[c-nsp] dynamic crypto maps and multiple endpoints?
Sebastian
piestaga at aster.pl
Fri Apr 22 16:19:03 EDT 2005
Hi Gert,
Did you try that way:
crypto keyring SITE_1
crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
!
crypto keyring SITE_2
crypto isakmp key OtherCisco address 0.0.0.0 0.0.0.0
!
crypto ipsec transform-set rtpset esp-des esp-md5-hmac
!
crypto isakmp profile SITE_1-profile
keyring SITE_1
match identity address 0.0.0.0 0.0.0.0
!
crypto isakmp profile SITE_2-profile
keyring SITE_2
match identity address 0.0.0.0 0.0.0.0
!
crypto dynamic-map SITE_1-map 10
set transform-set rtpset
set isakmp-profile SITE_1-profile
reverse-route
!
crypto dynamic-map SITE_2-map 10
set transform-set rtpset
set isakmp-profile SITE_2-profile
reverse-route
!
crypto map rtptrans 10 ipsec-isakmp dynamic rtpmap
As I vreated it on the fly, it is possibel I made a mistake, but
basicly it is the way it works at my lab.
There is no ACL here, because I do not need them, if you do, please
try to apply them acc. to your needs.
Hope this helps
Sebastian
> Hi,
> I've today inherited an "interesting" problem in a customer VPN, and
> before I go wrecking their setup tomorrow, I'd like to collect some
> wisdom.
> The problem part of the setup can be reduced to:
> - IPSEC VPN
> - hub-and-spoke
> - two spoke routers with dynamic IP addresses
> if I look at
> http://www.cisco.com/en/US/customer/tech/tk583/tk372/technologies_configuration_example09186a0080093f86.shtml
> the setup for a single "dynamic IP" spoke router is fairly trivial.
> What I'm wondering now is: how do I configure this for two spoke
> routers? Will this work (based on the example above):
> crypto isakmp policy 1
> hash md5
> authentication pre-share
> ! this is the key for the first spoke router
> crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
> ! this is the key for the second spoke router
> crypto isakmp key OtherCisco address 0.0.0.0 0.0.0.0
> crypto ipsec transform-set rtpset esp-des esp-md5-hmac
> ! this is for the first spoke (ACL 115 defines acceptable SA proxy values)
> crypto dynamic-map rtpmap 10
> set transform-set rtpset
> match address 115
> ! this is for the second spoke (ACL 116 defines SA proxies)
> crypto dynamic-map rtpmap 20
> set transform-set rtpset
> match address 116
> !
> crypto map rtptrans 10 ipsec-isakmp dynamic rtpmap
> will that work?
> How does the router match incoming IKE requests to isakmp keys? Will
> it just try decrypting the IKE packets with both pre-shared keys, until
> it gets a match?
> How will it match the crypto map ACLs? Just walk through the
> "dynamic map rtpmap" until it finds one where the ACL matches the
> SA proxy in the phase 2 proposal?
> thanks...
> gert
> PS: I've already told the customer that the most reasonable way to get
> this fixed is to get a static IP on the spoke sites. But they are willing
> to pay serious money to fix the mess, instead of paying a little bit of
> money to get a static IP, and not cause a mess...
More information about the cisco-nsp
mailing list