<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need to help configure second network for site to site ipsec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432653#M856651</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per your previous comments, I did changed configuration. and my existing tunnel get down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I restore that one ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samir Rana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Jun 2010 21:32:51 GMT</pubDate>
    <dc:creator>rana.samir</dc:creator>
    <dc:date>2010-06-03T21:32:51Z</dc:date>
    <item>
      <title>Need to help configure second network for site to site ipsec vpn</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432645#M856621</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva;"&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;With the reference to the attached diagram.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;We have ipsec site to site tunnel between 10.254.5.254 /23 and 10.192.0.0 /16 network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;I would like to add second network 192.168.1.0 /24 and 192.168.2.0 /24 respective end. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;If any body can help how to configure this on site to site vpn would be appricated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Verdana;"&gt;Samir&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432645#M856621</guid>
      <dc:creator>rana.samir</dc:creator>
      <dc:date>2019-03-11T17:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432646#M856626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Samir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the same tunnel already established between the two PIXes, just add the local network on each side on the interesting traffic.&lt;/P&gt;&lt;P&gt;If you're doing NAT exemption, also include the networks in that list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want the exact commands, please include the following output from both PIXes:&lt;/P&gt;&lt;P&gt;sh run access-l &lt;NAME&gt;&amp;nbsp; --&amp;gt; this is the name of the ACL in the crypto map&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2010 19:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432646#M856626</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-02T19:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432647#M856630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But my problem is one side of 515E PIX firewall is directly connected with layer 2 switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, How can I add 192.168.x.x network on layer 2 switch and allowed on to the&lt;/P&gt;&lt;P&gt;site-site vpn tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for your kind reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 14:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432647#M856630</guid>
      <dc:creator>rana.samir</dc:creator>
      <dc:date>2010-06-03T14:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432648#M856632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The fact that the 192.168.1.x is connected via a layer 2 switch on the PIX-515 should not matter. &lt;BR /&gt;What you do is to aggregate the 192.168.1.x in the interesting traffic to the tunnel that goes to the PIX-525&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, let's say you have this crypto ACL for the tunnel...&lt;BR /&gt;access-list crypto permit ip 10.254.5.0 255.255.254.0 10.192.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;Then you add the following line to the PIX-515:&lt;BR /&gt;access-list crypto permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow 192.168.1.x to communicate with 192.168.2.x through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the PIX-525 you should add the inverse ACL:&lt;BR /&gt;access-list crypto permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides this... &lt;BR /&gt;You need to take into consideration the NAT configuration and the routing to make this work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 15:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432648#M856632</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T15:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432649#M856636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your early reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the my configuration of the both sides for your information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for your kind reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432649#M856636</guid>
      <dc:creator>rana.samir</dc:creator>
      <dc:date>2010-06-03T16:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432650#M856640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX-515E&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current crypto ACL on PIX-515E&lt;BR /&gt;access-list outside_cryptomap_20 permit ip object-group subnet-Keyano object-group SCL_WAN_VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network subnet-Keyano &lt;BR /&gt;&amp;nbsp; network-object 10.254.4.0 255.255.254.0 &lt;BR /&gt;&amp;nbsp; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network SCL_WAN_VPN &lt;BR /&gt;&amp;nbsp; network-object 10.0.0.0 255.0.0.0 &lt;BR /&gt;&amp;nbsp; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current bypass ACL in PIX-515E is the same as above: &lt;BR /&gt;access-list inside_outbound_nat0_acl permit ip object-group subnet-Keyano object-group SCL_WAN_VPN log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#####################################################################################&lt;/P&gt;&lt;P&gt;PIX-525&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current crypto ACL on PIX-525&lt;/P&gt;&lt;P&gt;access-list TELUS_cryptomap_20 permit ip object-group SCL_WAN_VPN object-group subnet-Keyano&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network SCL_WAN_VPN &lt;BR /&gt;&amp;nbsp; network-object 10.0.0.0 255.0.0.0 &lt;BR /&gt;&amp;nbsp; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network subnet-Keyano &lt;BR /&gt;&amp;nbsp; network-object 10.254.4.0 255.255.254.0 &lt;BR /&gt;&amp;nbsp; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current bypass ACL in PIX-525&lt;/P&gt;&lt;P&gt;access-list inside-nat permit ip any any log &lt;BR /&gt;access-list inside-nat permit ip object-group SCL_WAN_VPN object-group subnet-Keyano&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;###################################################################################&lt;/P&gt;&lt;P&gt;I'll do the following modifications:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. On both sides modify the crypto ACL to not include the entire 10.0.0.0/8 but instead only the 10.192.0.0/16 to avoid overlapping&lt;BR /&gt;issues with the 10.254.4.0/24 on the other side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Remove the inside-nat permit ip any any on the PIX-525&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:37:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432650#M856640</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T16:37:08Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432651#M856644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more idea how can i do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I can not ping my 10.192.x.x network from 192.168.1.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for your kind reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 19:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432651#M856644</guid>
      <dc:creator>rana.samir</dc:creator>
      <dc:date>2010-06-03T19:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432652#M856647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the PIX-525, this statement is wrong: &lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 10.97.100.1 1&lt;/P&gt;&lt;P&gt;The default gateway should be to the outside.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also make sure that PIX can reach the internal networks 10.192.0.0/16 and 192.168.2.0/24 since are not directly connected to the PIX.&lt;/P&gt;&lt;P&gt;On the PIX-515 include this: &lt;BR /&gt;nat (EMIT-TEST) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 20:20:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432652#M856647</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T20:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432653#M856651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per your previous comments, I did changed configuration. and my existing tunnel get down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I restore that one ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samir Rana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 21:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432653#M856651</guid>
      <dc:creator>rana.samir</dc:creator>
      <dc:date>2010-06-03T21:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Need to help configure second network for site to site ipsec</title>
      <link>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432654#M856656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What changes you made?&lt;/P&gt;&lt;P&gt;Remove this route?&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 10.97.100.1 1&lt;/P&gt;&lt;P&gt;Put it back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What else?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 23:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-help-configure-second-network-for-site-to-site-ipsec-vpn/m-p/1432654#M856656</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T23:00:03Z</dc:date>
    </item>
  </channel>
</rss>

