<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Configuration on Cisco 2621  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136248#M1060976</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Suggest that you look at reverse route injection on your crypto.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Feb 2003 06:00:24 GMT</pubDate>
    <dc:creator>gmiiller</dc:creator>
    <dc:date>2003-02-11T06:00:24Z</dc:date>
    <item>
      <title>VPN Configuration on Cisco 2621</title>
      <link>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136245#M1060973</link>
      <description>&lt;P&gt;Can anyone help with this strange problem I'm having with&lt;/P&gt;&lt;P&gt;configurating VPN on the Cisco.  I can connect with the Cisco Client&lt;/P&gt;&lt;P&gt;succesfuly, but I can only telnet to the devices which are not in&lt;/P&gt;&lt;P&gt;access list 101:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.3.200.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.3.100.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map NIC permit 5&lt;/P&gt;&lt;P&gt; match ip address 101&lt;/P&gt;&lt;P&gt; set default interface FastEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 FastEthernet0/1 permanent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interfaces are configured as below and we're using NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 10.3.1.1 255.255.0.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip policy route-map NIC&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; ip address XXX.XXX.XXX.XXX 255.255.255.192&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; crypto map clientmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is NAT causing the problem???&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136245#M1060973</guid>
      <dc:creator>bbellamy</dc:creator>
      <dc:date>2020-02-21T06:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Configuration on Cisco 2621</title>
      <link>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136246#M1060974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not entirely sure what you're trying to do with your policy route-map.  So I'll just cover off on my understanding of what your policy routing is accomplishing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, I'm never a fan of default routes referring to ethernet interfaces, as you usually end up with a huge arp cache wasting router resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, for your policy routing, remembering that your default route is fast 0/1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your policy route says " If traffic is coming from 10.3.100.0 or 10.3.200.0, and you don't have a route for the destination, use interface fast 0/1"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your default route would have accomplished this anyway.  Are there more entries in your route-map?  What is it that your route-map is supposed to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2003 21:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136246#M1060974</guid>
      <dc:creator>gmiiller</dc:creator>
      <dc:date>2003-02-06T21:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Configuration on Cisco 2621</title>
      <link>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136247#M1060975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply, I have included a more detail config below to help further.  The route map is configured for connections to Fast 0/0, and if they match the address in 101 then use the Fast 0/1.&lt;/P&gt;&lt;P&gt;When I connect via the cisco VPN client, I connect successfully but can only contact the system who are not specified in 101.  How can I modify the config so I can conntact the systems in the 101 poilcy via VPN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a more detailed config which should help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 3 &lt;/P&gt;&lt;P&gt;encr 3des &lt;/P&gt;&lt;P&gt;authentication pre-share &lt;/P&gt;&lt;P&gt;group 2 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group XXXXXX &lt;/P&gt;&lt;P&gt;key XXXXXX &lt;/P&gt;&lt;P&gt;pool nicvpnpool &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 &lt;/P&gt;&lt;P&gt;set transform-set myset &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto map clientmap client authentication list userauthen &lt;/P&gt;&lt;P&gt;crypto map clientmap isakmp authorization list groupauthor &lt;/P&gt;&lt;P&gt;crypto map clientmap client configuration address respond &lt;/P&gt;&lt;P&gt;crypto map clientmap 10 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;isdn switch-type basic-net3 &lt;/P&gt;&lt;P&gt;isdn voice-call-failure 0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mta receive maximum-recipients 0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface FastEthernet0/0 &lt;/P&gt;&lt;P&gt;ip address 10.1.1.3 255.255.0.0 &lt;/P&gt;&lt;P&gt;ip nat inside &lt;/P&gt;&lt;P&gt;ip policy route-map niclan &lt;/P&gt;&lt;P&gt;duplex auto &lt;/P&gt;&lt;P&gt;speed auto &lt;/P&gt;&lt;P&gt;no cdp enable &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt;description Kingston Internet &lt;/P&gt;&lt;P&gt;ip address 21X.X.X.X 255.255.XXX.XXX &lt;/P&gt;&lt;P&gt;ip nat outside &lt;/P&gt;&lt;P&gt;duplex auto &lt;/P&gt;&lt;P&gt;speed auto &lt;/P&gt;&lt;P&gt;no cdp enable &lt;/P&gt;&lt;P&gt;crypto map clientmap &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip local pool nicvpnpool 10.2.1.1 10.2.1.254 &lt;/P&gt;&lt;P&gt;ip nat translation timeout 119 &lt;/P&gt;&lt;P&gt;ip nat inside source list 101 interface FastEthernet0/1 overload &lt;/P&gt;&lt;P&gt;ip classless &lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 21X.XXX.XXX.XXX permanent &lt;/P&gt;&lt;P&gt;no ip http server &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;access-list 101 remark Internet &lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.1.4.0 0.0.0.255 any &lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.1.3.0 0.0.0.255 any &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;route-map niclan permit 5 &lt;/P&gt;&lt;P&gt;match ip address 101 &lt;/P&gt;&lt;P&gt;set default interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;radius-server authorization permit missing Service-Type &lt;/P&gt;&lt;P&gt;no call rsvp-sync &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;mgcp profile default &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;dial-peer cor custom &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;banner login  &lt;/P&gt;&lt;P&gt;######################################## &lt;/P&gt;&lt;P&gt;# # &lt;/P&gt;&lt;P&gt;# # &lt;/P&gt;&lt;P&gt;# # &lt;/P&gt;&lt;P&gt;# # &lt;/P&gt;&lt;P&gt;# UNAUTHORISED ACCESS PROHIBITED # &lt;/P&gt;&lt;P&gt;######################################## &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;line con 0 &lt;/P&gt;&lt;P&gt;exec-timeout 0 0 &lt;/P&gt;&lt;P&gt;privilege level 0 &lt;/P&gt;&lt;P&gt;password 7 XXXXXXXXXXXX &lt;/P&gt;&lt;P&gt;line aux 0 &lt;/P&gt;&lt;P&gt;line vty 0 4 &lt;/P&gt;&lt;P&gt;access-class 2 in &lt;/P&gt;&lt;P&gt;exec-timeout 0 0 &lt;/P&gt;&lt;P&gt;privilege level 0 &lt;/P&gt;&lt;P&gt;password 7 XXXXXXXXXX &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;end &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2003 09:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136247#M1060975</guid>
      <dc:creator>bbellamy</dc:creator>
      <dc:date>2003-02-07T09:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Configuration on Cisco 2621</title>
      <link>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136248#M1060976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Suggest that you look at reverse route injection on your crypto.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2003 06:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136248#M1060976</guid>
      <dc:creator>gmiiller</dc:creator>
      <dc:date>2003-02-11T06:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Configuration on Cisco 2621</title>
      <link>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136249#M1060977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry but I dont have much cisco experience - How can I achive this (reverse route injection on your crypto)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2003 07:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136249#M1060977</guid>
      <dc:creator>bbellamy</dc:creator>
      <dc:date>2003-02-11T07:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Configuration on Cisco 2621</title>
      <link>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136250#M1060978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a0080087d1e.html#1054344" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a0080087d1e.html#1054344&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Feb 2003 05:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-configuration-on-cisco-2621/m-p/136250#M1060978</guid>
      <dc:creator>gmiiller</dc:creator>
      <dc:date>2003-02-12T05:15:05Z</dc:date>
    </item>
  </channel>
</rss>

