07-11-2018 12:53 AM - edited 03-12-2019 05:27 AM
Good day all,
I am trying to set up an IPsec VPN on my Cisco ASR920. I found a sample config on the cisco site but one thing I note is that there is no acl to identify interesting traffic in the configuration. how do I capture interesting traffic and send it via the IPsec tunnel with this sample config provided by Cisco?
07-11-2018 01:35 AM
Hi,
In this example you provided it uses a VTI (virtual tunnel interface) and does not require and ACL to define interesting traffic. To send encrypted traffic accross the VPN tunnel you just need to route the traffic, either a static route or using a routing protocol.
From the example in the link you provided:
ip route 192.168.20.0 255.255.255.0 tunnel504
Therefore 192.168.20.0/24 is the remote subnet which would be encrypted and routed over the VTI, obviously a return route needs to be applied on the other device.
HTH
07-11-2018 05:49 AM
Hi RJI,
Is this secure? also, do you have any sample config on achieving this without tunnel mode?
07-11-2018 06:10 AM - edited 07-11-2018 06:13 AM
Hi,
Yes it is secure, it's still an IPSec VPN it just uses a VTI rather than a crypto map. I personally prefer using a VTI over a crypto map.
Example of Crypto Map on Cisco router
HTH
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide