Foundry Networks AR3202-CL Manual Do Utilizador

Página de 293
Security Features
June 2004
© 2004 Foundry Networks, Inc.
15 - 31
Step 6: Display dynamic IKE policies in detail:
Step 7: Configure dynamic IPSec policy for a group of mobile users:
Step 8: Display dynamic IPSec policies:
Router1# show crypto dynamic ike policy all detail
Policy name sales, User group name sales
Aggressive mode, Response Only, PFS is not enabled, Shared Key is 
*****
Client authentication is Radius(PAP)
Local addr: 172.16.0.1, Local ident 172.16.0.1 (ip-address)
Remote idents are david@abc-corp.com (email-id), mike@abc-corp.com 
(email-id)
Proposal of priority 1
        Encryption algorithm: 3des
        Hash Algorithm: sha1
        Authentication Mode: pre-shared-key
        DH Group: group1
        Lifetime in seconds: 86400
        Lifetime in kilobytes: unlimited
Router1/configure/crypto/dynamic# ipsec policy sales
Router1/configure/crypto/dynamic/ipsec/policy sales# match address 
10.0.1.0 24
Default proposal created with priority1-esp-3des-sha1-tunnel and 
activated.
Router1/configure/crypto/dynamic/ipsec/policy sales# proposal 1
Router1/configure/crypto/dynamic/ipsec/policy sales/proposal 1# 
encryption-algorithm aes256-cbc
Router1/configure/crypto/dynamic/ipsec/policy sales/proposal 1# exit
Router1/configure/crypto/dynamic/ipsec/policy sales# exit
Router1/configure/crypto/dynamic#
Router1# show crypto dynamic ipsec policy all
Policy     Match                     Proto Transform
------     -----                     ----- ---------
sales      S 10.0.1.0/24/any          Any  P1 esp-aes-sha1-tunl
           D any/any/any
INsales    S any/any/any              Any  P1 esp-aes-sha1-tunl
           D 10.0.1.0/24/any