07-16-2023 11:07 AM - last edited on 10-18-2023 11:03 AM by Translator
show ip routecommand lists all subnets, I can
pingand traceroute any local address in either LAN.
LAN 172.16.5.0however NAT is not working for the Branch Office
LAN 172.16.4.0
pingtraffic from the Branch Office LAN to the internet and nothing displays when
debug ip natis enabled on the HQ NAT Router, nor does
show ip nat translationsshow any traffic to the Branch Office LAN
Solved! Go to Solution.
07-17-2023 09:07 AM - last edited on 10-18-2023 11:30 AM by Translator
Three points
1- NATing' which you clear it that you already done it
2-
defualt route
from hub to spoke (branch)
3- static route in spoke toward isp2 for
hub IP
07-18-2023 06:55 AM - last edited on 10-18-2023 11:37 AM by Translator
default routefrom
172.16.5.3 (NAT Router) to 172.16.10.2Spoke Tunnel IP (Branch Router)
no ip route 0.0.0.0 0.0.0.0 172.16.5.3
ip route 0.0.0.0 0.0.0.0 172.16.10.2
default routetowards ISP-2
no ip route 0.0.0.0 0.0.0.0 32.221.21.150
ip route 172.16.10.1 255.255.255.255 32.221.21.150
07-17-2023 07:47 AM - last edited on 10-18-2023 11:39 AM by Translator
HUB tunnel IP address 172.16.10.1 towards ISP2 32.221.21.150correct?
ip route 172.16.10.1 255.255.255.0 32.221.21.150
07-17-2023 08:59 AM - last edited on 10-18-2023 11:42 AM by Translator
default-informationcommand.
default-informationin command pointing toward the Spoke device (Branch Router) correct?
router eigrp 200statement or something else?
07-18-2023 07:10 AM
Dont worry' I will share lab config with you
Dmvpn hub and eigrp and nating
Within 1 hr I will share
07-18-2023 08:28 AM - last edited on 10-18-2023 11:45 AM by Translator
default routeis the WAN Router inside
interface 172.16.5.5rather than
ISP-2 32.221.21.150
172.16.5.5 as the default routefor the Branch Router in the production config the DMVPN tunnel goes down.
07-18-2023 09:19 AM - last edited on 10-18-2023 11:47 AM by Translator
IOU5#show run
hostname IOU5
!
interface Ethernet0/0
ip address 200.0.0.5 255.255.255.0
ip nat outside
ip virtual-reassembly in
!
interface Ethernet1/1
ip address 10.0.0.5 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
router eigrp 5
network 10.0.0.0 0.0.0.255
redistribute static metric 100 100 255 1 1500
!
ip nat inside source list 1 interface Ethernet0/0 overload
ip route 0.0.0.0 0.0.0.0 200.0.0.6
!
access-list 1 permit 3.3.3.3
access-list 1 permit 2.2.2.2
IOU1#show run
!
crypto isakmp policy 10
hash md5
authentication pre-share
crypto isakmp key mhm address 120.0.0.3
crypto isakmp key mhm address 0.0.0.0
!
crypto ipsec transform-set mhm esp-des
mode tunnel
!
crypto ipsec profile mhmspoke
set transform-set mhm
!
crypto map mhmtunnel 10 ipsec-isakmp
set peer 120.0.0.3
set transform-set mhm
match address 100
!
interface Tunnel0
ip address 5.0.0.1 255.255.255.0
no ip redirects
no ip next-hop-self eigrp 5
no ip split-horizon eigrp 5
ip nhrp map multicast dynamic
ip nhrp network-id 5
tunnel source Ethernet0/0
tunnel mode gre multipoint
tunnel key 5
tunnel protection ipsec profile mhmspoke
!
interface Tunnel1ip address 15.0.0.1 255.255.255.0tunnel source Ethernet0/0tunnel destination 120.0.0.3
!
interface Ethernet0/0
ip address 100.0.0.1 255.255.255.0
crypto map mhmtunnel
!
interface Ethernet1/1
ip address 10.0.0.1 255.255.255.0
!
router eigrp 5
network 5.0.0.0 0.0.0.255
network 10.0.0.0 0.0.0.255
!router eigrp 15network 15.0.0.0 0.0.0.255
!
ip forward-protocol nd
!
ip route 110.0.0.2 255.255.255.255 100.0.0.4
ip route 120.0.0.3 255.255.255.255 100.0.0.4
!access-list 100 permit gre host 15.0.0.1 host 15.0.0.3access-list 100 permit gre host 100.0.0.1 host 120.0.0.3
IOU2#show running-config
!
crypto isakmp policy 10
hash md5
authentication pre-share
crypto isakmp key mhm address 100.0.0.1
crypto isakmp key mhm address 0.0.0.0
!
!
crypto ipsec transform-set mhm esp-des
mode tunnel
!
!
crypto ipsec profile mhmspoke
set transform-set mhm
!
!
crypto map mhmtunnel 10 ipsec-isakmp
! Incomplete
set peer 100.0.0.1
set transform-set mhm
match address 100
!
interface Loopback0
ip address 2.2.2.2 255.255.255.255
!
interface Tunnel0
ip address 5.0.0.2 255.255.255.0
no ip redirects
ip nhrp map 5.0.0.1 100.0.0.1
ip nhrp map multicast 100.0.0.1
ip nhrp network-id 5
ip nhrp nhs 5.0.0.1
tunnel source Ethernet0/1
tunnel mode gre multipoint
tunnel key 5
tunnel protection ipsec profile mhmspoke
!
interface Ethernet0/1
ip address 110.0.0.2 255.255.255.0
crypto map mhmtunnel
!
router eigrp 5
network 2.2.2.2 0.0.0.0
network 5.0.0.0 0.0.0.255
!
ip route 100.0.0.1 255.255.255.255 110.0.0.4
07-18-2023 09:19 AM
07-18-2023 09:25 AM - last edited on 10-18-2023 11:51 AM by Translator
this lab I success
same approach I share before
LO in IOU2 Spoke can access IOU6 using NATIng in IOU5
the issue I face
I config
default route
in IOU5 and
redistribute static
into EIGRP 5
but the IOU1 (Hub) not advertise this
default route
via EIGRP
because I was already config
default route
toward IOU4 (ISP)
so solution here is
remove
default route
in Hub IOU1 and use static route for each spoke
NOW Spoke get
defualt route
via
EIGRP tunnel
from Hub.
and traffic forward to Hub then to Hub NATing.
07-18-2023 09:52 AM
07-18-2023 10:13 AM
Take your time friend
Have a nice summer
MHM
07-20-2023 07:05 AM
07-20-2023 07:22 AM
You are so so welcome
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide