[c-nsp] VPN-Ipsec Hub/Spoke Configuration

Joe Maimon jmaimon at ttec.com
Fri Mar 17 15:21:10 EST 2006


research DMVPN on cco.


Paul Stewart wrote:

> Hi there...
> 
> I'm trying to build an IPSec hub-spoke setup.  We have a client I'm
> working with currently who has a 2811 at their location fed by two
> bridged DSL connections (using OSPF to "bond" them).  Their remote
> locations have Cisco 806's and some 851's.  Their plan is to create a
> large intranet system for web browsing and eventually windows file
> sharing etc - maybe even to the point of centralized domain login
> authentication.
> 
> I don't do a lot of VPN's and this one is "close" I think... Just hoping
> someone can tell me the missing piece...;)
> 
> Hub site (relevant portions): 
> 
> crypto isakmp policy 1
>  encr 3des
>  authentication pre-share
> crypto isakmp key bigsecretkey address 0.0.0.0 0.0.0.0
> !
> !
> crypto ipsec transform-set County esp-3des esp-sha-hmac
> !
> crypto dynamic-map VPN 1
>  set transform-set County
> !
> !
> crypto map static-map 1 ipsec-isakmp dynamic VPN
> !
> interface Loopback0
>  description OSPF Loopback
>  ip address 000.000.98.175 255.255.255.255
> !
> interface FastEthernet0/0
>  description HSA-VLAN202
>  ip address 000.000.227.2 255.255.255.248
>  ip nat outside
>  ip virtual-reassembly
>  duplex auto
>  speed auto
>  crypto map static-map
> !
> interface FastEthernet0/1
>  description HSA-VLAN228
>  ip address 000.000.227.10 255.255.255.248
>  ip nat outside
>  ip virtual-reassembly
>  load-interval 30
>  duplex auto
>  speed auto
>  crypto map static-map
> !
> interface Vlan10
>  description NAT Network
>  ip address 192.168.2.1 255.255.255.0
>  ip nat inside
>  ip virtual-reassembly
> !
> ip nat inside source list 102 interface Loopback0 overload
> access-list 102 deny   ip 192.168.2.0 0.0.0.255 192.168.250.0 0.0.0.255
> access-list 102 permit ip 192.168.2.0 0.0.0.255 any
> 
> 
> Spoke Site (relevant portions):
> 
> crypto isakmp policy 1
>  encr 3des
>  authentication pre-share
> crypto isakmp key mybigsecret address 000.000.98.175
> !
> !
> crypto ipsec transform-set County esp-3des esp-sha-hmac
> !
> crypto map static-map local-address Dialer1
> crypto map static-map 1 ipsec-isakmp
>  set peer 000.000.98.175
>  set transform-set County
>  match address VPN
> !
> interface Dialer1
>  ip address negotiated
>  ip mtu 1455
>  ip nat outside
>  encapsulation ppp
>  ip route-cache flow
>  dialer pool 1
>  dialer-group 1
>  no cdp enable
>  ppp authentication pap callin
>  ppp pap sent-username xxxxxxxxxx at nexicom.net password 7 xxxxxxxxxxxx
>  ppp ipcp dns request
>  crypto map static-map
> !
> ip nat inside source list 105 interface Dialer1 overload
> !
> ip access-list extended VPN
>  permit ip 192.168.250.0 0.0.0.255 192.168.2.0 0.0.0.255
> !
> access-list 105 deny   ip 192.168.250.0 0.0.0.255 192.168.2.0 0.0.0.255
> access-list 105 permit ip 192.168.250.0 0.0.0.255 any
> 
> 
> 
>>From the spoke site, I can ping the DNS server at the Hub site but I
> can't ping anything from the Hub site to the Spoke site nor can I use
> any services (such as the DNS server) from the spoke site....
> 
> ptboems#ping 192.168.2.2
> 
> Type escape sequence to abort.
> Sending 5, 100-byte ICMP Echos to 192.168.2.2, timeout is 2 seconds:
> !!!!!
> Success rate is 100 percent (5/5), round-trip min/avg/max = 36/36/40 ms
> 
> 
> I'm sure I'm missing something really simple here.... Thoughts? ;)
> 
> Paul Stewart
> IP Routing/Switching
> Nexicom Inc.
> http://www.nexicom.net/ 
> 
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
> 
> 


More information about the cisco-nsp mailing list