[c-nsp] IPSEC and NAT

Ernest McCaleb emccaleb at gmail.com
Mon Nov 11 20:08:16 EST 2013


Are you saying the actual IPSec peer is lost or simply the hosts become
unreachable?  Could you give us a few "show" commands?

E #21508

Regards,

Ernest McCaleb




On Mon, Nov 11, 2013 at 4:35 AM, M K <gunner_200 at live.com> wrote:

> The IPSEC is working fine , once I activate the NAT , i lose the IPSEC
> with unreachable response to ICMP traffic The weird thing is that I am
> configuring the access-lists properly , what could be the issue ?
>
> From: gunner_200 at live.com
> To: cisco-nsp at puck.nether.net
> Subject: IPSEC and NAT
> Date: Thu, 7 Nov 2013 13:36:19 +0200
>
>
>
>
> Hi all
> I have the below setup
> R1 - R2 - R3 - R4
> R1 and R4 has loopback interfaces that needs to communicate via IPSEC
> established between R1 and R4
> R2 and R3 has EBGP relation
> The IPSEC is working fine
> When I configure a loopback interface on R2 and R3 and advertise it in BGP
> in order for the NAT to work , the NAT works but I loses the IPSEC
> connectivity
>
> R1
>
> hostname R1
>
> crypto isakmp policy 1
>  encr aes
>  authentication pre-share
>  group 2
> crypto isakmp key cisco address 212.118.34.4
>
> crypto ipsec transform-set SET esp-3des esp-sha-hmac
>
> crypto map MAP 10 ipsec-isakmp
>  set peer 212.118.34.4
>  set transform-set SET
>  match address VPN_ACL
>
> interface Loopback0
>  ip address 192.168.1.1 255.255.255.0
>  ip nat inside
>
> interface Serial1/0
>  ip address 212.118.12.1 255.255.255.0
>  ip nat outside
>  encapsulation ppp
>  serial restart-delay 0
>  crypto map MAP
>  no shut
>
> ip nat pool NAT_POOL 212.118.1.1 212.118.1.6 prefix-length 29
> ip nat inside source list NAT_ACL pool NAT_POOL
>
> ip route 0.0.0.0 0.0.0.0 212.118.12.2
>
> ip access-list extended NAT_ACL
>  deny   ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255
>  permit ip 192.168.1.0 0.0.0.255 any
> ip access-list extended VPN_ACL
>  permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255
>
>
> R2
>
> hostname R2
>
> interface Loopback0
>  ip address 212.118.2.2 255.255.255.255
>
> interface Serial1/0
>  ip address 212.118.12.2 255.255.255.0
>  encapsulation ppp
>  no shut
>
> interface Serial1/1
>  ip address 212.118.23.2 255.255.255.0
>  encapsulation ppp
>  no shut
>
> router bgp 2
>  bgp log-neighbor-changes
>  network 212.118.12.0
>  neighbor 212.118.23.3 remote-as 3
>
> ip route 212.118.1.0 255.255.255.248 ser1/0
>
> R3
>
> hostname R3
>
> interface Loopback0
>  ip address 212.118.3.3 255.255.255.255
>
> interface Serial1/0
>  ip address 212.118.34.3 255.255.255.0
>  encapsulation ppp
>  no shut
>
> interface Serial1/1
>  ip address 212.118.23.3 255.255.255.0
>  encapsulation ppp
>  no shut
>
> router bgp 3
>  bgp log-neighbor-changes
>  network 212.118.34.0
>  neighbor 212.118.23.2 remote-as 2
>
> ip route 212.118.4.0 255.255.255.248 Ser1/0
>
> R4
>
> hostname R4
>
> crypto isakmp policy 1
>  encr aes
>  authentication pre-share
>  group 2
> crypto isakmp key cisco address 212.118.12.1
>
> crypto ipsec transform-set SET esp-3des esp-sha-hmac
>
> crypto map MAP 10 ipsec-isakmp
>  set peer 212.118.12.1
>  set transform-set SET
>  match address VPN_ACL
>
> interface Loopback0
>  ip address 192.168.4.4 255.255.255.0
>  ip nat inside
>
> interface Serial1/0
>  ip address 212.118.34.4 255.255.255.0
>  ip nat outside
>  encapsulation ppp
>  serial restart-delay 0
>  crypto map MAP
>  no shut
>
> ip nat pool NAT_POOL 212.118.4.1 212.118.4.6 prefix-length 29
> ip nat inside source list NAT_ACL pool NAT_POOL
>
> ip route 0.0.0.0 0.0.0.0 212.118.34.3
>
> ip access-list extended NAT_ACL
>  deny   ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255
>  permit ip 192.168.4.0 0.0.0.255 any
> ip access-list extended VPN_ACL
>  permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255
>
> What I configure on R2 and R3 is 212.118.2.2/32 and 212.118.3.3/32respectively , what should i do in order for both IPSEC and NAT to work ?
>
> Thanks
>
>
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>


More information about the cisco-nsp mailing list