I have a config file that I have been working on for the past few days. The internal network seems to be fine but whenever I try to go outside the network, it doesn't seem to route. Can someone tell me what I may be missing? I am still new to Cisco routers (I am replacing my PIX 501 which is working) and would like to get this working. The 192.168.0.0 network is the outside network. This 2621 router is connected to a switch which is also connected to a Linksys router (on the cable modem side). I also have the internal network, 10.99.99.0 that is connected to a Cisco 4006 switch. I can ping the outside from the router interface but I cannot ping from a computer attached to the 10.x network. When I perform a trace route, it stops on the 10.x network. What am I missing?
Also, is there any VPN clients that will work with the Cisco routers and Windows Vista 64bit? I have tried NCP but it doesn't look like it has supported Cisco encryption. Thanks in advance. The following is my config:
- Shawn
!
version 12.2
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname RID_R1
!
aaa new-model
!
!
aaa authentication login userauthen local
aaa authorization network netauth local
aaa session-id common
enable password 7 XXXXXXXXXXXXXXXX
!
username XXXXXXXXX privilege 15 secret 5 XXXXXXXXXXXXXXXXXXXXXXXXX
ip subnet-zero
ip cef
!
!
no ip domain lookup
!
ip dhcp excluded-address 10.99.99.200 10.99.99.255
!
ip dhcp pool 1
network 10.99.99.0 255.255.255.0
default-router 10.99.99.1
dns-server 204.186.0.201 207.44.96.129
!
ip audit notify log
ip audit po max-events 100
!
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
crypto isakmp keepalive 40 5
!
crypto isakmp client configuration group XXXXXXXXXX
key XXXXXXXXXXXXXXX
pool vpn_pool_1
acl 120
!
!
crypto ipsec transform-set esp-3des-sha esp-des esp-sha-hmac
!
crypto dynamic-map vpn_dynmap_1 1
set transform-set esp-3des-sha
reverse-route
!
!
crypto map vpn_cmap client authentication list userauthen
crypto map vpn_cmap isakmp authorization list netauth
crypto map vpn_cmap client configuration address respond
!
crypto map vpn_dynmap_1 65535 ipsec-isakmp dynamic vpn_dynmap_1
!
!
!
voice call carrier capacity active
!
!
!
!
!
!
!
!
!
mta receive maximum-recipients 0
!
!
!
!
interface FastEthernet0/0
description connected to outside Router
ip address 192.168.0.5 255.255.255.0
ip nat outside
speed auto
full-duplex
!
interface Serial0/0
no ip address
no ip mroute-cache
shutdown
!
interface FastEthernet0/1
description connected to EthernetLAN
ip address 10.99.99.1 255.255.255.0
duplex auto
speed auto
!
ip local pool default 10.99.99.25 10.99.99.125
ip local pool vpn_pool_1 10.99.99.220 10.99.99.225
!
ip nat inside source route-map vpn_routemap_1 interface FastEthernet0/0 overload
ip classless
!
!
ip route 0.0.0.0 0.0.0.0 192.168.0.1
ip route 10.99.99.0 255.255.255.0 FastEthernet0/1 permanent
ip route 192.168.0.0 255.255.255.0 FastEthernet0/0 permanent
ip http server
ip pim bidir-enable
!
!
access-list 101 permit ip any any
!
route-map vpn_routemap_1 permit 1
match ip address 101
!
!
!
call rsvp-sync
!
!
mgcp profile default
!
dial-peer cor custom
!
!
!
!
!
line con 0
exec-timeout 0 0
password 7 XXXXXXXXXXXXXXXXXXXXXXXXXXXX
line aux 0
line vty 0 4
password 7 XXXXXXXXXXXXXXXXXXXXXXXXXXXXX
!
!
end
Also, is there any VPN clients that will work with the Cisco routers and Windows Vista 64bit? I have tried NCP but it doesn't look like it has supported Cisco encryption. Thanks in advance. The following is my config:
- Shawn
!
version 12.2
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname RID_R1
!
aaa new-model
!
!
aaa authentication login userauthen local
aaa authorization network netauth local
aaa session-id common
enable password 7 XXXXXXXXXXXXXXXX
!
username XXXXXXXXX privilege 15 secret 5 XXXXXXXXXXXXXXXXXXXXXXXXX
ip subnet-zero
ip cef
!
!
no ip domain lookup
!
ip dhcp excluded-address 10.99.99.200 10.99.99.255
!
ip dhcp pool 1
network 10.99.99.0 255.255.255.0
default-router 10.99.99.1
dns-server 204.186.0.201 207.44.96.129
!
ip audit notify log
ip audit po max-events 100
!
crypto isakmp policy 1
hash md5
authentication pre-share
group 2
crypto isakmp keepalive 40 5
!
crypto isakmp client configuration group XXXXXXXXXX
key XXXXXXXXXXXXXXX
pool vpn_pool_1
acl 120
!
!
crypto ipsec transform-set esp-3des-sha esp-des esp-sha-hmac
!
crypto dynamic-map vpn_dynmap_1 1
set transform-set esp-3des-sha
reverse-route
!
!
crypto map vpn_cmap client authentication list userauthen
crypto map vpn_cmap isakmp authorization list netauth
crypto map vpn_cmap client configuration address respond
!
crypto map vpn_dynmap_1 65535 ipsec-isakmp dynamic vpn_dynmap_1
!
!
!
voice call carrier capacity active
!
!
!
!
!
!
!
!
!
mta receive maximum-recipients 0
!
!
!
!
interface FastEthernet0/0
description connected to outside Router
ip address 192.168.0.5 255.255.255.0
ip nat outside
speed auto
full-duplex
!
interface Serial0/0
no ip address
no ip mroute-cache
shutdown
!
interface FastEthernet0/1
description connected to EthernetLAN
ip address 10.99.99.1 255.255.255.0
duplex auto
speed auto
!
ip local pool default 10.99.99.25 10.99.99.125
ip local pool vpn_pool_1 10.99.99.220 10.99.99.225
!
ip nat inside source route-map vpn_routemap_1 interface FastEthernet0/0 overload
ip classless
!
!
ip route 0.0.0.0 0.0.0.0 192.168.0.1
ip route 10.99.99.0 255.255.255.0 FastEthernet0/1 permanent
ip route 192.168.0.0 255.255.255.0 FastEthernet0/0 permanent
ip http server
ip pim bidir-enable
!
!
access-list 101 permit ip any any
!
route-map vpn_routemap_1 permit 1
match ip address 101
!
!
!
call rsvp-sync
!
!
mgcp profile default
!
dial-peer cor custom
!
!
!
!
!
line con 0
exec-timeout 0 0
password 7 XXXXXXXXXXXXXXXXXXXXXXXXXXXX
line aux 0
line vty 0 4
password 7 XXXXXXXXXXXXXXXXXXXXXXXXXXXXX
!
!
end