creeping666
Technical User
I am trying to setup a GRE IPSec tunnel between two sites.
Note. WAN IP are made up. hense the 259....
Site 1
======
cisco 877 with Advanced IP Services
VLAN1=172.16.0.0 / 16
Site 2
======
cisco 877 with Advanced IP Services
VLAN1=192.168.30.0 / 24
The VPN LED on the 877's light up after I enter the below configuration, but I can not access anything through the tunnel.
Any ideas on what I am doing wrong?
I am using the cisco based firewall, would that be stopping my pings etc from working? If so, would I only need to setup a zone pairs between:
VLAN1 -> GRE-TUNNEL and GRE-TUNNEL -> VLAN1?
Which I think I have tried already with no luck. Thought I might be able to troubleshoot it without adding the zone commands.
Thanks.
Site 1 config.
Site 2 config.
Note. WAN IP are made up. hense the 259....
Site 1
======
cisco 877 with Advanced IP Services
VLAN1=172.16.0.0 / 16
Site 2
======
cisco 877 with Advanced IP Services
VLAN1=192.168.30.0 / 24
The VPN LED on the 877's light up after I enter the below configuration, but I can not access anything through the tunnel.
Any ideas on what I am doing wrong?
I am using the cisco based firewall, would that be stopping my pings etc from working? If so, would I only need to setup a zone pairs between:
VLAN1 -> GRE-TUNNEL and GRE-TUNNEL -> VLAN1?
Which I think I have tried already with no luck. Thought I might be able to troubleshoot it without adding the zone commands.
Thanks.
Site 1 config.
Code:
access-list 120 permit gre host 198.90.45.16 host 259.39.102.19
!
crypto map VPN-GRE 1 ipsec-isakmp
set transform-set AES-SHA
set peer 259.39.102.19
match address 120
exit
!
interface Dialer0
crypto map VPN-GRE
exit
!
interface Tunnel0
exit
!
default interface Tunnel0
!
interface Tunnel0
ip mtu 1420
no shutdown
ip address 10.1.1.1 255.255.255.0
crypto map VPN-GRE
tunnel source Dialer0
tunnel destination 259.39.602.739
exit
!
router rip
version 2
no auto-summary
network 172.16.0.0
network 10.0.0.0
exit
!
crypto isakmp key ^&9036gre4327!# address 259.39.102.19
!
ip access-list extended NAT
deny ip 172.16.0.0 0.0.255.255 192.168.30.0 0.0.0.255
permit ip 172.16.0.0 0.0.255.255 any
!
ip nat inside source list NAT interface Dialer0 overload
Site 2 config.
Code:
access-list 120 permit gre host 259.39.102.19 host 198.90.45.16
!
crypto map VPN-GRE 1 ipsec-isakmp
set transform-set AES-SHA
set peer 198.90.45.16
match address 120
exit
!
interface Dialer0
crypto map VPN-GRE
exit
!
interface Tunnel0
exit
!
default interface Tunnel0
!
interface Tunnel0
ip mtu 1420
no shutdown
ip address 10.1.1.2 255.255.255.0
crypto map VPN-GRE
tunnel source Dialer0
tunnel destination 198.90.45.16
exit
!
router rip
version 2
no auto-summary
network 192.168.30.0
network 10.0.0.0
exit
!
crypto isakmp key ^&9036gre4327!# address 198.90.45.16
!
!
ip access-list extended NAT
deny ip 192.168.30.0 0.0.0.255 172.16.0.0 0.0.255.255
permit ip 192.168.30.0 0.0.0.255 any
!
ip nat inside source list NAT interface Dialer0 overload