Example: ike2 with group24¶
r1
hostname r1
vrf def v1
rd 1:1
exit
int eth1
vrf for v1
ipv4 addr 1.1.1.1 255.255.255.0
exit
crypto ipsec ips
group 24
cipher des
hash md5
seconds 3600
bytes 1024000
key tester
role init
isakmp 2
protected ipv4
exit
int tun1
tunnel vrf v1
tunnel prot ips
tunnel mode ipsec
tunnel source ethernet1
tunnel destination 1.1.1.2
vrf for v1
ipv4 addr 2.2.2.1 255.255.255.0
exit
r2
hostname r2
vrf def v1
rd 1:1
exit
crypto ipsec ips
group 24
cipher des
hash md5
seconds 3600
bytes 1024000
key tester
role resp
isakmp 2
protected ipv4
exit
int eth1
vrf for v1
ipv4 addr 1.1.1.2 255.255.255.0
exit
int tun1
tunnel vrf v1
tunnel prot ips
tunnel mode ipsec
tunnel source ethernet1
tunnel destination 1.1.1.1
vrf for v1
ipv4 addr 2.2.2.2 255.255.255.0
exit
r1 tping 100 30 2.2.2.2 vrf v1
r2 tping 100 30 2.2.2.1 vrf v1
- Install ContainerLab as described here
- Fetch crypt-ike225 file
- Launch ContainerLab
crypt-ike225.yml
topology:
containerlab deploy --topo crypt-ike225.yml
crypt-ike225.yml
topology:
containerlab destroy --topo crypt-ike225.yml