Example: ipv4 in ike2 over ipv4¶
r1
hostname r1
vrf def v1
rd 1:1
exit
int eth1
vrf for v1
ipv4 addr 1.1.1.1 255.255.255.0
ipv6 addr 1234::1 ffff::
exit
crypto ipsec ips
group 02
cipher des
hash md5
seconds 3600
bytes 1024000
key tester
role init
isakmp 2
protected ipv4
exit
int tun1
tunnel vrf v1
tunnel prot ips
tunnel mode ipsec
tunnel source ethernet1
tunnel destination 1.1.1.2
vrf for v1
ipv4 addr 2.2.2.1 255.255.255.0
ipv6 addr 4321::1 ffff::
exit
r2
hostname r2
vrf def v1
rd 1:1
exit
crypto ipsec ips
group 02
cipher des
hash md5
seconds 3600
bytes 1024000
key tester
role resp
isakmp 2
protected ipv4
exit
int eth1
vrf for v1
ipv4 addr 1.1.1.2 255.255.255.0
ipv6 addr 1234::2 ffff::
exit
int tun1
tunnel vrf v1
tunnel prot ips
tunnel mode ipsec
tunnel source ethernet1
tunnel destination 1.1.1.1
vrf for v1
ipv4 addr 2.2.2.2 255.255.255.0
ipv6 addr 4321::2 ffff::
exit
r1 tping 100 10 2.2.2.2 vrf v1
r2 tping 100 10 2.2.2.1 vrf v1
r1 tping 0 10 4321::2 vrf v1
r2 tping 0 10 4321::1 vrf v1
- Install ContainerLab as described here
- Fetch crypt-ike201 file
- Launch ContainerLab
crypt-ike201.yml
topology:
containerlab deploy --topo crypt-ike201.yml
crypt-ike201.yml
topology:
containerlab destroy --topo crypt-ike201.yml