Router1/configure/crypto/# exit, Router1/configure# snmp, Router1/configure/snmp# community public rw – Foundry Networks AR3202-CL User Manual

Page 234: Router1/configure/snmp# exit, Router1# show snmp communities, Community = public, privilege=rw, Router1# show crypto ike sa all, Policy peer state bytes transform, Router2 172.16.0.2 sa_mature 2020 pre-g1-3des-sha1, Router1# show crypto ike sa all detail

Advertising
background image

Security Features

June 2004

© 2004 Foundry Networks, Inc.

15 - 9

Step 15: Enable SNMP on the Router1 router:

Step 16: Display SNMP communities:

Step 17: Repeat steps 1 - 16 with suitable modifications on Router2 prior to managing Router1
from Router2’s LAN side.

Step 18: Test the IPSec tunnel for managing the Router1 router from a host on Router2’s LAN.

Step 19: When the SNMP manager starts managing Router1 from Router2’s LAN, display the
IKE and IPSec SA tables.

Router1/configure/crypto/# exit

Router1/configure# snmp

Router1/configure/snmp# community public rw

Router1/configure/snmp# exit

Router1# show snmp communities

Community = public, privilege=rw

Router1# show crypto ike sa all

Policy Peer State Bytes Transform

------ ---- ----- ----- ---------

Router2 172.16.0.2 SA_MATURE 2020 pre-g1-3des-sha1

Router1# show crypto ike sa all detail

Crypto Policy name: Router2

Remote ident 172.16.0.2

Peer Address is 172.16.0.2

Transform: 3des, sha1, pre-shared-key

DH Group: group1

Bytes Processed 2020

State is SA_MATURE

Mode is Main

Remaining Time in Sec: 86084

Life Time in Sec: 86400, Life Time in Bytes is unlimited

Router1# show crypto ipsec sa all

Policy Dest IP Spi Bytes Transform

------ ------- --- ----- ---------

INRouter2 172.16.0.1 0xe8453c2b 256 esp-aes-sha1-tunl

Router2 172.16.0.2 0xa1f673aa 256 esp-aes-sha1-tunl

Advertising
This manual is related to the following products: