Configuration R1:
==============
!
aaa new-model
!
!
aaa authentication login VPN local
aaa authorization network VPN local
!
!
aaa session-id common
memory-size iomem 5
ip cef
!
!
!
!
no ip domain lookup
!
multilink bundle-name authenticated
!
!
!
crypto isakmp policy 10
 authentication pre-share
 group 2
crypto isakmp key cisco address 0.0.0.0 0.0.0.0
!
crypto isakmp client configuration group CISCOSYSTEM
 key cisco
 dns 4.2.2.2
 domain cisco.com
 pool VPN-POOL
 acl 100
 save-password
 netmask 255.255.255.0
 banner ^C This is a test banner !  ^C
crypto isakmp profile ISAKMP_PROFILE
   match identity group CISCOSYSTEM
   isakmp authorization list VPN
   client configuration address respond
   virtual-template 1
!
!
crypto ipsec transform-set TS esp-des esp-sha-hmac
!
crypto ipsec profile IPSEC_PROFILE
 set transform-set TS
 set isakmp-profile ISAKMP_PROFILE
!
!
!
!
!
!
username kamran password 0 shakil
archive
 log config
  hidekeys
!
!
!
!
!
interface Loopback0
 ip address 192.168.20.1 255.255.255.0
!
interface FastEthernet0/0
 ip address 100.1.1.1 255.255.255.0
 duplex auto
 speed auto
!
interface FastEthernet0/1
 no ip address
 shutdown
 duplex auto
 speed auto
!
interface Virtual-Template1 type tunnel
 ip unnumbered FastEthernet0/0
 tunnel source FastEthernet0/0
 tunnel mode ipsec ipv4
 tunnel protection ipsec profile IPSEC_PROFILE
!
!
router eigrp 10
 network 192.168.1.0
 network 192.168.20.0
 no auto-summary
!
ip local pool VPN-POOL 10.1.1.1 10.1.1.2
ip route 0.0.0.0 0.0.0.0 FastEthernet0/0
!
!
no ip http server
no ip http secure-server
!
access-list 100 permit ip 192.168.20.0 0.0.0.255 any
!
!
!
!
control-plane
!
!
line con 0
 exec-timeout 0 0
 logging synchronous
line aux 0
line vty 0 4
!

Output:
=======

R1#sh crypto route

VPN Routing Table: Shows RRI and VTI created routes
Codes: RRI - Reverse-Route, VTI- Virtual Tunnel Interface
        S - Static Map ACLs

Routes created in table GLOBAL DEFAULT
10.1.1.2/255.255.255.255 [1/0] via 100.1.1.2
                                on Virtual-Access2 RRI
R1#
R1#
R1#sh crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst             src             state          conn-id slot status
100.1.1.1       100.1.1.2       QM_IDLE           1002    0 ACTIVE
ISAKMP_PROFILE

IPv6 Crypto ISAKMP SA

R1#

R1#sh crypto session
Crypto session current status

Interface: Virtual-Access2
Profile: ISAKMP_PROFILE
Group: CISCOSYSTEM
Assigned address: 10.1.1.2
Session status: UP-ACTIVE
Peer: 100.1.1.2 port 500
  IKE SA: local 100.1.1.1/500 remote 100.1.1.2/500 Active
  IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 host 10.1.1.2
        Active SAs: 2, origin: crypto map


R1#sh crypto ENgine CONNections act
Crypto Engine Connections

   ID Interface  Type  Algorithm           Encrypt  Decrypt IP-Address
    1 Fa0/0      IPsec DES+SHA                   0      199 100.1.1.1
    2 Fa0/0      IPsec DES+SHA                 100        0 100.1.1.1
 1001 Fa0/0      IKE   SHA+DES                   0        0 100.1.1.1

R1#




R2(REMOTE VPN ROUTER)

Configuration of R2 :
===============
!
crypto isakmp policy 10
 authentication pre-share
 group 2
crypto isakmp key cisco address 0.0.0.0 0.0.0.0
!
!
!
!
!
crypto ipsec client ezvpn EZVPN
 connect auto
 group CISCOSYSTEM key cisco
 local-address FastEthernet0/0
 mode client
 peer 100.1.1.1
 username kamran password shakil
 xauth userid mode local
!
!
!
!
!
!
username kamran password 0 shakil
archive
 log config
  hidekeys
!
!
!
!
!
interface Loopback0
 ip address 192.168.1.1 255.255.255.0
 crypto ipsec client ezvpn EZVPN inside
!
interface FastEthernet0/0
 ip address 100.1.1.2 255.255.255.0
 ip virtual-reassembly
 duplex auto
 speed auto
 crypto ipsec client ezvpn EZVPN
!
interface Virtual-Template1 type tunnel
 no ip address
 ip virtual-reassembly
 tunnel mode ipsec ipv4
!
router eigrp 10
 network 192.168.0.0
 no auto-summary
!
ip route 0.0.0.0 0.0.0.0 FastEthernet0/0
!
!
no ip http server
no ip http secure-server
!
!
!
!
!
control-plane
!
!
line con 0
 exec-timeout 0 0
 logging synchronous
line aux 0

Outputs
======
R2#sh crypto session brief
Status: A- Active, U - Up, D - Down, I - Idle, S - Standby, N -
Negotiating

        K - No IKE
ivrf = (none)
       Peer     I/F        Username          Group/Phase1_id   Uptime
Status                                            100.1.1.1
Fa0/0                                100.1.1.1 00:03:53    UA

R2#
R2#PING 100.1.1.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 100.1.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 124/138/176 ms
R2#ping 192.168.20.1 source 192.168.1.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 104/140/212 ms
R2#

R2#sh crypto ipsec client ezvpn
Easy VPN Remote Phase: 6

Tunnel name : EZVPN
Inside interface list: Loopback0
Outside interface: FastEthernet0/0
Current State: IPSEC_ACTIVE
Last Event: MTU_CHANGED
Address: 10.1.1.2 (applied on Loopback10000)
Mask: 255.255.255.255
DNS Primary: 4.2.2.2
Default Domain: cisco.com
Save Password: Allowed
Split Tunnel List: 1
       Address    : 192.168.20.0
       Mask       : 255.255.255.0
       Protocol   : 0x0
       Source Port: 0
       Dest Port  : 0
Current EzVPN Peer: 100.1.1.1

R2#


R2#sh crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst             src             state          conn-id slot status
100.1.1.1       100.1.1.2       QM_IDLE           1002    0 ACTIVE


r2#sh crypto engine connections active
Crypto Engine Connections

   ID Interface  Type  Algorithm           Encrypt  Decrypt IP-Address
    1 Fa0/0      IPsec DES+SHA                   0      100 100.1.1.2
    2 Fa0/0      IPsec DES+SHA                 199        0 100.1.1.2
 1001 Fa0/0      IKE   SHA+DES                   0        0 100.1.1.2




BUT ROUTE TO 192.168.20.0/24 is NOT PRESENT IN THE ROUTING TABLE ????? "How
can i install it " .... i think due to default route it is able to reach
192.168.20.1 , but i  believe there should be 192.168.20.0/24 subnet
available in R2 -Remote end router routing table ... please correct me if i
am wrong!!!!


R2#sh ip ro
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static
route
       o - ODR, P - periodic downloaded static route

Gateway of last resort is 0.0.0.0 to network 0.0.0.0

     100.0.0.0/24 is subnetted, 1 subnets
C       100.1.1.0 is directly connected, FastEthernet0/0
     10.0.0.0/32 is subnetted, 1 subnets
C       10.1.1.1 is directly connected, Loopback10000
C    192.168.1.0/24 is directly connected, Loopback0
S*   0.0.0.0/0 is directly connected, FastEthernet0/0
R2#



This config works FINE BUT......................................*NOTE : " If
i remote the static default routes to fa0/0 with router ospf and advertise
link 100.0.0.0 with area 0  , the things stops working ...why i dont know,
and this is my query..."*
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to