Bu kalit o’zgarganini anglatmaydi, balki shivrlangan ko’rinishda tasvilnaganini anglatadi.
E’tibor qarating, har bir ofisda biz qo’shni tarmoq tashqi manzilini ko’rsatyapmiz.
3-qadam. Tunnelli interfeyslarni yaratish Har bir marshrutizatorda virtual tunnelli interfeys yaratamiz. Bosh ofisda:
R-MAIN(config)# interface Tunnel1 description Link to R-BRANCH ip address 10.0.0.1 255.255.255.252 tunnel source FastEthernet 0/0 tunnel destination 2.2.2.2 tunnel mode ipsec ipv4 tunnel protection ipsec profile VTI_PROF
ip address 10.0.0.1 255.255.255.252 — virtual tunneling o’z manzili
tunnel source FastEthernet 0/0 — marshrutizatorning xususiy tashqi interfeysi
tunnel destination 2.2.2.2 — filial marshrutizatorining tashqi manzili
tunnel mode ipsec ipv4 — shifrlash turi
tunnel protection ipsec profile VTI_PROF — shifrlash usuli
Muhim! Agar sizda oxirgi ikki satrni kiritishda xato haqidagi xabar paydo bo‘lsa va marshrutizator ushbu buyruqlarni qabul qilmasa, u holda shifrlash profilini quyidagi buyruq orqali olib tashlang
no crypto ipsec profile VTI_PROF
Sizning marshritizatoringizning IOS opertsion tizimining joriy versiyasida ushbu suslni qo’llab bo’lmaydi. Ikkinchi usulga o’ting.
Filial ofisida