markdown VRA配置

Posted

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了markdown VRA配置相关的知识,希望对你有一定的参考价值。

## VRA 1

```
vyatta@vra-server1:~$ show configuration commands | grep -E 'vpn|vif'
set interfaces bonding dp0bond0 vif 1440 address '10.161.111.65/26'
set interfaces bonding dp0bond0 vif 1440 address '192.168.10.1/24'
set interfaces bonding dp0bond0 vif 1440 address '192.168.20.1/24'
set interfaces bonding dp0bond1 vif 1296 address '169.45.115.17/28'
set security vpn ipsec esp-group ESP-vRouter1Private lifetime '1800'
set security vpn ipsec esp-group ESP-vRouter1Private proposal 1 encryption 'aes128'
set security vpn ipsec esp-group ESP-vRouter1Private proposal 1 hash 'sha2_256'
set security vpn ipsec esp-group ESP-vRouter1Private proposal 2 encryption '3des'
set security vpn ipsec esp-group ESP-vRouter1Private proposal 2 hash 'md5'
set security vpn ipsec esp-group ESP-vRouter1Public lifetime '1800'
set security vpn ipsec esp-group ESP-vRouter1Public proposal 1 encryption 'aes128'
set security vpn ipsec esp-group ESP-vRouter1Public proposal 1 hash 'sha2_256'
set security vpn ipsec esp-group ESP-vRouter1Public proposal 2 encryption '3des'
set security vpn ipsec esp-group ESP-vRouter1Public proposal 2 hash 'md5'
set security vpn ipsec ike-group IKE-vRouter1Private lifetime '3600'
set security vpn ipsec ike-group IKE-vRouter1Private proposal 1 encryption 'aes128'
set security vpn ipsec ike-group IKE-vRouter1Private proposal 1 hash 'sha2_256'
set security vpn ipsec ike-group IKE-vRouter1Private proposal 2 encryption 'aes128'
set security vpn ipsec ike-group IKE-vRouter1Private proposal 2 hash 'sha2_256'
set security vpn ipsec ike-group IKE-vRouter1Public lifetime '3600'
set security vpn ipsec ike-group IKE-vRouter1Public proposal 1 encryption 'aes128'
set security vpn ipsec ike-group IKE-vRouter1Public proposal 1 hash 'sha2_256'
set security vpn ipsec ike-group IKE-vRouter1Public proposal 2 encryption 'aes128'
set security vpn ipsec ike-group IKE-vRouter1Public proposal 2 hash 'sha2_256'
set security vpn ipsec site-to-site peer 10.168.63.16 authentication mode 'pre-shared-secret'
set security vpn ipsec site-to-site peer 10.168.63.16 authentication pre-shared-secret 'JaduB4aw21'
set security vpn ipsec site-to-site peer 10.168.63.16 default-esp-group 'ESP-vRouter1Private'
set security vpn ipsec site-to-site peer 10.168.63.16 description 'Private VPN Tunnel between vRouters in SJC03'
set security vpn ipsec site-to-site peer 10.168.63.16 ike-group 'IKE-vRouter1Private'
set security vpn ipsec site-to-site peer 10.168.63.16 local-address '10.161.110.11'
set security vpn ipsec site-to-site peer 10.168.63.16 tunnel 1 local prefix '192.168.20.0/24'
set security vpn ipsec site-to-site peer 10.168.63.16 tunnel 1 remote prefix '192.168.40.0/24'
set security vpn ipsec site-to-site peer 169.44.151.85 authentication mode 'pre-shared-secret'
set security vpn ipsec site-to-site peer 169.44.151.85 authentication pre-shared-secret 'JaduB4aw21'
set security vpn ipsec site-to-site peer 169.44.151.85 default-esp-group 'ESP-vRouter1Public'
set security vpn ipsec site-to-site peer 169.44.151.85 description 'Public VPN Tunnel between vRouters in SJC03'
set security vpn ipsec site-to-site peer 169.44.151.85 ike-group 'IKE-vRouter1Public'
set security vpn ipsec site-to-site peer 169.44.151.85 local-address '169.44.136.69'
set security vpn ipsec site-to-site peer 169.44.151.85 tunnel 1 local prefix '192.168.10.0/24'
set security vpn ipsec site-to-site peer 169.44.151.85 tunnel 1 remote prefix '192.168.30.0/24'
```

