<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN L2TP + ipsec routing problem in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457870#M232925</link>
    <description>&lt;P&gt;explain what is the Local IP, what is remote IP, you need split tunnel i guess here.&lt;/P&gt;</description>
    <pubDate>Tue, 31 Aug 2021 22:17:08 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2021-08-31T22:17:08Z</dc:date>
    <item>
      <title>VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457772#M232915</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I have this L2TP + IPSEC configuration, I can get authentication but I have no ability to ping the internal class and not even get wan connection.&lt;BR /&gt;I've probably made mistakes.&lt;BR /&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;!
version 17.3
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
platform hardware throughput crypto 50000
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
!
aaa new-model
!
!
!
!
!
!
!
!
aaa session-id common
clock timezone UTC 2 0
!
!
!
!
!
!
!
ip dhcp excluded-address 10.10.10.1 10.10.10.99
!
ip dhcp pool ccp-pool
 import all
 network 10.10.10.0 255.255.255.128
 default-router 10.10.10.1 
 dns-server 10.10.10.1 
 lease 0 2
!
!
!
login on-success log
!
!
!
!
!
!
!
subscriber templating
! 
! 
! 
! 
!
multilink bundle-name authenticated
vpdn enable
!
vpdn-group l2tp-group
 ! Default L2TP VPDN group
 accept-dialin
  protocol l2tp
  virtual-template 1
 no l2tp tunnel authentication
!
no device-tracking logging theft
!
!
!
crypto pki trustpoint TP-self-signed-4099755788
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-4099755788
 revocation-check none
 rsakeypair TP-self-signed-4098
!
crypto pki trustpoint SLA-TrustPoint
 enrollment pkcs12
 revocation-check crl
!
!

!
no license feature hseck9
license udi pid C1127X-8PLTEP sn
license boot level securityk9
license smart url https://tools.cisco.com/its/service/oddce/services/DDCEService
license smart url smart https://tools.cisco.com/its/service/oddce/services/DDCEService
license smart transport callhome
memory free low-watermark processor 71830
!
!
!
!
!
object-group network local_lan_subnets 
 10.10.10.0 255.255.255.128
!
object-group network vpn_remote_subnets 
 192.168.168.0 255.255.255.0
!
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
username cisco privilege 15 secret 9 $9$.VFyVFBlpPIigk$LZM0MdxrlOUG/fz.GodgdTfnj3W2i60POesjHWIi9UcWs
username vpn password 0 1111111111
!
redundancy
 mode none
!
!
!
!
controller VDSL 0/3/0
 operating mode vdsl2
!
!
vlan internal allocation policy ascending
!
! 
!
!
!
!
!
crypto isakmp policy 1
 encryption 3des
 authentication pre-share
 group 2
 lifetime 3600
crypto isakmp key 1234567890 address 0.0.0.0        
!
!
crypto ipsec transform-set l2tp-ipsec-transport-esp esp-3des esp-sha-hmac 
 mode transport
!
!
!
crypto dynamic-map my-dynamic-map 1
 set nat demux
 set transform-set l2tp-ipsec-transport-esp 
!
!
crypto map my-static-map 1 ipsec-isakmp dynamic my-dynamic-map 
!
!
!
!
! 
! 
!
!
interface Loopback0
 ip address 192.168.168.1 255.255.255.0
!
interface GigabitEthernet0/0/0
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/1/0
!
interface GigabitEthernet0/1/1
!
interface GigabitEthernet0/1/2
!
interface GigabitEthernet0/1/3
!
interface GigabitEthernet0/1/4
!
interface GigabitEthernet0/1/5
!
interface GigabitEthernet0/1/6
!
interface GigabitEthernet0/1/7
!
interface ATM0/3/0
 no ip address
 shutdown
 atm oversubscribe factor 2
!
interface Ethernet0/3/0
 no ip address
 no negotiation auto
!
interface Ethernet0/3/0.835
 encapsulation dot1Q 835
 pppoe enable group global
 pppoe-client dial-pool-number 1
!
interface Virtual-Template1
 ip unnumbered Dialer1
 ip nat inside
 peer default ip address pool l2tp-pool
 ppp authentication ms-chap-v2
 ip virtual-reassembly
!
interface Vlan1
 ip address 10.10.10.1 255.255.255.128
 ip nat inside
 ip tcp adjust-mss 1452
 ip virtual-reassembly
!
interface Dialer1
 mtu 1492
 ip address negotiated
 ip nat outside
 encapsulation ppp
 ip tcp adjust-mss 1452
 dialer pool 1
 dialer-group 1
 no cdp enable
 ppp mtu adaptive
 ppp authentication chap pap callin
 ppp chap hostname 1234567890@alicebiz.routed
 ppp chap password 0 xxxxx
 ppp pap sent-username 1234567890@alicebiz.routed password 0 xxxxx
 ppp ipcp dns request
 crypto map my-static-map
 ip virtual-reassembly
!
ip local pool l2tp-pool 192.168.168.5 192.168.168.10
ip http server
ip http authentication local
ip http secure-server
ip http client source-interface Dialer1
ip forward-protocol nd
ip dns server
ip nat inside source list nat-list interface Dialer1 overload
ip route 0.0.0.0 0.0.0.0 Dialer1
!
