Skip to content

Example: ike2 with group22

Alt text

r1

hostname r1
vrf def v1
 rd 1:1
 exit
int eth1
 vrf for v1
 ipv4 addr 1.1.1.1 255.255.255.0
 exit
crypto ipsec ips
 group 22
 cipher des
 hash md5
 seconds 3600
 bytes 1024000
 key tester
 role init
 isakmp 2
 protected ipv4
 exit
int tun1
 tunnel vrf v1
 tunnel prot ips
 tunnel mode ipsec
 tunnel source ethernet1
 tunnel destination 1.1.1.2
 vrf for v1
 ipv4 addr 2.2.2.1 255.255.255.0
 exit

r2

hostname r2
vrf def v1
 rd 1:1
 exit
crypto ipsec ips
 group 22
 cipher des
 hash md5
 seconds 3600
 bytes 1024000
 key tester
 role resp
 isakmp 2
 protected ipv4
 exit
int eth1
 vrf for v1
 ipv4 addr 1.1.1.2 255.255.255.0
 exit
int tun1
 tunnel vrf v1
 tunnel prot ips
 tunnel mode ipsec
 tunnel source ethernet1
 tunnel destination 1.1.1.1
 vrf for v1
 ipv4 addr 2.2.2.2 255.255.255.0
 exit
r1 tping 100 30 2.2.2.2 vrf v1
r2 tping 100 30 2.2.2.1 vrf v1
  1. Install ContainerLab as described here
  2. Fetch crypt-ike223 file
  3. Launch ContainerLab crypt-ike223.yml topology:

   containerlab deploy --topo crypt-ike223.yml  
4. Destroy ContainerLab crypt-ike223.yml topology:

   containerlab destroy --topo crypt-ike223.yml  
5. Copy-paste configuration for each node in the lab topology

  1. Fetch or compile freeRtr rtr.jar file.
    You can grab it here
  2. Fetch crypt-ike223.tst file here
  3. Launch crypt-ike223.tst test:

   java -jar ../../rtr.jar test tester crypt-ike223 path ./ temp ./ wait
4. Destroy freeRtr crypt-ike223.tst test:

   Ctrl-C (In freeRtr test window)