Problemi VPN
Inviato: mer 20 set , 2006 4:14 pm
Salve a tutti, di seguito posto le configurazioni di due router cisco 837. il problema sta nel fatto che, una volta configuarata la vpn nn riesco ad aprire il tunnel, la linea è una multigroup con 8 ip statici, aggiungo inoltre che uno dei due router ha gia una vpn lan-lan configurata e perfettamente funzionante con un terzo router piu' un accesso attraverso easy vpn.
ROUTER 1
ROUTER 2
il router 2 è stato configurato in modo da pubblicare uno degli ip pubblici forniti dato che ormai il ptp non è piu' pingabile, a differenza del router 1 configurato tempo prima. Io credo che il problema sia nel router 2.
grazie anticipatamente per il supporto.
ROUTER 1
Codice: Seleziona tutto
Building configuration...
Current configuration : 4137 bytes
!
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname _______
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable secret 5 grA2x.u3C$K6tn$af./MYYkvdUJ/$1
!
aaa new-model
!
!
aaa authentication login default local
aaa authentication login sdm_vpn_xauth_ml_1 local
aaa authorization exec default local
aaa authorization network sdm_vpn_group_ml_1 local
aaa session-id common
ip subnet-zero
!
!
ip name-server 194.243.154.62
ip ips po max-events 100
no ftp-server write-enable
!
!
username xxxxxxx password 0 yyyyyy
username zzzzzzzzz privilege 15 secret 5 CtGBK$KN5sbzJwsW41$w2WY$Ooeww/
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key 1111111 address 85.xxx.yyy.110 no-xauth
crypto isakmp key 2222222 address 85.zzz.www.169
crypto isakmp key 3333333 address 0.0.0.0 0.0.0.0
crypto isakmp xauth timeout 15
!
crypto isakmp client configuration group xxxxxxxxxxxx
key xxxxxxxxxxxx
pool SDM_POOL_1
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA2 esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA3 esp-3des esp-sha-hmac
!
crypto dynamic-map SDM_DYNMAP_1 2
set transform-set ESP-3DES-SHA
reverse-route
!
!
crypto map SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
crypto map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1
crypto map SDM_CMAP_1 client configuration address respond
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Tunnel to85.xxx.yyy.110
set peer 85.xxx.yyy.110
set transform-set ESP-3DES-SHA
match address 100
crypto map SDM_CMAP_1 10 ipsec-isakmp
description tunnel to 85.zzz.wwww.169
set peer 85.zzz.wwww.169
set transform-set ESP-3DES-SHA
match address 105
crypto map SDM_CMAP_1 65535 ipsec-isakmp dynamic SDM_DYNMAP_1
!
!
!
interface Ethernet0
ip address 192.168.0.110 255.255.255.0
ip nat inside
ip virtual-reassembly
no ip mroute-cache
hold-queue 100 out
!
interface ATM0
no ip address
atm vc-per-vp 64
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
ip address 82.aaa.bbb.158 255.255.255.252
ip nat outside
ip virtual-reassembly
crypto map SDM_CMAP_1
pvc 8/35
encapsulation aal5snap
!
!
interface FastEthernet1
no ip address
duplex auto
speed auto
!
interface FastEthernet2
no ip address
duplex auto
speed auto
!
interface FastEthernet3
no ip address
duplex auto
speed auto
!
interface FastEthernet4
no ip address
duplex auto
speed auto
!
ip local pool SDM_POOL_1 192.168.0.250 192.168.0.251
ip classless
ip route 0.0.0.0 0.0.0.0 ATM0.1
ip http server
no ip http secure-server
ip nat inside source route-map SDM_RMAP_1 interface ATM0.1 overload
!
!
access-list 100 remark SDM_ACL Category=4
access-list 100 remark IPSec Rule
access-list 100 permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 101 remark SDM_ACL Category=4
access-list 101 remark IPSec Rule
access-list 101 permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 102 remark SDM_ACL Category=18
access-list 102 deny ip any 192.168.0.250 0.0.0.1
access-list 102 remark IPSec Rule
access-list 102 deny ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 102 remark IPSec Rule
access-list 102 deny ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 102 deny ip 192.168.0.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 102 permit ip 192.168.0.0 0.0.0.255 any
access-list 103 remark SDM_ACL Category=4
access-list 103 remark IPSec Rule
access-list 103 permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 104 remark SDM_ACL Category=4
access-list 104 remark IPSec Rule
access-list 104 permit ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 105 permit ip 192.168.0.0 0.0.0.255 192.168.2.0 0.0.0.255
route-map SDM_RMAP_1 permit 1
match ip address 102
!
!
control-plane
!
!
line con 0
no modem enable
line aux 0
line vty 0 4
exec-timeout 120 0
length 0
!
scheduler max-task-time 5000
end
Codice: Seleziona tutto
Building configuration...
Current configuration : 2505 bytes
!
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname _______
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable secret 5 $1vDEDcs0Jya8$VpPL$TEv7uz6Ebg.
!
username ______ password 0 ---------
no aaa new-model
ip subnet-zero
!
!
ip name-server 194.243.154.62
ip audit notify log
ip audit po max-events 100
ip ssh break-string
no ftp-server write-enable
no scripting tcl init
no scripting tcl encdir
!
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key xxxxxxxxxxx address 82.xxx.yyy.158
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Tunnel to82.xxx.yyy.158
set peer 82.xxx.yyy.158
set transform-set ESP-3DES-SHA
match address 100
!
!
!
!
interface Ethernet0
ip address 192.168.2.110 255.255.255.0 secondary
ip address 85.zzz.www.169 255.255.255.248
ip nat inside
no ip mroute-cache
hold-queue 100 out
!
interface ATM0
no ip address
atm vc-per-vp 64
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
ip unnumbered Ethernet0
ip nat outside
pvc 8/35
encapsulation aal5snap
!
crypto map SDM_CMAP_1
!
interface FastEthernet1
no ip address
duplex auto
speed auto
!
interface FastEthernet2
no ip address
duplex auto
speed auto
!
interface FastEthernet3
no ip address
duplex auto
speed auto
!
interface FastEthernet4
no ip address
duplex auto
speed auto
!
ip nat inside source route-map SDM_RMAP_1 interface Ethernet0 overload
ip classless
ip route 0.0.0.0 0.0.0.0 ATM0.1
ip http server
no ip http secure-server
!
!
access-list 23 remark SDM_ACL Category=16
access-list 23 permit 85.zzz.www.168 0.0.0.7
access-list 100 remark SDM_ACL Category=4
access-list 100 remark IPSec Rule
access-list 100 permit ip 192.168.2.0 0.0.0.255 192.168.0.0 0.0.0.255
access-list 102 remark SDM_ACL Category=16
access-list 102 remark IPSec Rule
access-list 102 deny ip 192.168.2.0 0.0.0.255 192.168.0.0 0.0.0.255
access-list 102 permit ip 192.168.2.0 0.0.0.255 any
route-map SDM_RMAP_1 permit 1
match ip address 102
!
!
control-plane
!
!
line con 0
no modem enable
transport preferred all
transport output all
line aux 0
transport preferred all
transport output all
line vty 0 4
exec-timeout 120 0
password xxxxxxxxx
login
length 0
transport preferred all
transport input telnet
transport output all
!
scheduler max-task-time 5000
!
end
grazie anticipatamente per il supporto.