06-02-2022 11:09 AM - edited 06-02-2022 11:10 AM
hello everyone.
please can you check my code maybe i forget something , my VPN IS WORKING FINE when i remove this command but i can't access internet :
ip nat inside source list 105 pool POOL-NAT-LAN overload
my code
interface GigabitEthernet1
CONNECT TO OUTSIDE WAN
ip address 192.168.123.1 255.255.255.0
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
crypto map CRYPTOMAP
!
interface Vlan1
description $ETH_LAN$
ip address 192.168.117.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
ip default-gateway 192.168.123.254
ip nat pool POOL-NAT-LAN 192.168.123.110 192.168.123.200 netmask 255.255.255.0 ip nat inside source route-map nonat interface GigabitEthernet1 overload
ip route 0.0.0.0 0.0.0.0 192.168.123.254 ! !
route-map nonat permit 1
match ip address 105 !
access-list 101 permit ip 192.168.117.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 101 deny ip 192.168.117.0 0.0.0.255 any
access-list 105 permit ip 192.168.117.0 0.0.0.255 any
access-list 105 deny ip 192.168.117.0 0.0.0.255 192.168.1.0 0.0.0.255
when i try to ping my lan network 192.168.117.1 the ping is too long with HIGH ping Value see the screen in attachement .
and when i put back this command :
ip nat inside source list 105 pool POOL-NAT-LAN overload
i can ping internet 1.1.1.1 and my vpn traffic but too slow... and after some ping i lost completly connection my lan network ?
have you any idea ?
Thank you
Solved! Go to Solution.
06-12-2022 12:36 PM
I m sorry to be late. I reseted my router 3 times. And now he isw working fine with my first configuration. I dont know why the first time i setted the configuration the router was unable to connect to vpn and internet on the same time. acces list was setted correctly. I m using my first configuration without any change. Thank you for your assistance guy's maybe my router is faulty.. all your answer was helpful.
06-02-2022 11:28 AM
Hi
This command "ip nat inside source list 105 pool POOL-NAT-LAN overload " is actually wrong.
The right one is this:
" ip nat inside source route-map nonat interface GigabitEthernet1 overload "
This NAT statement look for this route-map:
route-map nonat permit 1
match ip address 105
Which look this ACL:
access-list 105 permit ip 192.168.117.0 0.0.0.255 any
access-list 105 deny ip 192.168.117.0 0.0.0.255 192.168.1.0 0.0.0.255
But, what I can honestly to say it that, this is messy!
If you want to do NAT, then, try to improve it.
First, define on traffic to be NATed with an ACL:
access-list 105 permit ip 192.168.117.0 255.255.255.0
Then, use the NAT statement like this:
ip nat inside source list 105 interface GigabitEthernet1 overload
Keep the "ip nat inside" on vlan 1
and "ip nat outside" on GigabitEthernet1
Delete everything else.
06-03-2022 04:29 AM
Thank you for your reply. Once i do that. I lose connectivity to my lan network. 192.168.117.1 that begin with a high latency ping. And after 5 minute i lose ping to my interface 192.168.117.1
06-03-2022 04:38 AM
When you say you lose connectivity to your lan network, from where are you testing?
06-03-2022 04:53 AM
I have 2 router one isp : 192.168.123.254.
And cisco with two interface.
Inside : 192.168.117.1 and outside 192.168.123.1
I m connected with my computer : ip address 192.168.117.10 host.
Gateway : 192.168.117.1
06-03-2022 05:04 AM
That´s your topology?
06-03-2022 05:09 AM - edited 06-03-2022 05:10 AM
Yes the cloud-pt its my isp router diretcly connected to my cisco. On the same technical room. I have ftth fiber optic router f680 connected to my cisco with ethernet cable
06-03-2022 05:18 AM
and you are testing from where exactly? from the f680 ? It is wifi router?
Can you draw the whole topology please?
It can be simple, dont need to use software. Can be a draft in a paper.
06-03-2022 06:13 AM
06-03-2022 06:37 AM
Looking the topology and the configuration you shared above, the conclusion I get is that you dont need NAT.
The ISP route does NAT for you already. The only thing you need is this:
ip route 0.0.0.0 0.0.0.0 192.168.123.254
Just enter in the interface and run "no nat inside" and "no nat outside"
06-03-2022 07:58 AM
If i do that. Ho can i set the crypto map on which interface ? Because i dont say where is my internal interface and outside interface.
06-03-2022 08:10 AM
You outside interface is this:
interface GigabitEthernet1
CONNECT TO OUTSIDE WAN
ip address 192.168.123.1 255.255.255.0
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
crypto map CRYPTOMAP
But, when you mention VPN, which kind of VPN is this? It is a Client VPN? Because, the only configuration you share it this command "crypto map CRYPTOMAP". This alone is not able to stablish a VPN.
But, even though you have a Site-to-Ste VPN on this router, the NAT does not make sense.
Can you share the whole "show running-config" ?
06-03-2022 10:07 AM - edited 06-03-2022 10:14 AM
i reseted my router
ping to internet it's ok . VPN IS UP But can't ping this other side : 192.168.1.0 network
if i remove :
ip nat inside source list 120 pool POOL-NAT-LAN overload
VPN COME UP and i can't ping the other side network and i lost internet.
same topology .
that's my current issue
this is my current running config :
no service password-encryption ! hostname r1 ! boot-start-marker boot-end-marker ! aqm-register-fnf ! logging buffered 51200 warnings enable secret 5 sksksjsj ! no aaa new-model wan mode dsl ! ! ! ! ! ! ip dhcp pool CLIENT network 192.168.117.0 255.255.255.0 dns-server 8.8.8.8 domain-name domain.com default-router 192.168.117.1 lease 0 2 ! ! ! no ip domain lookup ip domain name yourdomain.com ip name-server 208.67.222.222 ip cef no ipv6 cef ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! controller VDSL 0 no cdp advertise-v2 no cdp run ! ! crypto ctcp port 10000 ! ! ! ! crypto isakmp policy 10 encr aes authentication pre-share group 15 crypto isakmp key password address x.X.X.X crypto isakmp invalid-spi-recovery ! crypto ipsec security-association lifetime seconds 86400 ! crypto ipsec transform-set ftthset esp-des esp-md5-hmac mode tunnel ! ! ! crypto map MAPVPN 10 ipsec-isakmp set peer x.x.x.x set transform-set ftthset set pfs group5 match address 121 ! ! ! ! ! interface ATM0 no ip address shutdown no atm ilmi-keepalive ! interface Ethernet0 no ip address shutdown ! interface FastEthernet0 description connected to wan switchport access vlan 200 no ip address spanning-tree portfast ! interface FastEthernet1 switchport access vlan 100 no ip address spanning-tree portfast ! interface FastEthernet2 switchport access vlan 100 no ip address spanning-tree portfast ! interface FastEthernet3 switchport access vlan 100 no ip address spanning-tree portfast ! interface GigabitEthernet0 no ip address ! interface GigabitEthernet1 no ip address shutdown duplex auto speed auto ! ! interface Vlan1 description $ETH_LAN$ no ip address ip tcp adjust-mss 1452 shutdown ! interface Vlan100 ip address 192.168.117.1 255.255.255.0 ip nat inside ip virtual-reassembly in ! interface Vlan200 ip address 192.168.123.1 255.255.255.0 ip nat outside ip virtual-reassembly in crypto map MAPVPN ! interface Dialer1 no ip address no cdp enable ! ip forward-protocol nd no ip http server ip http access-class 23 ip http authentication local no ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ! ! ip nat pool POOL-NAT-LAN 192.168.123.110 192.168.123.200 netmask 255.255.255.0 ip nat inside source list 120 pool POOL-NAT-LAN overload ip route 0.0.0.0 0.0.0.0 192.168.123.254 permanent ! ! route-map nonat permit 10 match ip address 120 ! access-list 23 permit 192.168.117.0 0.0.0.255 access-list 120 permit ip 192.168.117.0 0.0.0.255 any access-list 120 deny ip 192.168.117.0 0.0.0.255 192.168.1.0 0.0.0.255 access-list 121 permit ip 192.168.117.0 0.0.0.255 192.168.1.0 0.0.0.255 access-list 121 deny ip 192.168.117.0 0.0.0.255 any !
thank you
06-02-2022 11:29 AM - edited 06-02-2022 11:31 AM
please check this example for config VPN with NAT overload
access-list 105 permit ip 192.168.117.0 0.0.0.255 any <- this must be push down
access-list 105 deny ip 192.168.117.0 0.0.0.255 192.168.1.0 0.0.0.255 <- this must be push up
06-03-2022 06:51 AM - edited 06-03-2022 09:10 AM
still this issue not solve ?
Anyway,
We have two isp
One vpn
One lan
1-
using route-map to match acl that
Deny Lan-> lan remote
Permit Lan-> 0.0.0.0
Match next-hop or interface for isp1 or isp2
2-Using nonat overload with route-map specify in point 1
Note:- here you need two nonat one for each isp
3-using defualt route and ip sla tracking,
4-config crypto map under both isp interface.
5- other side must config to allow established ipsec with both isp ip.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide