!
version 12.4
service config
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router_A
!
boot-start-marker
boot-end-marker
!
no aaa new-model
memory-size iomem 25
!
ip cef
!
crypto pki trustpoint TP-self-signed-2739943660
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2739943660
revocation-check none
rsakeypair TP-self-signed-2739943660
!
crypto pki certificate chain TP-self-signed-2739943660
certificate self-signed 01
30820240 308201A9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32373339 39343336 3630301E 170D3032 30333031 30383333
31335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 37333939
34333636 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B801 2715B5BD 2CCA418A BCB72107 891716CF 99758697 A395941B CD3EE6C7
7339F674 37CF5F84 E3E13E2E CA3AEF16 07569309 CAA7AF3B D0CE1ADF EF4C14F0
18508FA3 F4EF215D 9F88C401 B4E67190 A15A9B1A 20FA9A11 97F1C4CC 650D79CD
2C797FCD 7993CDDD 3CBB89CB DF935B57 7FF5BB29 19B5B957 8F95C7B0 39F24690
23F10203 010001A3 68306630 0F060355 1D130101 FF040530 030101FF 30130603
551D1104 0C300A82 08526F75 7465725F 41301F06 03551D23 04183016 8014D679
AB085017 C0B1E2FD A6AE9B37 E1D3687E B6F7301D 0603551D 0E041604 14D679AB
085017C0 B1E2FDA6 AE9B37E1 D3687EB6 F7300D06 092A8648 86F70D01 01040500
03818100 6EB53D7A 1B983579 1A289726 56302905 75F73681 B6D72E46 745C79D3
6D2536F8 4F75E139 08FA71EC 7F3643A5 6565E05C 7379025B 72DFAA14 E37D8E30
00D2E98F 3861462B 9C98217D 2C7F3303 E0EDC747 6E73B6EF 95C43BFD 172802C6
EE636A95 E2E832B2 B8EFDE56 1258B890 71B786AA EA208436 B27475E1 D7756B0D BDC9591E
quit
username ccnaccnp privilege 15 secret 5 ccnaccnp
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key cisco address 200.200.200.2
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Tunnel to200.200.200.2
set peer 200.200.200.2
set transform-set ESP-3DES-SHA
match address 100
!
interface Ethernet0
ip address 200.200.200.1 255.255.255.0
half-duplex
crypto map SDM_CMAP_1
!
interface FastEthernet0
ip address 192.168.1.1 255.255.255.0
speed auto
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Ethernet0
ip http server
ip http authentication local
ip http secure-server
!
access-list 100 remark SDM_ACL Category=4
access-list 100 remark IPSec Rule
access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
!
control-plane
!
line con 0
line aux 0
line vty 0 4
privilege level 15
login local
transport input telnet
!
end