[c-nsp] Cisco IPSEC Configuration

Righa Shake righa.shake at gmail.com
Fri Dec 17 07:33:30 EST 2010


Chris,

Below is my sample config

!
!
crypto isakmp policy 1
 encr 3des
 authentication pre-share
 group 2
!
crypto isakmp policy 2
 encr aes 256
 authentication pre-share


crypto isakmp key Link1 address X.X.X.X
crypto isakmp key link2 address Y.Y.Y.Y
crypto isakmp key link3 address Z.Z.Z.Z
!
!
crypto ipsec transform-set MYCRYPTO1 esp-3des esp-sha-hmac
crypto ipsec transform-set MYCRYPTO2 esp-aes 256 esp-sha-hmac
!
crypto map MYCRYPTOMAP 10 ipsec-isakmp
 set peer X.X.X.X
 set transform-set MYCRYPTO1
 match address VPNTRAFF
crypto map MYCRYPTOMAP 20 ipsec-isakmp
 set peer Y.Y.Y.Y
 set transform-set MYCRYPTO2
 match address VPNTRAFF
crypto map MYCRYPTOMAP 30 ipsec-isakmp
 set peer Z.Z.Z.Z
 set transform-set MYCRYPTO2
 match address VPNTRAFF




ip access-list extended VPNTRAFF
 permit ip 192.168.1.0 .0.0.255 10.10.10.0 0.0.0.255
 permit ip 192.168.1.0 0.0.0.255 10.10.11.0 0.0.0.255

!
!
!
interface FastEthernet0/1
 description LINK_TO_PROVIDER
  ip address 172.16.1.1 255.255.255.252
 ip virtual-reassembly
 crypto map MYCRYPTOMAP



on running show crypto sa

am only seeing the X.X.X.X. sessions

the other sessions dont appear

Regards,
Shake Righa



On Fri, Dec 17, 2010 at 3:55 AM, Christopher J. Wargaski
<wargo1 at gmail.com>wrote:

> Hello Shake--
>
>    There is no problem having several tunnels on the same interface,
> however, they must be in the same crypto map. Here is an example:
>
> crypto map L2L-map 1 ipsec-isakmp
>  description RMS test
>  set peer 11.22.33.44
>  set security-association lifetime seconds 86400
>  set transform-set ESP-AES-256-MD5
>  match address RMS
> crypto map L2L-map 2 ipsec-isakmp
>  description Chicago DC
>  set peer 66.77.88.99
>  set security-association lifetime seconds 86400
>  set transform-set ESP-AES-256-MD5
>  match address Chicago
> crypto map L2L-map 3 ipsec-isakmp
>  description Regina HQ
>  set peer 66.44.55.22
>  set security-association lifetime seconds 86400
>  set transform-set ESP-AES-256-MD5
>  match address Regina-HQ
>
>  ...
> interface GigabitEthernet0/0
>  description Internet - Outside
>  ip address 33.44.55.66 255.255.255.0
>  ip access-group autosec_firewall_acl in
>  no ip redirects
>  no ip unreachables
>  no ip proxy-arp
>  ip inspect autosec_inspect out
>  ip policy route-map VPN-PBR-map
>  duplex full
>  speed 100
>  no cdp enable
>  no mop enabled
>  crypto map L2L-map
>
>      Could you post a sanitized copy of your configuration?
>
> cjw
>
>
> Date: Thu, 16 Dec 2010 13:55:00 +0300
>> From: Righa Shake <righa.shake at gmail.com>
>> To: cisco-nsp at puck.nether.net
>> Subject: [c-nsp] Cisco IPSEC Configuration
>> Message-ID:
>>        <AANLkTi=_1awiokKo3ZKxg+dzMZBSE9_fungROsamS8f1 at mail.gmail.com<1awiokKo3ZKxg%2BdzMZBSE9_fungROsamS8f1 at mail.gmail.com>
>> >
>> Content-Type: text/plain; charset=ISO-8859-1
>>
>>
>> Am having several  ipsec configurations on the same interface on a router
>>
>> however when i run the command
>> show crypto session detail command am only seeing a single session and not
>> the other session am trying to bring up.
>>
>> what could b the problem
>>
>>
>> Rgrds,
>> Shake
>>
>>


More information about the cisco-nsp mailing list