D-Link DI-3660 [353/506] Ensuring that access lists are compatible with ipsec ike uses udp port 500 the ipsec esp and ah protocols use protocol numbers 50 and 51 ensure that your access lists are conf...

D-Link DI-3660 [353/506] Ensuring that access lists are compatible with ipsec ike uses udp port 500 the ipsec esp and ah protocols use protocol numbers 50 and 51 ensure that your access lists are conf...
Command Line Interface Reference Manual
353
6.4.4.1 Ensuring That Access Lists Are Compatible With IPSec
IKE uses UDP port 500. The IPSec ESP and AH protocols use protocol numbers 50 and 51. Ensure that your access lists
are configured so that protocol 50, 51, and UDP port 500 traffic is not blocked at interfaces used by IPSec.
6.4.4.2 Creat Crypto Access Lists
Crypto access lists are used to define which IP traffic will be protected by crypto and which traffic will not be protected
by crypto. (These access lists are not the same as regular access lists, which determine what traffic to forward or block at
an interface.)
Crypto access lists associated with IPSec crypto map entries have four primary functions:
Select outbound traffic to be protected by IPSec (permit = protect).
Indicate the data flow to be protected by the new security associations (specified by a single permit entry)
when initiating negotiations for IPSec security associations.
Process inbound traffic in order to filter out and discard traffic that should have been protected by IPSec.
Determine whether or not to accept requests for IPSec security associations on behalf of the requested data
flows when processing IKE negotiation from the IPSec peer.
If you want certain traffic to receive one combination of IPSec protection (for example, authentication only) and other
traffic to receive a different combination of IPSec protection (for example, both authentication and encryption), you need
to create two different crypto access lists to define the two different types of traffic. These different access lists are then
used in different crypto map entries which specify different IPSec policies.
Later, you will associate the crypto access lists to particular interfaces when you configure and apply crypto map sets to
the interfaces. To create crypto access lists, use the following command in global configuration mode:
Command Purpose
ip access-list extended name 然后使用 permit deny 命令设置访问规则
permit protocol source source-mask destination destination-mask 
Specifies which IP packets will
be encrypting protected.
[DEFAULT@Router /config/]#ip 
  Key Word: 
   U(undo)  D(default)   Q(quit) 
   (00)access-list             Named access-list 
   (01)as-path                 BGP as-path access list definition 
   …… 
  Please Input the code of command to be excute(0-20):  
  Key Word: 
    Q(quit) 
   (00)extended             Extended Access List 
   (01)standard             Standard Access List 
  Please Input the code of command to be excute(0-1):  
  Key Word: 
    Q(quit) 
   (00)WORD           Extended Access-list name 
  Please Input the code of command to be excute(0-0): 0 
  Please input a string:bdcom Input Access-list name 
  Will you excute it? (Y/N): 
  Key Word: 
    Q(quit) 
   …… 
   (11)permit                         Specify packets to forward 
   (13)router                         routing protocol configuration 
   …… 
  Please Input the code of command to be excute(0-14): 11 

Содержание

Скачать