<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 877 VPN - two remote routers connecting to head office in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263530#M970529</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure you can do it with this VPN configuration.&lt;/P&gt;&lt;P&gt;You have to use DMVPN or VTI to do this because they create Tunnel interfaces and can be routed. I would recommend DMVPN as it can establish direct connection between spokes.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6658/index.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6658/index.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 Aug 2009 12:50:52 GMT</pubDate>
    <dc:creator>Mozhzhukhin</dc:creator>
    <dc:date>2009-08-27T12:50:52Z</dc:date>
    <item>
      <title>Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263525#M970524</link>
      <description>&lt;P&gt;Hi all. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our head office has an 877.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our two remote sites also have 877's and they have a permanent tunnel into the head office 877 which works OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My issue is that the two remote sites cannot talk to each other - but they can talk to head office fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I take it I have some sort of NAT issue - so i'll post the relevant configs and if someone could take a look and point me in the right direction i'd be very pleased!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Head office config is txt file 192.168.16.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote site 'Riversdale' is text file 192.168.17.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote site 'Tynewydd' is text file 192.168.18.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263525#M970524</guid>
      <dc:creator>davieshuw</dc:creator>
      <dc:date>2020-02-21T11:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263526#M970525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Spoke to spoke will not work with plain crypto maps in IOS. If you are having only 2 remote sites, you can add another crypto map in both spokes directly. Similar to the config in hub side, you will have separate crypto map for the hub and the other spoke. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Aug 2009 01:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263526#M970525</guid>
      <dc:creator>sunsrini</dc:creator>
      <dc:date>2009-08-26T01:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263527#M970526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - i dont mind routing the traffic back to head office and back out again - would that be possible? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so basically what i'd have is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on router 192.168.17.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.18.0 255.255.255.0 192.168.16.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and on router 192.168.18.18.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.17.0 255.255.255.0 192.168.16.5&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Aug 2009 13:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263527#M970526</guid>
      <dc:creator>davieshuw</dc:creator>
      <dc:date>2009-08-26T13:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263528#M970527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case, routing is just not enough, there should be matching entries in the crypto acl also. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the hub side, I see you currently have this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.16.0 0.0.0.255 192.168.17.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.16.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the following in the hub for above acls. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.18.0 0.0.0.255 192.168.17.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.17.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note this will put additional overhead for Hub side, as it needs to decrypt from one spoke and encrypt again for the other spoke.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Aug 2009 17:47:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263528#M970527</guid>
      <dc:creator>sunsrini</dc:creator>
      <dc:date>2009-08-26T17:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263529#M970528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the routes suggested - unfortunatley the two spokes still cant talk via the head office hub - both pings and telnet to each location does not seem to work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason im not too bothered about going via 192.168.16.5 is that there'll be the bare minimal amount of traffic point to point - the odd CCME RTP stream.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Aug 2009 08:50:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263529#M970528</guid>
      <dc:creator>davieshuw</dc:creator>
      <dc:date>2009-08-27T08:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263530#M970529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure you can do it with this VPN configuration.&lt;/P&gt;&lt;P&gt;You have to use DMVPN or VTI to do this because they create Tunnel interfaces and can be routed. I would recommend DMVPN as it can establish direct connection between spokes.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6658/index.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6658/index.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Aug 2009 12:50:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263530#M970529</guid>
      <dc:creator>Mozhzhukhin</dc:creator>
      <dc:date>2009-08-27T12:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263531#M970530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How did you check with pings ? Is that from an internal host to internal host ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify with pings between spokes ? Please use internal interface of spokes for both source/destination addresses. And send me "show crypto session detail" from all routers both before and after you send pings. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing I overlooked in your spokes (both) config is about NAT as well. Please rearrange both deny entries first followed by permit entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 deny   ip 192.168.17.0 0.0.0.255 192.168.16.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.17.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 100 deny   ip 192.168.17.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Aug 2009 21:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263531#M970530</guid>
      <dc:creator>sunsrini</dc:creator>
      <dc:date>2009-08-27T21:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263532#M970531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In first file:&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip 192.168.18.0 0.0.0.255 192.168.16.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip 192.168.18.0 0.0.0.255 192.168.17.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.18.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;Remove:&lt;/P&gt;&lt;P&gt;ip route 192.168.17.0 255.255.255.0 192.168.16.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In last file:&lt;/P&gt;&lt;P&gt;access-list 100 deny   ip 192.168.17.0 0.0.0.255 192.168.16.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 deny   ip 192.168.17.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.17.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;Remove:&lt;/P&gt;&lt;P&gt;ip route 192.168.18.0 255.255.255.0 192.168.16.5&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Aug 2009 00:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263532#M970531</guid>
      <dc:creator>Mozhzhukhin</dc:creator>
      <dc:date>2009-08-28T00:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263533#M970532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi there - pings are successful now - rearranging the nat statements as you suggested worked - so thanks very much for your help! i'll try a voice call over it to see what the latency is like but should be OK. Agreed DMVPN would be a better solution - but for the odd 1 minute phonecall per day I should be able to get away with this setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Aug 2009 07:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263533#M970532</guid>
      <dc:creator>davieshuw</dc:creator>
      <dc:date>2009-08-28T07:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 877 VPN - two remote routers connecting to head office</title>
      <link>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263534#M970533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok odd... the issue is now back since I added a new remote VPN site that terminates onto the router 192.168.16.5 (i cannot ping between remote sites any more)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the new remote sites internal ip is 192.168.19.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the access list on the head office router seems to have grown some random access list entries (104,105,106 and 107)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 1 remark SDM_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.16.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 100 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.16.0 0.0.0.255 192.168.17.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.18.0 0.0.0.255 192.168.17.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 remark SDM_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip 192.168.16.0 0.0.0.255 192.168.19.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip 192.168.16.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 101 deny   ip 192.168.16.0 0.0.0.255 192.168.17.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.16.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 102 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 102 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.16.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.17.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 103 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 103 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 192.168.16.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 104 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 104 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 192.168.16.0 0.0.0.255 192.168.19.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 105 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 105 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 105 permit ip 192.168.16.0 0.0.0.255 192.168.17.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 106 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 106 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 106 permit ip 192.168.16.0 0.0.0.255 192.168.18.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 107 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 107 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 107 permit ip 192.168.16.0 0.0.0.255 192.168.19.0 0.0.0.255&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Nov 2009 08:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-877-vpn-two-remote-routers-connecting-to-head-office/m-p/1263534#M970533</guid>
      <dc:creator>davieshuw</dc:creator>
      <dc:date>2009-11-17T08:26:50Z</dc:date>
    </item>
  </channel>
</rss>

