> 1. На кой болт бридж между двумя гигабитами? Коммутатора мало чтоли?
> 2. Между IOS железками не нужно использовать криптомапы, нужно использовать VTI, т.е.
> IPSec профили и интерфейсы вида:
> interface tunnelXXX
> tunnel mode ipsec ipv4
> tunnel protection ipsec profile XXXX
> 3. SDM зло
> по делу:
> #sho crypto isakmp sa
> #sho crypto ipsec sa 1) есть значит надо.
2) не вижу большой разници какой вид использовать криптомапы распространенный прием
3) SDM я не использовал - использовали те кто первоначально настраивал роутер
sch1492-2911#sho crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
10.136.87.254 10.136.104.126 QM_IDLE 1007 ACTIVE
IPv6 Crypto ISAKMP SA
sch1492-2911#sho crypto ipsec sa
interface: BVI100
Crypto map tag: SDM_CMAP_1, local addr 10.136.87.254
protected vrf: (none)
local ident (addr/mask/prot/port): (192.1.0.0/255.255.0.0/0/0)
remote ident (addr/mask/prot/port): (192.0.0.0/255.255.0.0/0/0)
current_peer 10.136.104.126 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 19229577, #pkts encrypt: 19229577, #pkts digest: 19229577
#pkts decaps: 12271870, #pkts decrypt: 12271870, #pkts verify: 12271870
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 1, #recv errors 0
local crypto endpt.: 10.136.87.254, remote crypto endpt.: 10.136.104.126
path mtu 1500, ip mtu 1500, ip mtu idb BVI100
current outbound spi: 0x0(0)
PFS (Y/N): N, DH group: none
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
local crypto endpt.: 10.136.87.254, remote crypto endpt.: 10.136.104.126
path mtu 1500, ip mtu 1500, ip mtu idb BVI100
current outbound spi: 0x42F401D9(1123287513)
PFS (Y/N): N, DH group: none
inbound esp sas:
spi: 0x89D343C5(2312324037)
transform: esp-256-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 2351, flow_id: Onboard VPN:351, sibling_flags 80000046, crypto map: SDM_CMAP_1
sa timing: remaining key lifetime (k/sec): (4382431/1032)
IV size: 16 bytes
replay detection support: Y
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x42F401D9(1123287513)
transform: esp-256-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 2352, flow_id: Onboard VPN:352, sibling_flags 80000046, crypto map: SDM_CMAP_1
sa timing: remaining key lifetime (k/sec): (4381155/1032)
IV size: 16 bytes
replay detection support: Y
Status: ACTIVE
outbound ah sas:
outbound pcp sas:
protected vrf: (none)
local ident (addr/mask/prot/port): (192.1.0.0/255.255.0.0/0/0)
remote ident (addr/mask/prot/port): (192.2.0.0/255.255.0.0/0/0)
current_peer 10.136.104.126 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 10.136.87.254, remote crypto endpt.: 10.136.104.126
path mtu 1500, ip mtu 1500, ip mtu idb BVI100
current outbound spi: 0x0(0)
PFS (Y/N): N, DH group: none
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
protected vrf: (none)
local ident (addr/mask/prot/port): (192.1.0.0/255.255.0.0/0/0)
remote ident (addr/mask/prot/port): (192.10.0.0/255.255.0.0/0/0)
current_peer 10.136.104.126 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 10.136.87.254, remote crypto endpt.: 10.136.104.126
path mtu 1500, ip mtu 1500, ip mtu idb BVI100
current outbound spi: 0x0(0)
PFS (Y/N): N, DH group: none
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas: