Portál AbcLinuxu, 13. května 2025 19:51
Potrebujem prepojit moju siet v CR 192.168.221.0 So sietou ktora je v Argentine 10.10.10.0/24A teraz problemovy router v Chile. Potrebujem,aby to co mu pride z mojej verejnej ip adresy na jednom iterfacy rozbalil, videl ze zdroj je 192.168.221.0/24, destination 10.10.10.0/24, ze destination je na inom interfacy, znovu zabalil do esp packetu ten prijaty paket a poslal ho routru umiestnenemu v Argentine. Keby tam bol debian a ipsec-tools tak to urobim jednoducho. Bohuzial, cisco nie je moja velka domema. Pytam sa, moze to vyzerat takto?
access-list outside_cryptomap_20_1 permit 192.168.221.0 255.255.255.0 10.10.10.0 255.255.255.0 access-list outside_cryptomap_20_1 permit 10.10.10.0 255.255.255.0 192.168.221.0 255.255.255.0 access-list outside_cryptomap_40_1 permit 192.168.221.0 255.255.255.0 10.10.10.0 255.255.255.0 access-list outside_cryptomap_40_1 permit 10.10.10.0 255.255.255.0 192.168.221.0 255.255.255.224 crypto map outside_map 20 match address outside_cryptomap_20_1 crypto map outside_map 20 set pfs crypto map outside_map 20 set peer moja_verejna_ip_adresa crypto map outside_map 40 match address outside_cryptomap_40_1 crypto map outside_map 40 set peer verejna_ip_addr_argentina plus many another commandMozu byt v ciscu takto definovane smery pomocou access-list?![]()
encapsulation
zkracene enc
?
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.