!
ip access-list extended nat-list
 10 deny   ip object-group local_lan_subnets object-group vpn_remote_subnets
 20 permit ip object-group local_lan_subnets any
 30 permit ip object-group vpn_remote_subnets any
!
!
!
!
!
!
control-plane
!
!
line con 0
 stopbits 1
line vty 0 4
 login
 transport input telnet ssh
line vty 5 15
 login
 transport input telnet ssh
!
call-home
 contact-email-addr 
 profile "CiscoTAC-1"
  active
  destination transport-method http
ntp master
ntp server europe.pool.ntp.org
!
!
!
!
!
!
end&lt;/PRE&gt;</description>
      <pubDate>Tue, 31 Aug 2021 21:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457772#M232915</guid>
      <dc:creator>r_m</dc:creator>
      <dc:date>2021-08-31T21:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457809#M232920</link>
      <description>&lt;PRE&gt; I can get authentication but I have no ability to ping the internal class and not even get wan connection.&lt;/PRE&gt;
&lt;P&gt;before i read the configuration and advise, please clarity here&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when did you mention ping internal means ? Local Lan network where you initiated to connect to a remote network?&lt;/P&gt;
&lt;P&gt;or after connecting to a remote network (remote Lan ?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you lost the Local network after you connecting the L2TP, you need a split tunnel to access local resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you clarify this - then i can look the config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2021 21:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457809#M232920</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-08-31T21:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457846#M232923</link>
      <description>&lt;P&gt;I cannot ping from 10.10.10.0 to 192.168.168.0 and reverse.&lt;/P&gt;&lt;P&gt;I keep pings from 10.10.10.0 to 8.8.8.8 correctly while I have no ping from 192.168.168.0 to 8.8.8.8&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2021 21:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457846#M232923</guid>
      <dc:creator>r_m</dc:creator>
      <dc:date>2021-08-31T21:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457870#M232925</link>
      <description>&lt;P&gt;explain what is the Local IP, what is remote IP, you need split tunnel i guess here.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2021 22:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457870#M232925</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-08-31T22:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457981#M232942</link>
      <description>&lt;P&gt;Local IP 10.10.10.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remote IP 192.168.168.0&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 04:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4457981#M232942</guid>
      <dc:creator>r_m</dc:creator>
      <dc:date>2021-09-01T04:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4458031#M232944</link>
      <description>&lt;P&gt;as per the config, you have LAN IP address 10.x.x.x.x and remote access I range 192.168.,x.x , when you connecting the device? what is your Local IP address before connecting to L2vpn ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 07:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4458031#M232944</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-09-01T07:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4458124#M232946</link>
      <description>&lt;P&gt;the class of local ip address before the L2 connection is 192.168.86.0&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 10:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4458124#M232946</guid>
      <dc:creator>r_m</dc:creator>
      <dc:date>2021-09-01T10:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4458401#M232959</link>
      <description>&lt;P&gt;L2TP + IPSec&amp;nbsp;&lt;/P&gt;&lt;P&gt;L2TP is build between LAC &amp;nbsp;and LNS,&amp;nbsp;&lt;BR /&gt;IPSec can protect this P2P connection by config IPSec with policy ACL host "ip of LAC initiate the L2TP" host "ip of LNS terminate the L2TP".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so why there is no policy ACL and there is IPSec dyamnic ?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 17:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4458401#M232959</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-09-01T17:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4459060#M232998</link>
      <description>&lt;P&gt;thanks for the directions but I am a novice and I was unable to apply the solution, do you have any suggestions for my configuration?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 20:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4459060#M232998</guid>
      <dc:creator>r_m</dc:creator>
      <dc:date>2021-09-02T20:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN L2TP + ipsec routing problem</title>
      <link>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4459097#M233000</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14122-24.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14122-24.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 21:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/vpn-l2tp-ipsec-routing-problem/m-p/4459097#M233000</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-09-02T21:44:09Z</dc:date>
    </item>
  </channel>
</rss>

