You used SVTI on one side and DVTI on the other.  You can't inter-mix these.

Try the first on both sides.

Regards,

Tyson Scott
CCIE # 13513 (R&S, Security, SP)
Managing Partner/Technical Instructor - IPexpert Inc.
[email protected]


----- Reply message -----
From: "Robert Gridley" <[email protected]>
Date: Sun, May 8, 2011 5:40 am
Subject: [OSL | CCIE_Security] Tunnel without GRE or ACL
To: "Robert Gridley" <[email protected]>, "[email protected]" 
<[email protected]>

Nobody who can help me ?


  ----- Original Message ----- 
  From: Robert Gridley 
  To: [email protected] 
  Sent: Friday, May 06, 2011 6:58 PM
  Subject: [OSL | CCIE_Security] Tunnel without GRE or ACL


  Hi,

  Im trying to build a IPSEC Tunnel without GRE, ACL. Im tried it with the 
following configuration:

  Plan:



     R1-------------------------------ASA------------------------------------R2



     fa0/1                  outside:40.40.1.10                     fa0/1



     40.40.1.1            inside:40.40.100.10                 40.40.100.2



     L0:192.168.1.1                                                 
L0:192.168.2.2




  ICMP, ESP and ISAKMP is allowed through ASA




  R2:



  crypto keyring WPSK



    pre-shared-key address 40.40.1.1 key cisco123






  crypto isakmp policy 10



  encr 3des



  authentication pre-share



  group 2



  crypto isakmp profile DVTI



     match identity address 40.40.1.1 255.255.255.255









  crypto ipsec transform-set myset esp-3des esp-sha-hmac






  crypto ipsec profile VTI



  set transform-set myset



  set isakmp-profile DVTI

  interface Loopback0



  ip address 192.168.2.2 255.255.255.0






  interface Tunnel0



  ip address 10.10.10.2 255.255.255.0



  tunnel source FastEthernet0/1



  tunnel destination 40.40.1.1



  tunnel mode ipsec ipv4



  tunnel protection ipsec profile VTI






  interface FastEthernet0/1



  ip address 40.40.100.2 255.255.255.0



  duplex auto



  speed auto






  router eigrp 100



  network 10.10.10.2 0.0.0.0



  network 192.168.2.2 0.0.0.0



  no auto-summary






  ip route 40.40.1.0 255.255.255.0 40.40.100.10







  R1:




  crypto keyring WPSK



    pre-shared-key address 40.40.100.2 key cisco






  crypto isakmp policy 10



  encr 3des



  authentication pre-share



  group 2



  crypto isakmp profile DVTI



     keyring WPSK



     match identity address 40.40.100.2 255.255.255.255



     virtual-template 1




  crypto ipsec transform-set myset esp-3des esp-sha-hmac




  crypto ipsec profile VTI



  set transform-set myset



  set isakmp-profile DVTI



  interface Loopback0



  ip address 192.168.1.1 255.255.255.0




  interface FastEthernet0/1



  ip address 40.40.1.1 255.255.255.0



  speed 100



  full-duplex



  interface Virtual-Template1 type tunnel



  ip address 10.10.10.1 255.255.255.0



  tunnel mode ipsec ipv4



  tunnel protection ipsec profile VTI




  router eigrp 100



  network 192.168.1.1 0.0.0.0



  no auto-summary




  ip route 40.40.100.0 255.255.255.0 40.40.1.10


  Its not working yet. Somebody know whats wrong with the configuration ?


  Thanks!

  regards,

  Robert 



------------------------------------------------------------------------------


  _______________________________________________
  For more information regarding industry leading CCIE Lab training, please 
visit www.ipexpert.com

  Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to