2020mobile
Technical User
Hi guys,
I have setup 2 remote sites to ipsec site-to-site vpn back to the UK central hub.
Remote site 1 - PIX515E 10.32.0.0/24
Remote site 2 - C1801/k9 10.32.4.0/24
UK - Cisco ASA5510 10.20.0.0/16 - 10.25.0.0/16 and 10.250.0.0/16
Both work fine but now I need to setup a vpn between the 2 remote sites. The VPN is showing as up but I dont know where to add access-lists to let the traffic know which tunnel to go out of or straight onto the internet. With regards to the 1800 series I thought i need to add an access-group to FE0 which is the connection to the internet and create a new ACL?
config for 1801 is attached.
Changes on Cisco 1801 i've made:
1. Created new crypto policy sequence number
crypto isakmp policy 2
encr aes 256
authentication pre-share
group 5
crypto isakmp key xxxx address 213.42.89.2
2. Created new transform set
crypto ipsec transform-set ESP-AES128-SHA esp-aes esp-sha-hmac
3. Created new crypto map
crypto map Dubtower 2 ipsec-isakmp
description Tunnel to Dafza site
set peer 213.42.89.2
set transform-set ESP-AES128-SHA
match address 150
4. Denied it from Nat
ip access-list extended 140
100 deny ip 10.32.4.0 0.0.0.255 10.32.0.0 0.0.0.255
5. created new ACL for new crypto map
access-list 150 remark Dafza Office to Arenco Tower
access-list 150 remark IPSec Rule
access-list 150 permit ip 10.32.4.0 0.0.0.255 10.32.0.0 0.0.0.255
6. from here do I create a new ACL for traffic to know which vpn tunnel to go down? i.e.
access-list 160 remark IPSec Rule
access-list 160 remark Interesting VPN Traffic
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.20.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.21.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.22.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.25.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.60.0.0 0.0.0.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.61.0.0 0.0.0.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.99.1.0 0.0.0.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.250.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.250.11.0 0.0.0.255
access-list 160 permit udp host 212.140.247.20 any eq non500-isakmp
access-list 160 permit udp host 212.140.247.20 any eq isakmp
access-list 160 permit esp host 212.140.247.20 any
access-list 160 permit ahp host 212.140.247.20 any
access-list 160 remark IPSec Rule
access-list 160 permit ip 10.32.2.0 0.0.0.255 10.32.4.0 0.0.0.255
access-list 160 permit udp host 213.42.89.2 any eq non500-isakmp
access-list 160 permit udp host 213.42.89.2 any eq isakmp
access-list 160 permit esp host 213.42.89.2 any
access-list 160 permit ahp host 213.42.89.2 any
Then add access-group to FE 0? To permit ACL 160 or use an existing ACL?
Can anyone assist i'm totally stuck. I applied the above but didnt work and stopped internet access so removed acl from interface to start again.
I've also attached the config for PIX end which used to use just the implicit outbound any any rule.
I have setup 2 remote sites to ipsec site-to-site vpn back to the UK central hub.
Remote site 1 - PIX515E 10.32.0.0/24
Remote site 2 - C1801/k9 10.32.4.0/24
UK - Cisco ASA5510 10.20.0.0/16 - 10.25.0.0/16 and 10.250.0.0/16
Both work fine but now I need to setup a vpn between the 2 remote sites. The VPN is showing as up but I dont know where to add access-lists to let the traffic know which tunnel to go out of or straight onto the internet. With regards to the 1800 series I thought i need to add an access-group to FE0 which is the connection to the internet and create a new ACL?
config for 1801 is attached.
Changes on Cisco 1801 i've made:
1. Created new crypto policy sequence number
crypto isakmp policy 2
encr aes 256
authentication pre-share
group 5
crypto isakmp key xxxx address 213.42.89.2
2. Created new transform set
crypto ipsec transform-set ESP-AES128-SHA esp-aes esp-sha-hmac
3. Created new crypto map
crypto map Dubtower 2 ipsec-isakmp
description Tunnel to Dafza site
set peer 213.42.89.2
set transform-set ESP-AES128-SHA
match address 150
4. Denied it from Nat
ip access-list extended 140
100 deny ip 10.32.4.0 0.0.0.255 10.32.0.0 0.0.0.255
5. created new ACL for new crypto map
access-list 150 remark Dafza Office to Arenco Tower
access-list 150 remark IPSec Rule
access-list 150 permit ip 10.32.4.0 0.0.0.255 10.32.0.0 0.0.0.255
6. from here do I create a new ACL for traffic to know which vpn tunnel to go down? i.e.
access-list 160 remark IPSec Rule
access-list 160 remark Interesting VPN Traffic
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.20.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.21.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.22.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.25.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.60.0.0 0.0.0.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.61.0.0 0.0.0.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.99.1.0 0.0.0.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.250.0.0 0.0.255.255
access-list 160 permit ip 10.32.4.0 0.0.0.255 10.250.11.0 0.0.0.255
access-list 160 permit udp host 212.140.247.20 any eq non500-isakmp
access-list 160 permit udp host 212.140.247.20 any eq isakmp
access-list 160 permit esp host 212.140.247.20 any
access-list 160 permit ahp host 212.140.247.20 any
access-list 160 remark IPSec Rule
access-list 160 permit ip 10.32.2.0 0.0.0.255 10.32.4.0 0.0.0.255
access-list 160 permit udp host 213.42.89.2 any eq non500-isakmp
access-list 160 permit udp host 213.42.89.2 any eq isakmp
access-list 160 permit esp host 213.42.89.2 any
access-list 160 permit ahp host 213.42.89.2 any
Then add access-group to FE 0? To permit ACL 160 or use an existing ACL?
Can anyone assist i'm totally stuck. I applied the above but didnt work and stopped internet access so removed acl from interface to start again.
I've also attached the config for PIX end which used to use just the implicit outbound any any rule.