erx2(config)#
virtual-router vrB
erx2:vrB(config)#
Tunnel from Boca to Ottawa on virtual router B:
erx2:vrB(config)#
interface tunnel ipsec:Bboca2ottawa transport-virtual-router
default
erx2:vrB(config-if)#
tunnel transform-set customerBprotection
erx2:vrB(config-if)#
tunnel local-identity subnet 10.2.0.0 255.255.0.0
erx2:vrB(config-if)#
tunnel peer-identity subnet 10.1.0.0 255.255.0.0
erx2:vrB(config-if)#
tunnel source 5.2.0.2
erx2:vrB(config-if)#
tunnel destination 5.1.0.2
erx2:vrB(config-if)#
ip address 10.1.0.0 255.255.0.0
erx2:vrB(config-if)#
exit
Tunnel from Boca to Boston on virtual router B:
erx2:vrB(config)#
interface tunnel ipsec:Bboca2boston transport-virtual-router
default
erx2:vrB(config-if)#
tunnel transform-set customerBprotection
erx2:vrB(config-if)#
tunnel local-identity subnet 10.2.0.0 255.255.0.0
erx2:vrB(config-if)#
tunnel peer-identity subnet 10.3.0.0 255.255.0.0
erx2:vrB(config-if)#
tunnel source 5.2.0.2
erx2:vrB(config-if)#
tunnel destination 5.3.0.2
erx2:vrB(config-if)#
ip address 10.3.0.0 255.255.0.0
erx2:vrB(config-if)#
exit
5.
Last, on erx3, create two IPSec tunnels, one to carry customer A's traffic and another
to carry customer B's traffic.
Virtual router A:
erx3(config)#
virtual-router vrA
erx3:vrA(config)#
Tunnel from Boston to Ottawa on virtual router A:
erx3:vrA(config)#
interface tunnel ipsec:Aboston2ottawa transport-virtual-router
default
erx3:vrA(config-if)#
tunnel transform-set customerAprotection
erx3:vrA(config-if)#
tunnel local-identity subnet 10.3.0.0 255.255.0.0
erx3:vrA(config-if)#
tunnel peer-identity subnet 10.1.0.0 255.255.0.0
erx3:vrA(config-if)#
tunnel source 5.3.0.1
erx3:vrA(config-if)#
tunnel destination 5.1.0.1
erx3:vrA(config-if)#
ip address 10.1.0.0 255.255.0.0
erx3:vrA(config-if)#
exit
Tunnel from Boston to Boca on virtual router A:
erx3:vrA(config)#
interface tunnel ipsec:Aboston2boca transport-virtual-router
default
erx3:vrA(config-if)#
tunnel transform-set customerAprotection
erx3:vrA(config-if)#
tunnel local-identity subnet 10.3.0.0 255.255.0.0
erx3:vrA(config-if)#
tunnel peer-identity subnet 10.2.0.0 255.255.0.0
erx3:vrA(config-if)#
tunnel source 5.3.0.1
erx3:vrA(config-if)#
tunnel destination 5.2.0.1
erx3:vrA(config-if)#
ip address 10.1.0.0 255.255.0.0
erx3:vrA(config-if)#
exit
Virtual router B:
159
Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Configuring IPSec
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...