petrhofmann
IS-IT--Management
Hello,
I am really stuck with configuring ipsec site-to-site vpn (hub to spoke, multiple spokes) with cisco vpn client remote access to this vpn.
The problem is with remote acces - cisco vpn client acces - I can communicate with hub lan - but I need also communication to all spoke lans from the cisco
vpn client.
On the spokes there is no cisco hardware used - there are DLINK routers.
Somebody told me, it is possible to use NAT for translating remote access clients to HUB-lan-IP and so allow communication - but I am unable to configure it
and get it working.
Can somebody help me please ?
Thank you
Peter
SPOKES - not cisco devices / another vendor
HUB cisco 1841 hsec:
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key x address xx no-xauth
!
crypto isakmp client configuration group x
key x
pool vpnclientpool
acl 190
include-local-lan
!
crypto ipsec security-association lifetime seconds 86400
crypto ipsec transform-set 1cisco esp-3des esp-sha-hmac
!
crypto dynamic-map dynmap 10
set transform-set 1cisco
!
crypto map ETH0 client authentication list userauthen
crypto map ETH0 isakmp authorization list groupauthor
crypto map ETH0 client configuration address respond
crypto map ETH0 1 ipsec-isakmp
set peer x
set transform-set 1cisco
set pfs group2
match address 180
crypto map ETH0 10 ipsec-isakmp dynamic dynmap
!
!
interface FastEthernet0/1
description $ES_WAN$
crypto map ETH0
!
ip local pool vpnclientpool 192.168.200.100 192.168.200.150
!
!
ip nat inside source list LOCAL interface FastEthernet0/1 overload
!
ip access-list extended LOCAL
deny ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
deny ip 192.168.7.0 0.0.0.255 192.168.200.0 0.0.0.255
permit ip 192.168.7.0 0.0.0.255 any
!
access-list 180 permit ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 190 permit ip 192.168.7.0 0.0.0.255 192.168.200.0 0.0.0.255
!
I am really stuck with configuring ipsec site-to-site vpn (hub to spoke, multiple spokes) with cisco vpn client remote access to this vpn.
The problem is with remote acces - cisco vpn client acces - I can communicate with hub lan - but I need also communication to all spoke lans from the cisco
vpn client.
On the spokes there is no cisco hardware used - there are DLINK routers.
Somebody told me, it is possible to use NAT for translating remote access clients to HUB-lan-IP and so allow communication - but I am unable to configure it
and get it working.
Can somebody help me please ?
Thank you
Peter
SPOKES - not cisco devices / another vendor
HUB cisco 1841 hsec:
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key x address xx no-xauth
!
crypto isakmp client configuration group x
key x
pool vpnclientpool
acl 190
include-local-lan
!
crypto ipsec security-association lifetime seconds 86400
crypto ipsec transform-set 1cisco esp-3des esp-sha-hmac
!
crypto dynamic-map dynmap 10
set transform-set 1cisco
!
crypto map ETH0 client authentication list userauthen
crypto map ETH0 isakmp authorization list groupauthor
crypto map ETH0 client configuration address respond
crypto map ETH0 1 ipsec-isakmp
set peer x
set transform-set 1cisco
set pfs group2
match address 180
crypto map ETH0 10 ipsec-isakmp dynamic dynmap
!
!
interface FastEthernet0/1
description $ES_WAN$
crypto map ETH0
!
ip local pool vpnclientpool 192.168.200.100 192.168.200.150
!
!
ip nat inside source list LOCAL interface FastEthernet0/1 overload
!
ip access-list extended LOCAL
deny ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
deny ip 192.168.7.0 0.0.0.255 192.168.200.0 0.0.0.255
permit ip 192.168.7.0 0.0.0.255 any
!
access-list 180 permit ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 190 permit ip 192.168.7.0 0.0.0.255 192.168.200.0 0.0.0.255
!