<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple vlans over IPSEC VPN Tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026418#M1010081</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you only want the new VLAN's to talk to each other over the VPN or do you want VLAN 1 on both sites to be able to route also?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Apr 2008 13:47:20 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2008-04-25T13:47:20Z</dc:date>
    <item>
      <title>Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026415#M1010077</link>
      <description>&lt;P&gt;Hi , I have 2 Cisco 1811 routers with the advanced ip svc ios set on it.  I currently have it running with everything communicating properly but I need to add another VLAN to each router and cant get it to recognize.. here is the set up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1 Vlan1 is 10.10.10.0/24 network&lt;/P&gt;&lt;P&gt;R2 Vlan1 is 10.10.20.0/24 network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;over IPSEC VPN Tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to add a Vlan2 10.7.1.0/24 network on R1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and Vlan2 10.7.2.0/24 network on R2 and have them work over this tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already created the VLAN's in the vlan data base and gave them addresses of 10.7.1.1 and 10.7.2.1 respectively.  What else am I missing.. I am positive I configured the access lists wrong or something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Domenick&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026415#M1010077</guid>
      <dc:creator>dlandriscinaclg</dc:creator>
      <dc:date>2020-02-21T09:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026416#M1010078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Domenick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you supply the configs please? with sensitive information removed of course!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 09:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026416#M1010078</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-04-25T09:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026417#M1010079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Absolutely.. here go thank you very much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 13:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026417#M1010079</guid>
      <dc:creator>dlandriscinaclg</dc:creator>
      <dc:date>2008-04-25T13:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026418#M1010081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you only want the new VLAN's to talk to each other over the VPN or do you want VLAN 1 on both sites to be able to route also?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 13:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026418#M1010081</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-04-25T13:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026419#M1010083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes I need both vlan1 and vlan2 to route over the vpn.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 15:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026419#M1010083</guid>
      <dc:creator>dlandriscinaclg</dc:creator>
      <dc:date>2008-04-25T15:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026420#M1010085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would add:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1-AVEX&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;Current:-&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_2&lt;/P&gt;&lt;P&gt; remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt; remark IPSec Rule&lt;/P&gt;&lt;P&gt; permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt; remark IPSec Rule&lt;/P&gt;&lt;P&gt; permit ip 10.10.10.0 0.0.0.255 10.7.2.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ADD to the above ACL the below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit 10.7.1.0 0.0.0.255 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt; permit 10.7.1.0 0.0.0.255 10.7.2.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 remark auto generated by Cisco SDM Express firewall configuration&lt;/P&gt;&lt;P&gt;access-list 101 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.7.2.0 0.0.0.255 10.10.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.10.10.0 0.0.0.255 10.7.2.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.10.20.0 0.0.0.255 10.10.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ADD to the above ACL the below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list 101 permit ip 10.7.2.0 0.0.0.255 10.7.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt; access-list 101 permit ip 10.10.20.0 0.0.0.255 10.7.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2-57st&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;Current:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_2&lt;/P&gt;&lt;P&gt; remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt; remark IPSec Rule&lt;/P&gt;&lt;P&gt; permit ip 10.10.20.0 0.0.0.255 10.10.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt; remark IPSec Rule&lt;/P&gt;&lt;P&gt; permit ip 10.10.20.0 0.0.0.255 10.7.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ADD to the above ACL the below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit 10.7.2.0 0.0.0.255 10.7.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt; permit 10.7.2.0 0.0.0.255 10.10.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current:-&lt;/P&gt;&lt;P&gt;access-list 101 remark auto generated by Cisco SDM Express firewall configuration&lt;/P&gt;&lt;P&gt;access-list 101 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.7.1.0 0.0.0.255 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.10.10.0 0.0.0.255 10.7.2.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ADD to the above ACL the below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list 101 permit ip 10.7.1.0 0.0.0.255 10.7.2.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Apr 2008 08:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026420#M1010085</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-04-26T08:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026421#M1010091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added all ACL's described but unfortunately I am unable to ping any host from the 10.10.10.0 network to the 10.7.2.0 network or back and forth.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2008 19:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026421#M1010091</guid>
      <dc:creator>dlandriscinaclg</dc:creator>
      <dc:date>2008-04-28T19:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026422#M1010093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;are the ACL's being hit? Provide output of "show access-list"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you see the IPSEC SA with the new ACL's in them? Provide output of "sh crypto ipsec sa"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2008 21:13:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026422#M1010093</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-04-28T21:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026423#M1010094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the output you requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2008 22:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026423#M1010094</guid>
      <dc:creator>dlandriscinaclg</dc:creator>
      <dc:date>2008-04-28T22:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026424#M1010095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The encryption domans are in the IPSE SA = Good.  no packets encrypted or decrypted = Bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL's for the "interesting traffic" are not being hit = bad, BUT I did notice you are performing some NAT with route maps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add "ip nat inside" to the vlan 2 interfaces on both sites.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2008 07:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026424#M1010095</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-04-29T07:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026425#M1010096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i added the ip nat inside and seems that there is some activity going on... i still cant ping a host on either network from either router.. but then again i cant ping any host from any router on opposite sides.. any insight into that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have attached the output of the show access-list command and the show crypto again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2008 13:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026425#M1010096</guid>
      <dc:creator>dlandriscinaclg</dc:creator>
      <dc:date>2008-04-29T13:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple vlans over IPSEC VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026426#M1010097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The acl's are being hit, you are no longer nat'ing the IP to IP internal.  The crypto Sa looks OK - apart from some packet number mis-match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What debugging have you done?  Have you performed any trace routes? have you debuged the IP NAT? Have you debugged any ICMP - all these will give an idea on what could be the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may want to try clearing down the IPSEC VPN and let the routers form a new one, this sometimes helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2008 13:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-vlans-over-ipsec-vpn-tunnel/m-p/1026426#M1010097</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-04-29T13:52:12Z</dc:date>
    </item>
  </channel>
</rss>

