[c-nsp] IPsec after NAT

Alejandro Piccioli alexpichi at gmail.com
Thu Jun 16 13:25:33 EDT 2005


We have the current config:
3745:
s0/0: 10.1.100.10/24
gw: 10.1.100.1/24
f0/0: 200.35.85.113 255.255.255.252
f0/1: 192.168.188.0/24
Visible NAT ip: 200.35.85.115

1720:
ADSL module, dialer0, dynamic negociated PPP 
f0/0: 192.168.199.0/24

We need to run a VPN between 3745 lan 192.168.188.0
and 1720 lan 192.168.188.0 .ISP gaves us a private
address in s0/0 (???), so we need to NAT, otherwise
1720 won't see 3745.  Segment 192.168.188.0 needs also to
access internet. I'm at a loss for how to get the
NAT going over the IPsec tunnel.

This is the running:
Current configuration : 3791 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SIGOSARP
!
boot-start-marker
boot-end-marker
!
logging buffered 51200 warnings
enable secret 5 $1$X8cs$41XJXFUhjp22ZBBIdUVWc1
!
username leo5433 privilege 15 secret 5
$1$16Mo$OL0xPHPDzGl7ntwRGcvwe/
clock timezone Caracas -4
no network-clock-participate aim 0 
no network-clock-participate aim 1 
aaa new-model
!
!
 --More--         aaa authentication
login default 
local
aaa authorization exec default local 
aaa session-id common
ip subnet-zero
ip cef
!
!
!
!
ip ips po max-events 100
no ftp-server write-enable
!
!
!
!
!
!
!
!
!
!
!
!
 --More--         !
!
!
! 
!
crypto isakmp policy 10
 authentication pre-share
crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
!
!
crypto ipsec transform-set strong esp-des 
!
crypto dynamic-map mymap 10
 set transform-set strong 
 match address 101
!
!
!
crypto map ciscovpn 10 ipsec-isakmp dynamic mymap 
!
!
!
!
 --More--         !
interface FastEthernet0/0
 ip address 200.35.85.113 255.255.255.248
 duplex auto
 speed auto
!
interface Serial0/0
 ip address 10.3.200.2 255.255.255.252
 ip nat outside
 ip virtual-reassembly
 encapsulation frame-relay IETF
 frame-relay map ip 10.3.200.1 17
 frame-relay interface-dlci 17
 frame-relay lmi-type cisco
 crypto map ciscovpn
!
interface FastEthernet0/1
 ip address 192.168.188.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly
 duplex auto
 speed auto
!
 --More--         interface
Serial1/0
 no ip address
 shutdown
!
interface Serial1/1
 no ip address
 shutdown
!
interface Serial1/2
 no ip address
 shutdown
!
interface Serial1/3
 no ip address
!
interface FastEthernet2/0
 no ip address
 shutdown
!
interface FastEthernet2/1
 no ip address
 shutdown
!
 --More--         interface
FastEthernet2/2
 no ip address
 shutdown
!
interface FastEthernet2/3
 no ip address
 shutdown
!
interface FastEthernet2/4
 no ip address
 shutdown
!
interface FastEthernet2/5
 no ip address
 shutdown
!
interface FastEthernet2/6
 no ip address
 shutdown
!
interface FastEthernet2/7
 no ip address
 shutdown
 --More--         !
interface FastEthernet2/8
 no ip address
 shutdown
!
interface FastEthernet2/9
 no ip address
 shutdown
!
interface FastEthernet2/10
 no ip address
 shutdown
!
interface FastEthernet2/11
 no ip address
 shutdown
!
interface FastEthernet2/12
 no ip address
 shutdown
!
interface FastEthernet2/13
 no ip address
 --More--          shutdown
!
interface FastEthernet2/14
 no ip address
 shutdown
!
interface FastEthernet2/15
 no ip address
 shutdown
!
interface IDS-Sensor3/0
 no ip address
 shutdown
 hold-queue 60 out
!
interface Vlan1
 no ip address
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.3.200.1
!
ip http server
ip http authentication local
 --More--         ip http
secure-server
ip http timeout-policy idle 600 life 86400 requests
10000
ip nat pool tovpn 200.35.85.115 200.35.85.115 netmask
255.255.255.248
ip nat pool tointernet 200.35.85.117 200.35.85.117
netmask 
255.255.255.248
ip nat inside source route-map MAP110 pool tovpn
ip nat inside source route-map MAP120 pool tointernet
!
!
access-list 101 permit ip 192.168.188.0 0.0.0.255
192.168.199.0 
0.0.0.255
access-list 101 deny   ip 192.168.188.0 0.0.0.255 any
access-list 110 permit ip 192.168.188.0 0.0.0.255
192.168.199.0 
0.0.0.255
access-list 110 deny   ip 192.168.188.0 0.0.0.255 any
access-list 120 deny   ip 192.168.188.0 0.0.0.255
192.168.199.0 
0.0.0.255
access-list 120 permit ip 192.168.188.0 0.0.0.255 any
!
route-map MAP110 permit 10
 match ip address 110
!
route-map MAP120 permit 10
 match ip address 120
!
!
!
 --More--         !
control-plane
!
!
!
!
!
!
!
!
!
line con 0
 password leo5433
line 97
 no activation-character
 no exec
 transport preferred none
 transport input all
 transport output all
line aux 0
 password leo5433
line vty 0 4
 password leo5433
 --More--          transport input
telnet ssh
line vty 5 15
 transport input telnet ssh
end
!

Thanks in advice,

Alex Piccioli
PICCIOLI TELCO
0058-414-7986560
0058-414-7935312
alexpichi at yahoo.com,
alexpichi at gmail.com



More information about the cisco-nsp mailing list