VPN Client non fa route su tunnel !! ??

Virtual private networks e affini

Moderatore: Federico.Lagni

Rispondi
Avatar utente
spooke
Cisco enlightened user
Messaggi: 136
Iscritto il: sab 05 mar , 2005 10:18 pm
Località: Milano
Contatta:

Ciao a tutti, come da oggetto non risco a capire perche se mi collego tramite vpn il client vpn non risce a vedere la classe 10.0.15.0 255.255.255.192 che sta dietro all'interfaccia tunnel0

Idee??

Using 3144 out of 196600 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname IRV-CentroStella
!
boot-start-marker
boot-end-marker
!
logging buffered 51200 warnings
enable secret 5 $1$gkwK$zwwt1no99VqXi.jPBZhFq0
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 10.0.11.1 10.0.11.10
!
ip dhcp pool IRV-CentroStella
import all
network 10.0.11.0 255.255.255.192
dns-server 151.99.125.1 151.99.125.2
default-router 10.0.11.1
lease infinite
!
!
ip ips name IRV-IntrusionPreventionSystem
ip domain name irv.it
ip name-server 151.99.125.1
ip name-server 151.99.125.2
vpdn enable
!
vpdn-group 1
! Default PPTP VPDN group
accept-dialin
protocol pptp
virtual-template 1
!
!
!
!
crypto pki trustpoint TP-self-signed-2778651510
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2778651510
revocation-check none
rsakeypair TP-self-signed-2778651510
!
!
crypto pki certificate chain TP-self-signed-2778651510
certificate self-signed 01 nvram:IOS-Self-Sig#3004.cer
username spooke privilege 15 secret 5 $1$OKT/$puqJO4PArrIJzXCUShS0C1
username mario password 7 03105E1812
username vpnirv password 7 044D1B0806335A
username raffaele privilege 15 secret 5 $1$LJ4L$tnE2Qrsjtm92edILTDwjw.
!
!
!
!
!
interface Tunnel0
description Tunnel Verso IRV-Rossano
ip address 172.16.11.1 255.255.255.0
tunnel source 82.185.XXX.XX
tunnel destination 82.189.XXX.XXX
!
interface FastEthernet0/0
description Zona-Trusted
ip address 10.0.11.1 255.255.255.192
ip nat inside
ip virtual-reassembly
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface ATM0/0/0
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0/0/0.1 point-to-point
description ConnessioneADSL
ip address 82.185.XXX.XX 255.255.255.248 secondary
ip address 88.33.XXX.XX 255.255.255.252
ip access-group 102 in
ip ips IRV-IntrusionPreventionSystem in
ip nat outside
ip virtual-reassembly
pvc 8/35
!
!
interface Virtual-Template1
ip unnumbered ATM0/0/0.1
peer default ip address pool UserIP
no keepalive
ppp encrypt mppe auto
ppp authentication pap chap s-chap
!
ip local pool UserIP 172.16.1.1 172.16.1.250
ip classless
ip route 0.0.0.0 0.0.0.0 ATM0/0/0.1
ip route 10.0.15.0 255.255.255.192 Tunnel0
!
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 5 life 86400 requests 10000
ip nat inside source list 1 interface ATM0/0/0.1 overload
!
access-list 1 permit 10.0.0.0 0.0.0.255
access-list 1 permit 10.0.11.0 0.0.0.255
access-list 1 permit 10.0.15.0 0.0.0.255
access-list 1 permit 172.16.1.0 0.0.0.255
!
!
control-plane
!
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
login local
line aux 0
line vty 0 4
privilege level 15
login local
transport input telnet ssh
line vty 5 15
privilege level 15
login local
transport input telnet ssh
!
end
Avatar utente
spooke
Cisco enlightened user
Messaggi: 136
Iscritto il: sab 05 mar , 2005 10:18 pm
Località: Milano
Contatta:

risolto!
mancava solo una reverse route al pool di indirizzi assegnati ai client vpn sul router remoto
Rispondi