Hello,
I was wondering if someone could clarify something for me?
We have a Cisco 1761 router acting as an IPSec VPN server to connect multiple remote users with Cisco VPN Client software
Someone else configured the router and I am trying to figure out why he has done certain things in the config...
I am ultimately trying to resolve a problem whereby two clients connected via IPSec cannot ping each other`s VPN pool addresses. This in turn is necessary in order to allow unicast VoIP traffic between two remote users.
The first confusion I have come across is with the ISAKMP client configuration group which defines the group settings required in the VPN Client setup. It includes the crypto isakmp command "acl 140" which references access-list 140 to define which traffic should be encrypted.... however the ACL is configured as follows:
access-list 140 permit ip 192.168.42.0 0.0.0.255 192.168.42.0 0.0.0.255
access-list 140 permit ip 192.168.51.0 0.0.0.255 192.168.51.0 0.0.0.255
access-list 140 permit ip 192.168.60.0 0.0.0.255 192.168.60.0 0.0.0.255
access-list 140 permit ip 192.168.50.0 0.0.0.255 192.168.50.0 0.0.0.255
192.168.42.0/24 is our LAN subnet
192.168.50.0/24 is the subnet from which VPN client addresses are assigned dynamically
192.168.60.0/24 is our DMZ subnet
192.168.51.0/24..... no idea!! except there is a loopback interface configured with 192.168.51.1 address and a route-map with a next-hop address of 192.168.51.2!
To me, this ACL does not make sense in terms of defining which source and destination network traffic needs to be encrypted. ie all traffic from 192.168.42.0 to 192.168.42.0 should be encrypted????
Can someone please confirm I am not going mad or that the CCNP BCRAN is not feeding me nonsense....!!!!
Any thoughts most welcome
Thank you
Jim
I was wondering if someone could clarify something for me?
We have a Cisco 1761 router acting as an IPSec VPN server to connect multiple remote users with Cisco VPN Client software
Someone else configured the router and I am trying to figure out why he has done certain things in the config...
I am ultimately trying to resolve a problem whereby two clients connected via IPSec cannot ping each other`s VPN pool addresses. This in turn is necessary in order to allow unicast VoIP traffic between two remote users.
The first confusion I have come across is with the ISAKMP client configuration group which defines the group settings required in the VPN Client setup. It includes the crypto isakmp command "acl 140" which references access-list 140 to define which traffic should be encrypted.... however the ACL is configured as follows:
access-list 140 permit ip 192.168.42.0 0.0.0.255 192.168.42.0 0.0.0.255
access-list 140 permit ip 192.168.51.0 0.0.0.255 192.168.51.0 0.0.0.255
access-list 140 permit ip 192.168.60.0 0.0.0.255 192.168.60.0 0.0.0.255
access-list 140 permit ip 192.168.50.0 0.0.0.255 192.168.50.0 0.0.0.255
192.168.42.0/24 is our LAN subnet
192.168.50.0/24 is the subnet from which VPN client addresses are assigned dynamically
192.168.60.0/24 is our DMZ subnet
192.168.51.0/24..... no idea!! except there is a loopback interface configured with 192.168.51.1 address and a route-map with a next-hop address of 192.168.51.2!
To me, this ACL does not make sense in terms of defining which source and destination network traffic needs to be encrypted. ie all traffic from 192.168.42.0 to 192.168.42.0 should be encrypted????
Can someone please confirm I am not going mad or that the CCNP BCRAN is not feeding me nonsense....!!!!
Any thoughts most welcome
Thank you
Jim