04-29-2016 01:46 AM - edited 03-05-2019 03:54 AM
hi,
im trying to debug ip sec tunnel which i inherited
sh cryptom isakmp sa gives:
IPv4 Crypto ISAKMP SA
dst src state conn-id status
85.114.38.XY 80.149.40.XYZ QM_IDLE 2012 ACTIVE
in config ipsec is defined:
crypto ipsec transform-set VPN_ABC esp-3des esp-sha-hmac
mode tunnel
and:
crypto map VPN_ABC 1 ipsec-isakmp
set peer 80.149.40.XYZ
set transform-set VPN_ABC
set pfs group2
match address 115
list 115:
access-list 115 permit ip 192.168.0.0 0.0.0.255 10.10.89.0 0.0.0.255
access-list 115 permit ip 192.168.0.0 0.0.0.255 10.10.91.0 0.0.0.255
access-list 115 permit ip 192.168.0.0 0.0.0.255 192.168.101.0 0.0.0.255
access-list 115 deny ip any any
when i try to acces host 192.168.101.57 on remote network , traceroute sends packets to my WAN gateway instead via tunnel !
many thx for help!
04-29-2016 03:53 AM
Hi
Whats there looks right but looks to be bits missing as well, wheres the crypto isakmp key and the crypto isakmp policy section
Can you also reach the far end public ip address from your router and does the far side match exactly for the lan-lan tunnel to come up , need to see both sides with full config for IPsec
Take a look at this doc lan-lan IPsec setup what your trying to achieve there
http://www.cisco.com/c/en/us/support/docs/routers/1700-series-modular-access-routers/71462-rtr-l2l-ipsec-split.html
04-29-2016 04:18 AM
The original post showed the crypto isakamp sa but not the crypto IPsec sa. Seeing the IPsec sa might shed some light on what has been negotiated.
Also the original post is not clear where the attempt to access the remote host is originated from. If from a PC connected behind the router I would expect it to work but if from the router itself then it probably does not have a source address that matches the access list 115.
HTH
Rick
04-29-2016 05:05 AM
thx for quick response!
Here is it:
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
lifetime 28800
!
crypto isakmp policy 2
encr 3des
hash md5
authentication pre-share
group 2
also:
ip route 0.0.0.0 0.0.0.0 85.XYZ.38.93 --> this is my WAN ip, on Fa4 interface
ip route 146.XYZ.0.0 255.255.0.0 Tunnel0 ---> this is another VPN, via tunnel , working ok
!
interface FastEthernet4
ip address 85.XYZ.38.94 255.255.255.252
ip access-group Fiducia_out out
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
crypto map VPN_ABC
ip access-list extended Fiducia_out
permit ip any any
i think i missed something in NAT or ACL but cant find it.
im trying to access from router and host in local network, 192.168.0.0.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide