-proposal)# authentication algorithm sha1
esr(config-ike-proposal)# encryption algorithm 3des
esr(config-ike-proposal)# exit
Create IKE protocol policy. For the policy, specify the list of IKE protocol profiles that may be used for
node, authentication key and XAUTH authentication method by key negotiation:
esr(config)# security ike policy IKEPOLICY
esr(config-ike-policy)# pre-shared-key hexadecimal 123FFF
esr(config-ike-policy)# authentication method xauth-psk-key
esr(config-ike-policy)# proposal IKEPROP
esr(config-ike-policy)# exit
Create an access profile and get in it a pair of username and password for the IPsec VPN client: