Interesting about the IOS version.
When I looked at your configs what jumped out was that the transform name
was "vpn" and the crypto map was named "ramco-vpn" yet the crypto map name
applied to the outside interfaces was "vpn". I'd expect "ramco-vpn".
Also on RouterHQ Fa0 I didn't understand why the line "ip policy route-map
nonat" was there.
Glad that you got it working.

> -----Original Message-----
> From: Mark Odette II [mailto:[EMAIL PROTECTED]]
> Sent: Monday, April 22, 2002 2:58 PM
> To: [EMAIL PROTECTED]
> Subject: RE: Router to Router VPNs- Longish [7:42245]
 
> I was using 12.2.8T, and then tried 12.2.8T1 on the 1720, 
> with 12.2.6c on
> the other end.
> 
> I decided that maybe I should try making both ends run the 
> same version of
> IOS as much as possible, so I roll back the 1720 to 
> 12.1.5YB5, and planned
> to roll back the other end too to 12.1.5.
> Just for grins, I try my extended ping again to see if the 
> tunnel will come
> up and allow successful traffic back-n-forth.
> Wouldn't you know it, the silly thing works now!
> 
> So, a word to the wise for those wanting to do a VPN between 
> a 1700 series
> router and anything else.... Stay away from 12.2.8 code!!
> 
> now to "burn-test" the config and see how stable the VPN stays. :)
 
> -----Original Message-----
> From: Mark Odette II [mailto:[EMAIL PROTECTED]]
> Sent: April 22, 2002 10:52
> To: [EMAIL PROTECTED]
> Subject: Router to Router VPNs- Longish [7:42245]
> 
> 
> Hey folks, I am in a quandary, and am wondering if someone on 
> the list has
> done this and figured out a working config.
> 
> I've been challenged with putting a VPN together between two 
> sites, and it
> shouldn't be a problem, as it seems to be a straight forward 
> config, and
> I've used the example off of CCO.
> 
> The problem is, I can't seem to pass traffic successfully 
> across the VPN. :(
> 
> Attached is the config for both ends of the network setup.  
> As far as I
> know, as long as I've met the following criteria, this should work:
> 
> 1. Both ends have to have a public static address for at 
> least the Router.
> 2. Either end can have a static NAT for an extra inside host, 
> such as a WWW
> server. 3. The VPN tunnel should work, no matter what type of 
> "outside"
> interface the Crypto map is applied to; if regular private to 
> public net
> connectivity works using NAT Overload, then End to End Tunnel 
> termination
> should work so long as the access-lists are done right.
> 

> And... this is what I've done for my Routers:
> 
> RouterHQ#
> 
> version 12.2
! crypto 
> isakmp policy 10
> hash md5  authentication pre-share crypto isakmp key vpn address
> yy.yy.yy.220 ! ! crypto ipsec transform-set vpn esp-des esp-md5-hmac !
> crypto map ramco-vpn 10 ipsec-isakmp  set peer yy.yy.yy.220  set
> transform-set vpn  match address 101 ! ! bridge irb ! ! 

> !
> interface FastEthernet0
>  description connected to Private LAN Block
>  ip address 192.168.10.1 255.255.255.0
>  ip directed-broadcast
>  ip nat inside
>  ip policy route-map nonat
>  no ip mroute-cache
>  no keepalive
>  speed auto
>  full-duplex
> !
> interface BVI1
>  mtu 1492
>  ip address xx.xx.xx.121 255.255.255.248
>  ip nat outside
>  crypto map vpn
> !
> ip nat inside source route-map nonat interface BVI1 overload
> ip nat inside source static 192.168.10.122 xx.xx.xx.122 
> extendable ip nat
> inside source static 192.168.10.6 xx.xx.xx.124 extendable ip 
> classless ip
> route 0.0.0.0 0.0.0.0 xx.xx.xx.126 (ISP END of circuit) no ip 
> http server !
> ! logging history debugging logging trap debugging 
> access-list 101 permit ip
> 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255
> access-list 123 deny   ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255
> access-list 123 permit ip 192.168.10.0 0.0.0.255 any
> !
> route-map nonat permit 10
>  match ip address 123
 
> and the other end of the tunnel.....
> 
> RouterBO#
> version 12.2

> crypto isakmp policy 10
>  hash md5
>  authentication pre-share
> crypto isakmp key vpn address xx.xx.xx.121
> !
> !
> crypto ipsec transform-set vpn esp-des esp-md5-hmac
> !
> crypto map ramco-vpn 10 ipsec-isakmp
>  set peer xx.xx.xx.121
>  set transform-set vpn
>  match address 110
> !
> !
> !
> !
> interface Ethernet0
>  ip address yy.yy.yy.220 255.255.252.0
>  ip nat outside
>  ip route-cache same-interface
>  crypto map vpn
> !
> interface Ethernet1
>  description connected to LAN
>  ip address 192.168.1.1 255.255.255.0
>  ip nat inside
> !
> router rip
>  version 2
>  passive-interface Ethernet0
>  network 192.168.1.0
>  no auto-summary
> !
> ip nat pool 2514-nat-pool yy.yy.yy.220 yy.yy.yy.220 netmask 
> 255.255.252.0 ip
> nat inside source route-map nonat pool 2514-nat-pool overload 
> ip classless
> ip route 0.0.0.0 0.0.0.0 Ethernet0 no ip http server ! logging history
> debugging logging trap debugging logging source-interface Ethernet0
> access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
> access-list 150 deny   ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
> access-list 150 permit ip 192.168.1.0 0.0.0.255 any
> route-map nonat permit 10
>  match ip address 150

> 
> Any insight/help you can provide would be greatly appreciated.
> 
> Thanks,
> Mark




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=42271&t=42245
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to