05-27-2013 06:17 AM - edited 02-21-2020 06:55 PM
Hi
I have a c 870 Router and i would like to put it 2 differents VPN SITE TO SITE and a Remote access VPN ( VPN CLIENTS) so is it possible to put the 3 VPN in the same Router if yes can u give me the steps or the exemple to configure
Regards
Solved! Go to Solution.
05-29-2013 08:13 AM
So, on Routers will be:
Cisco 2611:
LAN: 10.10.10.0 /24
access-list 100 permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255
access-list 100 permit ip 14.1.1.0 0.0.0.255 10.10.20.0 0.0.0.255 --> VPNPOOL
!
crypto map clientmap 10 ipsec-isakmp
set peer 172.18.124.199
match address 100
!
ip local pool ippool 14.1.1.1 14.1.1.254
!
access-list 120 permit ip 10.10.10.0 0.0.0.255 14.1.1.0 0.0.0.255
access-list 120 permit ip 10.10.20.0 0.0.0.255 14.1.1.0 0.0.0.255 --> REMOTE NETWORK
!
crypto isakmp client configuration group ra-client
pool ippool
acl 120
!
Please notice that the configuration is incomplete, I only added the relevant changes you must make to allow the RA clients across the LAN-to-LAN tunnel, of course, the LAN-to-LAN settings must match on the other side of the tunnel i.e. ACL mirror, NAT and so on.
HTH,
Portu.
05-27-2013 06:59 AM
Surely it's possible. You can do it using regular crypto-maps or in a "new" way using VTIs, wich is preferable.
Look through this guide:
http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/12-4t/secon-12-4t-library.html
05-27-2013 04:55 PM
Hi,
It really depends on your needs and the type or device the Router is connecting to. If you are connecting to an ASA, then VTI is not going to work.
If you are connecting to a third-party device or Cisco ASA, then I would go with the crypto map.
Check this out:
Configuring IPsec Between Two Routers and a Cisco VPN Client 4.x
HTH,
Portu.
05-29-2013 07:01 AM
Hi
Thanks for your help so i have another question : Is it possible to authorize a traffic coming by the remote access vpn(pool VPN) pass through the IPSEC Tunnel to communicate withe the remote site ?
Regards
Ahmed Zniti
05-29-2013 07:04 AM
Hi Ahmed,
May I know what you mean by "authorize"?
Thanks
05-29-2013 07:09 AM
Means that the vpn pool traffic configured by remote access can pass through vpn site to site tunnel and communicate with LAN Remote Site
Regards
05-29-2013 07:14 AM
I do understand your question correctly, all you need is to include the remote LAN network to the VPN client's SPLIT ACL (in case that you use split-tunneling) and also add the VPN pool to the LAN-to-LAN encryption domain.
Remember to update the NAT rules and encryption domain on the remote end of the tunnel as well.
Let me know,
Portu.
05-29-2013 07:39 AM
Hi
Thanks yes this my question so can you send me an exemple of configuration using this scenario ?
Regards
Ahmed Zniti
05-29-2013 07:47 AM
Just following the document that I sent you earlier.
When you define the crypto ACL for the LAN-to-LAN add the VPN pool network as well.
And when you add the ACL under the client configuration group, make sure you include the remote network (s).
Are you planning to deploy this on Cisco Routers or ASAs?
Thanks,
Please rate any helpful posts
05-29-2013 07:52 AM
I will deploy this configuration on Cisco Routers
Thanks a lot Javier
Best Regards
05-29-2013 08:13 AM
So, on Routers will be:
Cisco 2611:
LAN: 10.10.10.0 /24
access-list 100 permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255
access-list 100 permit ip 14.1.1.0 0.0.0.255 10.10.20.0 0.0.0.255 --> VPNPOOL
!
crypto map clientmap 10 ipsec-isakmp
set peer 172.18.124.199
match address 100
!
ip local pool ippool 14.1.1.1 14.1.1.254
!
access-list 120 permit ip 10.10.10.0 0.0.0.255 14.1.1.0 0.0.0.255
access-list 120 permit ip 10.10.20.0 0.0.0.255 14.1.1.0 0.0.0.255 --> REMOTE NETWORK
!
crypto isakmp client configuration group ra-client
pool ippool
acl 120
!
Please notice that the configuration is incomplete, I only added the relevant changes you must make to allow the RA clients across the LAN-to-LAN tunnel, of course, the LAN-to-LAN settings must match on the other side of the tunnel i.e. ACL mirror, NAT and so on.
HTH,
Portu.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide