Lab 2. IPSEC Tunnel Mode
Nah guys dikarenakan GRE Tunnel tidak melakukan enskripsi maka rentan sekali dia untuk terkena Decrypt, nah pada kali ini ada solusi untuk mengenkripsi yaitu dengan cara mengkombinasikan GRE tunnel dengan IPsec, pada ipsec terdapat 2 phase IKE nih temen-temen, :
1. Bertugas membangun dan membentuk koneksi awal dengan peer
2. Bertugas untuk mengenkripsi dan authentication transport data
Nah sampai sini faham ya gaesss, sekarang kita akan lanjut konfigurasi nya ya.
Untuk lanjut konfigurasi ini, kita akan hapus dulu konfigurasi sebelumnya:
R2 dan R3
R2(config)#no router eigrp 23
R2(config)#no interface tunnel23
R3(config)#no interface tunnel32
R3(config)#no router eigrp 23
Konfigurasi ISAKMP nya phase 1 dan Phase 2
R2(config)#no router eigrp 23
R2(config)#no interface tunnel23
R3(config)#no interface tunnel32
R3(config)#no router eigrp 23
Konfigurasi ISAKMP nya phase 1 dan Phase 2
R2
R2(config)#crypto isakmp policy 1
R2(config-isakmp)#encryption aes
R2(config-isakmp)#hash sha
R2(config-isakmp)#authentication pre-share
R2(config-isakmp)#group 2
R2(config-isakmp)#crypto isakmp key 0 IDNJOS address 13.13.13.3
R2(config)#crypto ipsec transform-set ROSLIANA esp-aes esp-sha-hmac R2(config)#crypto map ROSLIANA12A 10 ipsec-isakmp
R2(config-crypto-map)#set peer 13.13.13.3
R2(config-crypto-map)#set transform-set ROSLIANA
R2(config-crypto-map)#match address 100
R2(config-crypto-map)#access-list 100 permit ip host 2.2.2.2 host 3.3.3.3
R2(config)#crypto isakmp policy 1
R2(config-isakmp)#encryption aes
R2(config-isakmp)#hash sha
R2(config-isakmp)#authentication pre-share
R2(config-isakmp)#group 2
R2(config-isakmp)#crypto isakmp key 0 IDNJOS address 13.13.13.3
R2(config)#crypto ipsec transform-set ROSLIANA esp-aes esp-sha-hmac R2(config)#crypto map ROSLIANA12A 10 ipsec-isakmp
R2(config-crypto-map)#set peer 13.13.13.3
R2(config-crypto-map)#set transform-set ROSLIANA
R2(config-crypto-map)#match address 100
R2(config-crypto-map)#access-list 100 permit ip host 2.2.2.2 host 3.3.3.3
Jangan lupa ya teman-teman, kita konfigurasikan isakmp phase 1 dan 2 juga
R3
R3(config)#crypto isakmp policy 1
R3(config-isakmp)#encryption aes R3(config-isakmp)#hash sha
R3(config-isakmp)#authentication pre-share
R3(config-isakmp)#group 2
!
R3(config-isakmp)#crypto isakmp key 0 IDNJOS address 12.12.12.2
!
R3(config)#crypto ipsec transform-set ROSLIANA esp-aes esp-sha-hmac
R3(cfg-crypto-trans)#crypto map ROSLIANA12A 10 ipsec-isakmp
R3(config-crypto-map)#set peer 12.12.12.2
R3(config-crypto-map)#set transform-set ROSLIANA
R3(config-crypto-map)#match address 100
R3(config-crypto-map)#access-list 100 permit ip host 3.3.3.3 host 2.2.2.2
Selanjutnya kita akan pasang static routing dan crypto map di R2 dan R3.
R2
R2(config)#ip route 3.3.3.3 255.255.255.255 13.13.13.3
R2(config)#int fa0/0
R2(config-if)#crypto map IDNSCHOOL
R3
R3(config)#ip route 2.2.2.2 255.255.255.255 12.12.12.2 R R3(config)#int fa0/0
R3(config-if)#crypto map IDNSCHOOL
Sekarang kita akan lakukan verifikasi apakah sudah UP ?? R2
R2(config)#do show crypto session
Crypto session current status
Interface: FastEthernet0/0
Session status: UP-ACTIVE
IKE SA: local 12.12.12.2/500 remote 13.13.13.3/500 Active
IPSEC FLOW: permit ip host 2.2.2.2 host 3.3.3.3
Active SAs: 2, origin: crypto map
R3
R3#show crypto session
Crypto session current status
Interface: FastEthernet0/0
Session status: UP-ACTIVE
IKE SA: local 13.13.13.3/500 remote 12.12.12.2/500 Active
IPSEC FLOW: permit ip host 3.3.3.3 host 2.2.2.2
Active SAs: 2, origin: crypto map
Cek Ping : R2
R2(config)#do ping 3.3.3.3 source 2.2.2.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 3.3.3.3, timeout is 2 seconds: Packet sent with a source address of 2.2.2.2
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 52/75/92 ms
Komentar
Posting Komentar