04-10-2016 02:29 AM - edited 03-05-2019 03:45 AM
Dear Sir
The attached router configuration block port UDP4500 and 500.
Please check it and send your response
Thanks
04-19-2016 01:16 AM
04-19-2016 01:20 AM
The entries you have highlighted are related to each other. However all of the configuration you have given is for user to site VPNs, not site to site VPNs.
04-19-2016 06:28 AM
Thank you for your reply , how can we make it site-to-site VPNs
04-20-2016 03:38 AM
04-20-2016 01:30 PM
Alright, using only the Cisco routers;
On the 192.168.10.1 router:
crypto keyring kr-site-to-site
pre-shared-key address 78.93.247.181 key 0123456789
crypto isakmp profile ikev1-site-to-site
keyring kr-site-to-site
match identity address 78.93.247.181 255.255.255.255
crypto ipsec profile ipsec-profile
set transform-set ESP-3DES-SHA
set isakmp-profile ikev1-site-to-site
interface Tunnel 0
ip address 192.168.255.1 255.255.255.252
tunnel source 78.93.216.19
tunnel destination 78.93.247.181
tunnel protection ipsec profile ipsec-profile
ip route 192.168.20.0 255.255.255.0 Tunnel0
On the 192.168.20.1 router:
crypto keyring kr-site-to-site
pre-shared-key address 78.93.216.19 key 0123456789
crypto isakmp profile ikev1-site-to-site
keyring kr-site-to-site
match identity address 78.93.216.19 255.255.255.255
crypto ipsec profile ipsec-profile
set transform-set ESP-3DES-SHA
set isakmp-profile ikev1-site-to-site
interface Tunnel 0
ip address 192.168.255.2 255.255.255.252
tunnel source 78.93.247.181
tunnel destination 78.93.216.19
tunnel protection ipsec profile ipsec-profile
ip route 192.168.10.0 255.255.255.0 Tunnel0
04-20-2016 11:31 PM
04-21-2016 12:54 AM
Because we are using seperate Tunnel interfaces, and they don't have "ip nat" configured on them, the router wont apply NAT to this traffic.
Can you get rid of the Cyberoam boxes, they do complicate the solution a bit. Otherwise just add more static routes through the tunnels to get to the remote networks, and make sure the Cyberoam boxes allow the traffic through and don't NAT it.
04-21-2016 02:51 AM
Thank you for your reply
is it necessary to make ip route for remote LAN on the both router or just your ip route is enough?
Thanks
04-21-2016 01:40 PM
Both routers need an "ip route" for each remote network that is to go over the VPN.
04-22-2016 11:00 PM
Dear Philip
Thank you for your support
I have router 1841 , when I enter a crypto line into config t i get an error.
waiting for your feedback
Thanks
04-23-2016 12:49 PM
You did this is config mode right?
04-23-2016 10:59 PM
Yes , within the Config Mode
also
crypto keyring
04-24-2016 12:20 AM
Hmm, maybe you are running an older IOS. What model Cisco routers are you using and what software version are they running?
Do they take the other crypto commands ok?
04-24-2016 01:19 AM
router 1841
04-24-2016 01:23 AM
We are going to have to use an older way of doing this. On the 192.168.10.1 router try:
crypto isakmp key 0123456789 address 78.93.247.181 no-xauth
crypto ipsec profile ipsec-profile
set transform-set ESP-3DES-SHA
interface Tunnel 0
ip address 192.168.255.1 255.255.255.252
tunnel source 78.93.216.19
tunnel destination 78.93.247.181
tunnel protection ipsec profile ipsec-profile
ip route 192.168.20.0 255.255.255.0 Tunnel0
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide