本次實(shí)驗(yàn)基于CISCO CSR1000V的虛擬路由器進(jìn)行
實(shí)驗(yàn)拓?fù)?/p>
實(shí)驗(yàn)拓?fù)?/p>
實(shí)驗(yàn)配置
hostnamecsr1kv ! aaanew-model ! aaaauthenticationsuppressnull-username aaaauthenticationloginsslvpnlocal aaaauthorizationnetworksslvpnlocal ! noipdomainlookup ! cryptopkitrustpointcsr1kv.local enrollmentselfsigned subject-namecn=csr1kv.local revocation-checknone rsakeypaircsr1kv.local ! ! cryptopkicertificatechaincsr1kv.local certificateself-signed01 B84230DF77267A70ADBEF7753791C3CFEF45FF13637343C99589D487E0F4D050 3E1A1CEECEFCC9F8168F91A2D62EE440A1674943D20F8EDBDB465130109147BE 99C342C5921D3DBD910CBECB5638 quit #此處為自簽名證書,具體的生成過程略。 ! usernameadminprivilege15secret5$1$bVLV$u0lFX9bJ3IFSF7M6R7UFe. usernameciscopassword7060506324F41 ! ! cryptosslproposalsslvpn-proposal protectionrsa-3des-ede-sha1rsa-rc4128-md5rsa-aes128-sha1rsa-aes256-sha1 #SSL的加密策略 ! cryptosslauthorizationpolicysslvpn-auth-policy poolsslvpn dns10.1.1.100 def-domainiteachs.com routesetaccess-listsslvpn-tunnel #SSL的授權(quán)策略 ! cryptosslpolicysslvpn-policy sslproposalsslvpn-proposal pkitrustpointcsr1kv.localsign ipaddresslocal202.100.1.100port443 ! cryptosslprofilesslvpn-profile matchpolicysslvpn-policy aaaauthenticationuser-passlistsslvpn aaaauthorizationgroupuser-passlistsslvpnsslvpn-auth-policy authenticationremoteuser-pass max-users100 ! ! cryptovpnanyconnectbootflash:/anyconnect-win-4.6.03049-webdeploy-k9.pkgsequence1 ! interfaceLoopback0 ipaddress10.1.1.1255.255.255.0 ! interfaceGigabitEthernet1 ipaddress202.100.1.100255.255.255.0 negotiationauto ! iplocalpoolsslvpn172.16.1.1172.16.1.100 iproute192.168.100.0255.255.255.0202.100.1.1 ipaccess-liststandardsslvpn-tunnel permit10.1.1.00.0.0.255 !
相關(guān)查看
csr1kv#showversion CiscoIOSXESoftware,Version03.16.06.S-ExtendedSupportRelease CiscoIOSSoftware,CSR1000VSoftware(X86_64_LINUX_IOSD-UNIVERSALK9-M),Version15.5(3)S6,RELEASESOFTWARE(fc3) TechnicalSupport:http://www.cisco.com/techsupport Copyright(c)1986-2017byCiscoSystems,Inc. CompiledMon24-Jul-1720:01bymcpre CiscoIOS-XEsoftware,Copyright(c)2005-2017byciscoSystems,Inc. Allrightsreserved.CertaincomponentsofCiscoIOS-XEsoftwareare licensedundertheGNUGeneralPublicLicense("GPL")Version2.0.The softwarecodelicensedunderGPLVersion2.0isfreesoftwarethatcomes withABSOLUTELYNOWARRANTY.Youcanredistributeand/ormodifysuch GPLcodeunderthetermsofGPLVersion2.0.Formoredetails,seethe documentationor"LicenseNotice"fileaccompanyingtheIOS-XEsoftware, ortheapplicableURLprovidedontheflyeraccompanyingtheIOS-XE software. ROM:IOS-XEROMMON csr1kvuptimeis39minutes Uptimeforthiscontrolprocessoris40minutes SystemreturnedtoROMbyreload Systemimagefileis"bootflash:packages.conf" Lastreloadreason:Unknownreason ThisproductcontainscryptographicfeaturesandissubjecttoUnited Statesandlocalcountrylawsgoverningimport,export,transferand use.DeliveryofCiscocryptographicproductsdoesnotimply third-partyauthoritytoimport,export,distributeoruseencryption. Importers,exporters,distributorsandusersareresponsiblefor compliancewithU.S.andlocalcountrylaws.Byusingthisproductyou agreetocomplywithapplicablelawsandregulations.Ifyouareunable tocomplywithU.S.andlocallaws,returnthisproductimmediately. AsummaryofU.S.lawsgoverningCiscocryptographicproductsmaybefoundat: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html Ifyourequirefurtherassistancepleasecontactusbysendingemailto [email protected]. LicenseLevel:ax LicenseType:Default.Novalidlicensefound. NextreloadlicenseLevel:ax ciscoCSR1000V(VXE)processor(revisionVXE)with1090313K/6147Kbytesofmemory. ProcessorboardID9ZMT9E7R1HJ 4GigabitEthernetinterfaces 32768Kbytesofnon-volatileconfigurationmemory. 3022272Kbytesofphysicalmemory. 7774207Kbytesofvirtualharddiskatbootflash:. Configurationregisteris0x2102 csr1kv#
csr1kv#showcryptosslsession SSLprofilename:sslvpn-profile Client_Login_NameClient_IP_AddressNo_of_ConnectionsCreatedLast_Used cisco192.168.100.100100490029 csr1kv#showcryptosslsessionusercisco Interface:SSLVPN-VIF0 SessionType:FullTunnel ClientUser-Agent:AnyConnectWindows4.6.03049 Username:ciscoNumConnection:1 PublicIP:192.168.100.100 Profile:sslvpn-profile Policy:sslvpn-policy Last-Used:0036Created:*0852.328UTCThuDec62018 TunnelIP:172.16.1.1Netmask:0.0.0.0 RxIPPackets:2TxIPPackets:28 csr1kv# csr1kv# csr1kv#
csr1kv#showcryptosslsessionuserciscodetail Interface:SSLVPN-VIF0 SessionType:FullTunnel ClientUser-Agent:AnyConnectWindows4.6.03049 Username:ciscoNumConnection:1 PublicIP:192.168.100.100 Profile:sslvpn-profile Policy:sslvpn-policy Last-Used:0000Created:*0852.328UTCThuDec62018 SessionTimeout:43200IdleTimeout:1800 DNSprimary:10.1.1.100WINSprimary:None DNSsecondary:NoneWINSsecondary:None IP6DNSprimary:None IP6DNSsecondary:None DPDGWTimeout:300DPDCLTimeout:300 AddressPool:sslvpn MTUSize:1406 DisconnectTime:0 RekeyTime:3600 LeaseDuration:43200Keepalive:30 TunnelIP:172.16.1.1Netmask:0.0.0.0 RxIPPackets:2TxIPPackets:34 CSTPStarted:0032Last-Received:0000 CSTPDPD-Reqsent:0 Msie-ProxyServer:None Msie-PxyOption:Disabled Msie-Exception:None SplitDNS:None ACL:sslvpn-tunnel DefaultDomain:iteachs.com ClientPorts:49190 DetailSessionStatisticsforUser::cisco ---------------------------------- CSTPStatistics:: RxCSTPFrames:36TxCSTPFrames:0 RxCSTPBytes:2537TxCSTPBytes:120 RxCSTPDataFr:34TxCSTPDataFr:2 RxCSTPCNTLFr:2TxCSTPCNTLFr:0 RxCSTPDPDReq:0TxCSTPDPDReq:0 RxCSTPDPDRes:0TxCSTPDPDRes:0 RxAddrRenewReq:0TxAddressRenew:0 RxDroppedFrames:0TxDroppedFrame:0 RxIPPackets:2TxIPPackets:34 RxIPBytes:120TxIPBytes:2249 RxIP6Packets:0TxIP6Packets:0 RxIP6Bytes:0TxIP6Bytes:0 CEFStatistics:: RxCSTPDataFr:0TxCSTPDataFr:0 RxCSTPBytes:0TxCSTPBytes:0 csr1kv# csr1kv#
實(shí)驗(yàn)完。
審核編輯:劉清
聲明:本文內(nèi)容及配圖由入駐作者撰寫或者入駐合作網(wǎng)站授權(quán)轉(zhuǎn)載。文章觀點(diǎn)僅代表作者本人,不代表電子發(fā)燒友網(wǎng)立場(chǎng)。文章及其配圖僅供工程師學(xué)習(xí)之用,如有內(nèi)容侵權(quán)或者其他違規(guī)問題,請(qǐng)聯(lián)系本站處理。
舉報(bào)投訴
-
路由器
+關(guān)注
關(guān)注
22文章
3746瀏覽量
114551 -
DNS
+關(guān)注
關(guān)注
0文章
219瀏覽量
19940 -
iOS
+關(guān)注
關(guān)注
8文章
3399瀏覽量
151042 -
SSL
+關(guān)注
關(guān)注
0文章
126瀏覽量
25788
原文標(biāo)題:Cisco IOS-XE如何配置SSL連接?
文章出處:【微信號(hào):網(wǎng)絡(luò)技術(shù)干貨圈,微信公眾號(hào):網(wǎng)絡(luò)技術(shù)干貨圈】歡迎添加關(guān)注!文章轉(zhuǎn)載請(qǐng)注明出處。
發(fā)布評(píng)論請(qǐng)先 登錄
相關(guān)推薦
如何使用AT CIPSTART命令進(jìn)行SSL連接?
我想從我的ESP8266到實(shí)現(xiàn) SSL 套接字的服務(wù)器建立 SSL 連接。當(dāng)然,我必須使用以下 AT 命令:
在 cipsslsize
在 cipstart
....但是,我如何(以及在哪里)可以上傳證書、密鑰等?
發(fā)表于 07-16 08:16
InRouter與Cisco Router構(gòu)建L2tp VPN的方法
2.2 網(wǎng)絡(luò)拓?fù)湔f明? 中心端設(shè)備為Cisco Router 2821,IOS 為C2800NM-ADVIPSERVICESK9-M,版本15.0(1)M8;外部IP地址173.17.99.100,掩碼
發(fā)表于 07-26 08:25
[分享]Cisco交換機(jī)IOS升級(jí)故障排除
Cisco交換機(jī)IOS升級(jí)故障排除交換機(jī)運(yùn)行中出現(xiàn)故障是不可避免的,但出現(xiàn)故障后應(yīng)當(dāng)迅速地進(jìn)行處理,盡快查出故障點(diǎn),排除故障。但是要做到這一點(diǎn),就必須了解交換機(jī)故障的類型及具備對(duì)故障進(jìn)行分析和處理
發(fā)表于 06-02 11:42
Cisco Unity Express語音郵件
Express的另一個(gè)主要優(yōu)勢(shì)在于:它能夠簡(jiǎn)化網(wǎng)絡(luò)管理,尤其是在通常缺乏現(xiàn)場(chǎng)技術(shù)專家的中小型機(jī)構(gòu)中。隨時(shí)輕松添加全新話音業(yè)務(wù)的靈活性使該解決方案 更具優(yōu)勢(shì)。 Cisco Unity Express還提供配置
發(fā)表于 11-13 21:50
Cisco 650-180 最新資訊
three reside on the UC500 platform? (Choose three)A. Cisco IOSB.
Cisco Unity ExpressC. Cisco
發(fā)表于 06-07 13:24
Cisco 650-180 最新資訊
three reside on the UC500 platform? (Choose three)A. Cisco IOSB.
Cisco Unity ExpressC. Cisco I
發(fā)表于 06-08 09:28
如何使用AT+CIPSTART命令進(jìn)行SSL連接?
我想建立從我的 ESP8266 到實(shí)現(xiàn) SSL 套接字的服務(wù)器的 SSL 連接。所以,當(dāng)然,我需要以下 AT 命令:
- AT+CIPSTART
- AT+CIPSSLSIZE
但是....我不知道如何(以及在??哪里)上傳證
發(fā)表于 05-19 09:09
CISCO路由器配置實(shí)例
Cisco 路由器的基本配置百余例目錄1.用戶通過DDN專線接入ISP 2.遠(yuǎn)程用戶撥號(hào)連入局域網(wǎng) 3.遠(yuǎn)程用戶間對(duì)撥 4.Cisco HSRP的
發(fā)表于 08-31 09:46
?46次下載
CISCO_2511終端服務(wù)器簡(jiǎn)單配置
cisco 終端訪問服務(wù)器配置
配置終端訪問服務(wù)器
試驗(yàn)環(huán)境,不可缺少的應(yīng)用
大家在做實(shí)驗(yàn)是經(jīng)常面臨這樣的一個(gè)問題,就是在操作多臺(tái)設(shè)備時(shí)
發(fā)表于 10-22 16:47
?33次下載
如何配置Cisco PIX防火墻
如何配置Cisco PIX防火墻
在配置PIX防火墻之前,先來介紹一下防火墻的物理特性。防火墻通常具有至少3個(gè)接口,但許多早期的防火墻只具有
發(fā)表于 01-13 13:26
?595次閱讀
CISCO路由器初始配置手冊(cè)
CISCO路由器初始配置手冊(cè)
很多初學(xué)路由器知識(shí)的網(wǎng)友對(duì)路由器的初始配置可能感到很陌生,本人在初學(xué)時(shí)也很困惑,因?yàn)橐幌鲁鰜砗芏嗵?/div>
發(fā)表于 04-01 11:49
?851次閱讀
ssl是什么意思
ssl是什么意思,SSL安全套接層及其繼任者傳輸層安全TLS是為網(wǎng)絡(luò)通信提供安全及數(shù)據(jù)完整性的一種安全協(xié)議。TLS與SSL在傳輸層對(duì)網(wǎng)絡(luò)連接進(jìn)行加密
發(fā)表于 12-21 16:01
?1.5w次閱讀
cisco交換機(jī)幾種配置模式之間如何切換?
cisco交換機(jī)幾種配置模式之間如何切換? 首先,我們需要了解幾種常見的Cisco交換機(jī)配置模式和它們各自的作用。 1. 用戶模式(User Exec Mode) 用戶模式是交換機(jī)的默
評(píng)論