[c-nsp] crypto map working on outbound interface, need it to work on inbound interface
Joseph Mays
mays at win.net
Tue Dec 13 17:22:38 EST 2011
So, in the example below, will this cause the vpn to connect to the peer
from FastEthernet0/0, but identify as the ip address of FastEthernet1/1?
crypto map WinnetToSyniverse local-address FastEthernet1/1
crypto map WinnetToSyniverse 20 ipsec-isakmp
description PHL-3845-SS7-VPN router
set peer 65.119.118.136
set transform-set TSI2
match address PHL-3845-SS7-VPN
!
!
!
interface FastEthernet0/0
ip address 216.135.80.50 255.255.255.252
duplex auto
speed auto
crypto map WinnetToSyniverse
----- Original Message -----
From: "Joseph Mays" <mays at win.net>
To: <cisco-nsp at puck.nether.net>
Sent: Tuesday, December 13, 2011 3:41 PM
Subject: [c-nsp] crypto map working on outbound interface,need it to work on
inbound interface
> Have a crypto map that was working to build a tunnel between 65.119.118.75
> and 24.235.0.25. Peers for the vpn tunnel were 24.235.0.26 and
> 65.119.118.136. Due to some network changes 24.235.0.26, which was the
> egress interface toward the remote end, is now an ingress interface.
> Still, I don't see why this should matter. The access list is the same,
> it's just traffic coming in through the interface rather than out of it.
>
> Crypto Map "WinnetToSyniverse" 20 ipsec-isakmp
> Description: PHL-3845-SS7-VPN router
> Peer = 65.119.118.136
> Extended IP access list PHL-3845-SS7-VPN
> access-list PHL-3845-SS7-VPN permit ip host 24.235.0.25 host
> 65.119.118.76
> Current peer: 65.119.118.136
> Security association lifetime: 4608000 kilobytes/3600 seconds
> PFS (Y/N): N
> Transform sets={
> TSI2,
> }
> Interfaces using crypto map WinnetToSyniverse:
> FastEthernet1/1
>
> The packets for the access list should match regardless of direction, but
> it acts like it's not matching packets to the access list and not even
> trying to start the vpn.
>
> Router#show crypto isakmp sa
> dst src state conn-id slot status
>
> Nothing there.
>
> I can ping 65.119.118.136 from the router even when I set the source
> address to the address of the ingress interface, 24.235.0.26, and can ping
> the host we are trying to talk to across the vpn, 65.119.118.76, from
> 24.235.0.25.
>
> I moved the crypto map command to the outside interface and it started
> matching packets tried to bring the vpn tunnel up, but that failed, I'm
> guessing because the source address changed to the address of the egress
> interface, which would not be the address configured in the remote side.
> So I want to use the ingress interface and its address so we don't have to
> go through a complex process to get the other side to reconfigure.
>
>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
More information about the cisco-nsp
mailing list