cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4407
Views
8
Helpful
5
Replies

VPN IPSEC Site-to-Site

muflixcek
Level 1
Level 1

Hello, i was trying to set VPN connection encrypted via IPSEC in packet tracer between two Routers.

If i use extend ping from Router2 to Router1 (192.168.2.254 --> 192.168.1.254) command 'show crypto ipsec sa' show me

pkts encaps: 4

pkts decaps: 4

pkts encrypt: 4

pkts decrypt: 4

pkts digest: 0

pkts verify: 0

shouldnt be digest and verify 4 too ? Where could be a problem ?

Here is my network diagram

mapka2.png

Here is result of extended ping

pingsec.png

Here is behaviour if i ping from LAN1-PC2 to LAN2-PC3 (there should be an IPSEC protocol instead of ICMP right ?)

ping.png

My packet tracer .pkt is attached here or it can be downloaded at

http://php-testing.wz.cz/vpn_ipsec_site-to-site.pkt

Example of configuration steps at Router2

Router>en

Router#config t

Router(config)#hostname R2

R2(config)#int f0/1

R2(config-if)#ip address 192.168.2.254 255.255.255.0

R1(config-if)#no shut

R2(config-if)#int f0/0

R2(config-if)#no shut

R2(config-if)#ip address 23.45.67.2 255.255.255.252

R2(config-if)#ip route 0.0.0.0 0.0.0.0 23.45.67.1

R2(config)#do ping 12.34.56.2 //mely by jsme PINGnout R1

R2(config)#crypto isakmp policy 1

R2(config-isakmp)#authentication pre-share

R2(config-isakmp)#encryption aes

R2(config-isakmp)#hash sha

R2(config-isakmp)#group 5

R2(config-isakmp)#crypto isakmp key t4jneheslo address 12.34.56.2

R2(config)#crypto ipsec transform-set esp-aes-sha esp-aes esp-sha-hmac

R2(config)#access-list 101 permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255

R2(config)#crypto map vpn 10 ipsec-isakmp

R2(config-crypto-map)#match address 101

R2(config-crypto-map)#set transform-set esp-aes-sha

R2(config-crypto-map)#set peer 12.34.56.2

R2(config-crypto-map)#exit

R2(config)#int fa0/0

R2(config-if)#crypto map vpn

-----------------------------------------------------------------------------------------------------------------------

Please help me, if you will need more informations i will give it to you and this is important to me but im not so good in networking.

thank you

Muflix

5 Replies 5

Dear Muflix,

The tunnel is up and I can see encaps and decaps.

I would recommend try this on real equipment or even on GNS3 if you want to see it fully working, PKT is a powerful tool but it is kind of limited on some functions.

I hope it helps.

Thanks.

If the config shown is really the one that was used for the output, then you should see also the same amount of packets with digest and verify. Your transform-set has an encryption-transform and an authentication-transform so you really should see sem. The digest/verify should only be "0" if no authentication-transform is used. But that's not a best practice although there are many examples from Cisco configuring it that way.

I totally agree with you Karsten

muflixcek
Level 1
Level 1

Thank you for answers, im going to italy but then i will try it in GNS3 and check it with wireshark what is real traffic. But im glad config seems ok to you :-)

Thanks for the heads up!

I hope you have a nice trip! Take care

Please rate any post you find helpful

Sent from Cisco Technical Support Android App