cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
675
Views
0
Helpful
2
Replies

Cisco 1900 - L2TP VPN Client Surf Internet through Cisco 1900

Hi everybody,

I've a Cisco 1900 Router with L2TP VPN Client configured. I need that VPN CLient (subnet 192.168.3.0) can be reach only 192.168.1.0 but I need also to surf with Public IP of Cisco Router (Interface Dialer1). Could you help me please ? :-)


Here the conf:


Building configuration...

version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
no service password-recovery
!
hostname XXXXXXXXXXXXX
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
clock timezone UTC 1 0
clock summer-time MEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
!
!
!
!
ip dhcp excluded-address 192.168.16.1 192.168.16.49
ip dhcp excluded-address 192.168.16.201 192.168.16.254
ip dhcp excluded-address 192.168.1.1 192.168.1.49
ip dhcp excluded-address 192.168.1.201 192.168.1.254
ip dhcp excluded-address 192.168.10.1 192.168.10.2
!
ip dhcp pool POOL1
network 192.168.16.0 255.255.255.0
default-router 192.168.16.1
domain-name xxxxxxxxxxxxx
dns-server 8.8.8.8 1.1.1.1
lease 0 1 30
!
ip dhcp pool POOL2
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
dns-server 8.8.8.8 1.1.1.1
lease 0 1 30
!
ip dhcp pool POOL_VoIP
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 8.8.8.8 1.1.1.1
lease 0 1 30
!
!
!
ip domain name xxxxxxxxxx
ip cef
no ipv6 cef
!
multilink bundle-name authenticated
!
vpdn enable
!
vpdn-group L2TP
accept-dialin
protocol l2tp
virtual-template 1
no l2tp tunnel authentication
!
!
!
!
!
username Admin
!
redundancy
!
!
!
!
!
ip ssh time-out 90
ip ssh version 2
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key 12345 address 0.0.0.0
!
!
crypto ipsec transform-set L2TP-Set2 esp-3des esp-sha-hmac
mode transport
!
!
!
crypto dynamic-map dyn-map 10
set nat demux
set transform-set L2TP-Set2
!
!
crypto map outside_map 65535 ipsec-isakmp dynamic dyn-map
!
!
!
!
!
interface Loopback1
description loopback for IPsec-pool
ip address 192.168.3.20 255.255.255.255
ip nat inside
ip virtual-reassembly in
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description FTTH 1Gb
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/0.11
description FTTH 1Gb
encapsulation dot1Q 11
pppoe enable group global
pppoe-client dial-pool-number 1
!
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/1.1
encapsulation dot1Q 1
ip address 192.168.16.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.2
encapsulation dot1Q 2
ip address 192.168.1.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.3
encapsulation dot1Q 3
ip address 192.168.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.4000
encapsulation dot1Q 4000 native
!
interface Virtual-Template1
ip unnumbered Loopback1
peer default ip address pool l2tp-pool
ppp authentication ms-chap-v2 VPDN_AUTH
ppp ipcp dns 8.8.8.8 1.1.1.1
!
interface Dialer1
description FTTH 1Gb
ip address negotiated
ip nat outside
ip virtual-reassembly in
encapsulation ppp
dialer pool 1
ppp pap sent-username xxxxxxxxxxxxxxxxxx
no cdp enable
crypto map outside_map
!
ip local pool l2tp-pool 192.168.3.1 192.168.3.19
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip nat inside source list 111 interface Dialer1 overload
ip nat inside source static tcp 192.168.1.6 80 interface Dialer1 8083
ip route 0.0.0.0 0.0.0.0 Dialer1
!
!
!
access-list 111 remark --------------------------
access-list 111 deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 111 deny ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 111 permit ip 192.168.1.0 0.0.0.255 any
access-list 111 permit ip 192.168.3.0 0.0.0.255 any
access-list 111 permit ip 192.168.16.0 0.0.0.255 any
access-list 111 permit ip 192.168.10.0 0.0.0.255 any
!
control-plane
!
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login local
transport input ssh
transport output all
!
scheduler allocate 20000 1000
!
end

 

2 Replies 2

Cristian Matei
VIP Alumni
VIP Alumni

Hi,

 

   You need to create and apply a VPN filter, where you controll traffic allowed ingress/egress from/to VPN clients. For example:

 

access-list 150 deny ip 192.168.3.0 0.0.0.255 192.168.10.0 0.0.0.255

access-list 150 deny ip 192.168.3.0 0.0.0.255 192.168.16.0 0.0.0.255

access-list 150 permit ip 192.168.3.0 0.0.0.255 any

!
crypto dynamic-map dyn-map 10

 set ip access-group 150 in

 

I see that the NAT config looks good, so you should also have Internet access.

 

Regards,

Cristian Matei.

but it doens't works. I can reach all internal subnet from vpn and VPN client doesn't surf (I'll try ping 8.8.8.8)

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: