11-01-2017 07:53 AM - edited 03-05-2019 09:24 AM
Solved! Go to Solution.
11-04-2017 01:21 AM
Hello,
what does the other side use as peer address ?
interface GigabitEthernet0/0/1
ip address 192.168.8.99 255.255.255.0
ip nat outside
negotiation auto
crypto map testmap
You are using a private space address. What is connected in front of this ?
11-04-2017 07:20 AM
Hello,
the scenario for the connection is Cisco router 4221 connected to Huawai 4G router with DMZ enabled ip 192.168.8.99 with a static IP to be used to other side and my gateway is 192.168.8.1
through this setup i cant up the VPN tunnel successfully i can browse the internet but i cant reach any device on the other side or ping.
if i negate below then i can reach the other side but i cant browse the internet:
ip nat inside source list 101 interface GigabitEthernet0/0/1 overload
access-list 101 permit ip 10.80.49.0 0.0.0.255 any
access-list 101 deny ip 10.80.49.0 0.0.0.255 10.0.0.0 0.255.255.255
11-04-2017 08:02 AM
mate you are sending us round and round in circles here just post your current configuration. I told you already your VPN is up problem Is your crypto acl is missing or your crypto map under the interface is missing ... just post your config and stop takin us on a ride here mate
11-04-2017 08:04 AM - edited 11-04-2017 08:06 AM
@malbalhaj wrote:
Hello,
the scenario for the connection is Cisco router 4221 connected to Huawai 4G router with DMZ enabled ip 192.168.8.99 with a static IP to be used to other side and my gateway is 192.168.8.1
through this setup i cant up the VPN tunnel successfully i can browse the internet but i cant reach any device on the other side or ping.
if i negate below then i can reach the other side but i cant browse the internet:
ip nat inside source list 101 interface GigabitEthernet0/0/1 overload
access-list 101 permit ip 10.80.49.0 0.0.0.255 any
access-list 101 deny ip 10.80.49.0 0.0.0.255 10.0.0.0 0.255.255.255
Mate the deny ip entry must be at the top of the access list not at the bottom As in your case the deny is underneath the permit statement.. place it in top
11-05-2017 03:44 AM
Hello
Given the addressing below, and that your NAT wasn't working in the OP, how is the vpn peer being reached?
Your default route isnt even pointing to a connected interface, its looks like its recursive and as well is your vpn peer address?
So what is this rtr connected to for it to establish a vpn with the below addressing and default route?
inside nat - 10.80.49.1/24
outside nat 192.168.89.49/24
ipsec interesting traffic 10.80.49.0 0.0.0.255 10.0.0.0 0.255.255.255
crypto peer 212.12.13.2
ip route 0.0.0.0 0.0.0.0 192.168.8.1
res
Paul
11-04-2017 08:37 AM
Hello
Before any suggestion were made your had vpn connectivity but no internet access.
It was suggested that you require spilt tunneling to allow vpn users to access internet without being encrypted
Your then current configuration for nat consisted:
access-list 2 permit 10.80.49.0 0.0.0.255
ip nat pool internet 10.80.49.0 0.0.0.255 10.80.49.254 netmask 255.255.255.0
ip nat inside source list 2 pool internet
ip route 0.0.0.0 0.0.0.0 192.168.8.1
Which stated to nat your internal lan users with a nat pool of you internal lan users which is a incorrect statement?
So really only what needed to change was access-list 2 or new access-list and a NAT statement.
So can you confirm at this time what is now applied to the rtr regards NAT and access-lists?
res
Paul
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide