05-26-2019 08:17 PM
I've created 2x Cisco CSR 1000V in AWS, and have launched an instance in the private subnet (behind the CSR).
Now, I want that instance to have internet access.
I can ping/ssh the instance from the CSR, but I cannot connect to the instance via SSH using its public IP address. I assume I need to tell the CSR that I want to allow traffic to that instance.
How to do that?
ip-10-0-0-171#show ip int b Interface IP-Address OK? Method Status Protocol GigabitEthernet1 10.0.0.171 YES DHCP up up #outside GigabitEthernet2 10.0.1.147 YES DHCP up up #internal IP address
The inside network is: 10.0.1.0/24 - It should allow outgoing traffic from 10.0.1.0/24 to the internet.
Also, if I need to create a NAT entry that redirects port 2222 from the outside interface to 10.0.1.154, how do I do that?
Thanks!
Solved! Go to Solution.
05-30-2019 08:30 PM
I managed to get this working with the following:
# AWS Sydney (ap-southeast-2): crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn CSR1.cisco.com authentication remote pre-share key cisco123 authentication local pre-share key cisco123 exit interface tunnel1 ip address 172.16.0.1 255.255.255.252 tunnel source GigabitEthernet 1 tunnel destination 52.x.x.206 tunnel protection ipsec profile default crypto ikev2 dpd 10 2 on-demand show crypto ipsec profile default router eigrp 1 network 172.16.0.0 0.0.0.255 network 10.1.2.0 0.0.0.255 ip route 10.5.2.0 255.255.255.0 tunnel1 interface GigabitEthernet1 ip nat outside interface GigabitEthernet2 ip nat inside ip access-list extended NAT permit ip 10.1.2.0 0.0.0.255 any ip nat inside source list NAT interface GigabitEthernet1 overload no ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload wr # AWS Tokyo (ap-northeast-1): crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn CSR2.cisco.com authentication remote pre-share key cisco123 authentication local pre-share key cisco123 exit interface tunnel1 ip address 172.16.0.2 255.255.255.252 tunnel source GigabitEthernet 1 tunnel destination 3.x.x.27 tunnel protection ipsec profile default crypto ikev2 dpd 10 2 on-demand show crypto ipsec profile default router eigrp 1 network 172.16.0.0 0.0.0.255 network 10.5.2.0 0.0.0.255 ip route 10.1.2.0 255.255.255.0 tunnel1 interface GigabitEthernet1 ip nat outside interface GigabitEthernet2 ip nat inside ip access-list extended NAT permit ip 10.5.2.0 0.0.0.255 any ip nat inside source list NAT interface GigabitEthernet1 overload no ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload wr
05-27-2019 12:25 AM
Hello,
post the configs of the CSRs. As far as I can see, you need a split tunnel setup with NAT (SVTI or DMVPN, since you cannot use NAT and crypto maps on the same interface with AWS)...
05-27-2019 02:13 AM
Hope this helps. Let me know if you need anything else.
It is worth reminding that the Linux VM is connected to a Private Subnet, which points to the GigabitEthernet2 as its default gw.
I can reach the VM from the CSR, but I cannot connect to the VM using its elastic IP address, or don't have internet from the instance.
GigabitEthernet1 - The outside interface
GigabitEthernet2 - The internal interface, which connects to the VMs
Tunnel0 - is connected to the other CSR (CSR 2 for HA). I don't think I need to give you the CSR2's configuration as it is pretty much the same.
CSR1#show running-config
Building configuration...
Current configuration : 4761 bytes
!
! Last configuration change at 03:54:57 UTC Mon May 27 2019
!
version 16.10
service timestamps debug datetime msec
service timestamps log datetime msec
platform qfp utilization monitor load 80
no platform punt-keepalive disable-kernel-core
platform console virtual
hostname CSR1
boot-start-marker
boot-end-marker
vrf definition GS
rd 100:100
!
address-family ipv4
exit-address-family
logging persistent size 1000000 filesize 8192 immediate
no aaa new-model
login on-success log
subscriber templating
multilink bundle-name authenticated
crypto pki trustpoint TP-self-signed-2886621095
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2886621095
revocation-check none
rsakeypair TP-self-signed-2886621095
crypto pki certificate chain TP-self-signed-2886621095
certificate self-signed 01
30820330
[ ... hidden for security reasons... ]
BAEBE008
quit
!
license udi pid CSR1000V sn 9Q [ ... hidden for security reasons... ] NO
no license smart enable
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
username ec2-user privilege 15 secret 9 $9$VLn04MyBv [ ... hidden for security reasons... ] 8o/nr2A4Cgc
username 54.54.54.54
!
redundancy
cloud provider aws 1
bfd peer 172.17.1.2
route-table rtb-0f73fdbdcbccdfb9b
cidr ip 0.0.0.0/0
eni eni-0560a232631575425
region ap-southeast-2
!
interface Tunnel0
ip address 172.17.1.1 255.255.255.252
ip ospf 1 area 0
bfd interval 500 min_rx 500 multiplier 3
tunnel source GigabitEthernet1
tunnel destination 3.3.3.3
!
interface VirtualPortGroup0
vrf forwarding GS
ip address 192.168.35.101 255.255.255.0
ip nat inside
no mop enabled
no mop sysid
!
interface GigabitEthernet1
ip address dhcp
ip nat outside
negotiation auto
no mop enabled
no mop sysid
!
interface GigabitEthernet2
ip address dhcp
negotiation auto
no mop enabled
no mop sysid
!
router ospf 1
bfd all-interfaces
!
iox
ip forward-protocol nd
ip tcp window-size 8192
ip http server
ip http authentication local
ip http secure-server
ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload
ip route 0.0.0.0 0.0.0.0 GigabitEthernet1 10.0.0.1
ip route vrf GS 0.0.0.0 0.0.0.0 GigabitEthernet1 10.0.0.1 global
!
ip ssh rsa keypair-name ssh-key
ip ssh version 2
ip ssh pubkey-chain
username ec2-user
key-hash ssh-rsa 8F [ ... hidden for security reasons... ] 10 ec2-user
ip scp server enable
!
!
ip access-list standard GS_NAT_ACL
permit 192.168.35.0 0.0.0.255
control-plane
line con 0
stopbits 1
line vty 0 4
login local
transport input ssh
app-hosting appid guestshell
app-vnic gateway1 virtualportgroup 0 guest-interface 0
guest-ipaddress 192.168.35.102 netmask 255.255.255.0
app-default-gateway 192.168.35.101 guest-interface 0
name-server0 8.8.8.8
end
05-30-2019 08:30 PM
I managed to get this working with the following:
# AWS Sydney (ap-southeast-2): crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn CSR1.cisco.com authentication remote pre-share key cisco123 authentication local pre-share key cisco123 exit interface tunnel1 ip address 172.16.0.1 255.255.255.252 tunnel source GigabitEthernet 1 tunnel destination 52.x.x.206 tunnel protection ipsec profile default crypto ikev2 dpd 10 2 on-demand show crypto ipsec profile default router eigrp 1 network 172.16.0.0 0.0.0.255 network 10.1.2.0 0.0.0.255 ip route 10.5.2.0 255.255.255.0 tunnel1 interface GigabitEthernet1 ip nat outside interface GigabitEthernet2 ip nat inside ip access-list extended NAT permit ip 10.1.2.0 0.0.0.255 any ip nat inside source list NAT interface GigabitEthernet1 overload no ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload wr # AWS Tokyo (ap-northeast-1): crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn CSR2.cisco.com authentication remote pre-share key cisco123 authentication local pre-share key cisco123 exit interface tunnel1 ip address 172.16.0.2 255.255.255.252 tunnel source GigabitEthernet 1 tunnel destination 3.x.x.27 tunnel protection ipsec profile default crypto ikev2 dpd 10 2 on-demand show crypto ipsec profile default router eigrp 1 network 172.16.0.0 0.0.0.255 network 10.5.2.0 0.0.0.255 ip route 10.1.2.0 255.255.255.0 tunnel1 interface GigabitEthernet1 ip nat outside interface GigabitEthernet2 ip nat inside ip access-list extended NAT permit ip 10.5.2.0 0.0.0.255 any ip nat inside source list NAT interface GigabitEthernet1 overload no ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload wr
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide