R-BRANCH(config)# interface Tunnel1 description Link to R-MAIN ip address 10.0.0.2 255.255.255.252 tunnel source FastEthernet 4 tunnel destination 1.1.1.2 tunnel mode ipsec ipv4 tunnel protection ipsec profile VTI_PROF
ip address 10.0.0.2 255.255.255.252 — virtual tunneling o’z manzili
tunnel source FastEthernet 4 — marshrutizatorning xususiy tashqi interfeysi
tunnel destination 1.1.1.2 — bosh ofis marshrutizatorining tashqi manzili
tunnel mode ipsec ipv4 — shifrlash turi
tunnel protection ipsec profile VTI_PROF — shifrlash usuli
agar barcha uchta qadam to’g’ri bajarilsa, interfeys holati up/down holatidan up/up holaidga o’tadi. Quyidagi buyruqlar orqali ko’rish mumkin.
R-MAIN# sh inter tun 1 Tunnel1 is up, line protocol is up
4-qadam. VPN tunnel ishini tekshirish Tunneling ishchanligini ping utilitasi orqali tekshiramiz. Masalan, bosh ofisdan:
R-MAIN#ping 10.0.0.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 16/17/20 ms
sh cry ips sa peer 2.2.2.2 buyrug’I bilan paketlarning himoyalangan tunnel orqali o’tayotganligiga ishonch hosil qilamiz.
Oxirgi ikki satr shuni ko’rsatadiki, marshrutizator 5 ta xabarni shifrladi va yubordi va shuncha qabul qilib deshifrladi. Qandaydir paket bizning marshrutizatorlarimiz tunneli orqali o’tsa bu hisoblagichlar har safar ishlaydi.