## VRA 2 

```
vyatta@vra-server2:~$ show configuration commands | grep -E 'vpn|vif'
set interfaces bonding dp0bond0 vif 904 address '10.168.140.1/26'
set interfaces bonding dp0bond0 vif 904 address '192.168.30.1/24'
set interfaces bonding dp0bond0 vif 904 address '192.168.40.1/24'
set interfaces bonding dp0bond1 vif 857 address '169.44.183.225/27'
set security vpn ipsec esp-group ESP-vRouter2Private lifetime '1800'
set security vpn ipsec esp-group ESP-vRouter2Private proposal 1 encryption 'aes128'
set security vpn ipsec esp-group ESP-vRouter2Private proposal 1 hash 'sha2_256'
set security vpn ipsec esp-group ESP-vRouter2Private proposal 2 encryption '3des'
set security vpn ipsec esp-group ESP-vRouter2Private proposal 2 hash 'md5'
set security vpn ipsec esp-group ESP-vRouter2Public lifetime '1800'
set security vpn ipsec esp-group ESP-vRouter2Public proposal 1 encryption 'aes128'
set security vpn ipsec esp-group ESP-vRouter2Public proposal 1 hash 'sha2_256'
set security vpn ipsec esp-group ESP-vRouter2Public proposal 2 encryption '3des'
set security vpn ipsec esp-group ESP-vRouter2Public proposal 2 hash 'md5'
set security vpn ipsec ike-group IKE-vRouter2Private lifetime '3600'
set security vpn ipsec ike-group IKE-vRouter2Private proposal 1 encryption 'aes128'
set security vpn ipsec ike-group IKE-vRouter2Private proposal 1 hash 'sha2_256'
set security vpn ipsec ike-group IKE-vRouter2Private proposal 2 encryption 'aes128'
set security vpn ipsec ike-group IKE-vRouter2Private proposal 2 hash 'sha2_256'
set security vpn ipsec ike-group IKE-vRouter2Public lifetime '3600'
set security vpn ipsec ike-group IKE-vRouter2Public proposal 1 hash 'sha2_256'
set security vpn ipsec ike-group IKE-vRouter2Public proposal 2 encryption 'aes128'
set security vpn ipsec ike-group IKE-vRouter2Public proposal 2 hash 'sha2_256'
set security vpn ipsec site-to-site peer 10.161.110.11 authentication mode 'pre-shared-secret'
set security vpn ipsec site-to-site peer 10.161.110.11 authentication pre-shared-secret 'JaduB4aw21'
set security vpn ipsec site-to-site peer 10.161.110.11 default-esp-group 'ESP-vRouter2Private'
set security vpn ipsec site-to-site peer 10.161.110.11 description 'Private VPN Tunnel between vRouters in SJC03'
set security vpn ipsec site-to-site peer 10.161.110.11 ike-group 'IKE-vRouter2Private'
set security vpn ipsec site-to-site peer 10.161.110.11 local-address '10.168.63.16'
set security vpn ipsec site-to-site peer 10.161.110.11 tunnel 1 local prefix '192.168.40.0/24'
set security vpn ipsec site-to-site peer 10.161.110.11 tunnel 1 remote prefix '192.168.20.0/24'
set security vpn ipsec site-to-site peer 169.44.136.69 authentication mode 'pre-shared-secret'
set security vpn ipsec site-to-site peer 169.44.136.69 authentication pre-shared-secret 'JaduB4aw21'
set security vpn ipsec site-to-site peer 169.44.136.69 default-esp-group 'ESP-vRouter2Public'
set security vpn ipsec site-to-site peer 169.44.136.69 description 'Public VPN Tunnel between vRouters in SJC03'
set security vpn ipsec site-to-site peer 169.44.136.69 ike-group 'IKE-vRouter2Public'
set security vpn ipsec site-to-site peer 169.44.136.69 local-address '169.44.151.85'
set security vpn ipsec site-to-site peer 169.44.136.69 tunnel 1 local prefix '192.168.30.0/24'
set security vpn ipsec site-to-site peer 169.44.136.69 tunnel 1 remote prefix '192.168.10.0/24'
```

以上是关于markdown VRA配置的主要内容,如果未能解决你的问题,请参考以下文章

xml vRA LeaseAboutToExpire.xslt日期

xml vRA LeaseAboutToExpire.xslt日期

vRA分布式架构6.2.3升级至6.2.5趟坑篇

powershell 使用本地用户创建vRA租户并添加目录

powershell 将vRA蓝图导出为PowervRA的内容包

vRA7 Business error “Untrusted certificate chain”