[c-nsp] A bit of backup on IPSEC/GRE/NAT
Tuc at T-B-O-H.NET
ml at t-b-o-h.net
Sun Nov 5 21:00:44 EST 2006
Hi,
I've decided to take another step back. Or
maybe just sideways.
I've compiled dynamips and installed it on
my laptop (And routed a public block there) and compiled
it on my test "server" system on the net. I'm emulating a
3640 in both places. I used the configs Christian Zeng
sent previously, with minor changes only because of setting
up for the IPSec to the PC (I already have configs I know
work atleast on the IPSec side with it) and not having a 2nd
interface.
So of course this works and seems to be doing
everything properly. (Of course I'm sure everyone
expected it to too)
So, next I re-ip the one on my laptop for it
to appear to be behind a consumer wireless router.
I open up and forward ports 500 and 4500 to it. I
change the configs what I THINK is correct. No work...
It looks like the IPSec is happy, I see what seems
like the session being up, but it looks like the GRE
is having serious issues.
Can someone desk check me and see if I'm
doing something wrong....
R1:
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
lifetime 6000
crypto isakmp key donttell address 69.249.95.230
!
crypto ipsec security-association lifetime seconds 6000
!
crypto ipsec transform-set MB esp-des esp-md5-hmac
!
crypto map FreeBSDIPSEC-MAP 1 ipsec-isakmp
set peer 69.249.95.230
set transform-set MB
set pfs group2
match address 100
!
interface Loopback0
ip address 172.16.1.1 255.255.255.0
!
interface Tunnel0
ip address 192.168.4.1 255.255.255.252
tunnel source Ethernet0/0
tunnel destination 69.249.95.230
!
interface Ethernet0/0
ip address 192.136.64.117 255.255.255.0
full-duplex
no mop enabled
crypto map FreeBSDIPSEC-MAP
!
ip route 172.16.3.0 255.255.255.0 Tunnel0
ip route 69.249.95.230 255.255.255.255 192.136.64.1
!
access-list 100 permit gre host 192.136.64.117 host 69.249.95.230
R3:
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
lifetime 6000
crypto isakmp key donttell address 192.136.64.117
!
crypto ipsec security-association lifetime seconds 6000
!
crypto ipsec transform-set MB esp-des esp-md5-hmac
!
crypto map FreeBSDIPSEC-MAP 1 ipsec-isakmp
set peer 192.136.64.117
set transform-set MB
set pfs group2
match address 100
!
interface Loopback0
ip address 172.16.3.1 255.255.255.0
!
interface Tunnel0
ip address 192.168.4.2 255.255.255.252
tunnel source Ethernet0/0
tunnel destination 192.136.64.117
!
interface Ethernet0/0
ip address 129.11.8.11 255.255.255.0
full-duplex
crypto map FreeBSDIPSEC-MAP
!
ip route 172.16.1.0 255.255.255.0 Tunnel0
ip route 192.136.64.117 255.255.255.255 129.11.8.1
!
access-list 100 permit gre host 69.249.95.230 host 192.136.64.117
(I've also tried "host 129.11.8.11 host 192.136.64.117")
Once I can get the "Cisco <>NAT|Cisco" running, I'll
know its possible and how to do and then can go off and
address the PC side myself.
Thanks, Tuc
More information about the cisco-nsp
mailing list