10-17-2014 07:22 AM - edited 03-04-2019 11:59 PM
Hi folks!
I've an IPsec Site-to-Site VPN to a branch office (R2). There was one LAN (LAN1) at HQ and another (LAN2) at Branch office.
Tunnel termination points:
LAN3 has been created recently, behind R2 (see the picture below):
So I need to gain an access to LAN3 from LAN1. How could I solve this problem? I see two options for now.
OPTION 1: Create a separate tunnel from R1 to R2
I see an issue here:
OPTION 2: Create a summary route in VPN config
Issues:
How could I solve this problem?
Running-config (security part) is attached
Solved! Go to Solution.
10-17-2014 09:07 AM
From the Cisco side this is easy to solve. I can not address how to solve it from the R1 Microsoft side but suspect that it is not difficult.
You do NOT want a second tunnel to solve this. You want to change the access list that identifies traffic to be encrypted. If it were me I would add this line to your existing access list
permit ip 192.168.3.0 0.0.0.255 192.168.101.0 0.0.0.255
or alternatively you could replace this line
permit ip 192.168.2.0 0.0.0.255 192.168.101.0 0.0.0.255
with this line
permit ip 192.168.2.0 0.0.1.255 192.168.101.0 0.0.0.255
HTH
Rick
10-17-2014 07:50 AM
I don't believe this would be adding a tunnel you are just adding access to that subnet on your tunnel. Sorry I can't help with exact config but I know it can be done rather easily.
10-17-2014 09:07 AM
From the Cisco side this is easy to solve. I can not address how to solve it from the R1 Microsoft side but suspect that it is not difficult.
You do NOT want a second tunnel to solve this. You want to change the access list that identifies traffic to be encrypted. If it were me I would add this line to your existing access list
permit ip 192.168.3.0 0.0.0.255 192.168.101.0 0.0.0.255
or alternatively you could replace this line
permit ip 192.168.2.0 0.0.0.255 192.168.101.0 0.0.0.255
with this line
permit ip 192.168.2.0 0.0.1.255 192.168.101.0 0.0.0.255
HTH
Rick
10-20-2014 04:32 AM
Thanks, Richard!
That worked. Actually from ISA Server I had to bring up another tunnel with the same parameters as the previous one (192.168.2.0/24) but for a new network (192.168.3.0/24).
10-20-2014 09:28 AM
It is interesting that from the ISA Server side you had to bring up another tunnel. I am glad that my suggestions helped you to solve it from the Cisco side. Thank you for using the rating system to mark this question as answered. This will help other readers in the forum to know that there is helpful information in this thread.
HTH
Rick
10-20-2014 10:58 PM
Rick,
actually i've found a way to just add another address range to the existing tunnel (it seems that i was blind hadn't noticed it before). That also worked. So i decided to move to that right solution.
Although, I've discovered a new possibility to add another address range through creating another tunnel :)
Thanks
10-21-2014 07:01 AM
Thank you for posting back to the forum and updating us that you were able to just add another address range to the existing tunnel on the ISA Server. That makes sense and I agree that this is better than achieving the result by adding a new tunnel.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide