Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 349
  • Last Modified:

VPN

i have a router 1841. i have configured it for site to site connection with an ASA 5510, the configuration is working perfectly. Next i configured the router for VPN remote connection and it worked but it stopped the site to site connection.

my problem was that i configured both with the same NAME of crypto map but with different sequences and different encryption too.

I changed the name of the crypto map for the site to site and it worked again but the VPN remote connection is not working.

Is there a solution for my problem, having one internet connection and one router???
0
outlaw17
Asked:
outlaw17
  • 4
  • 4
1 Solution
 
JFrederick29Commented:
You need to use the same crypto map name but the key is the remote access VPN sequence number be higher than the site to site.  Good practice is to use 65535 for the remote access VPN sequence number.
0
 
outlaw17Author Commented:
here's the following config. The VPN sequence number is higher than the site to site and i used the 65535 for the remote access VPN

crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 5
!
crypto isakmp policy 20
 encr 3des
 authentication pre-share
 group 2
crypto isakmp key vpnkey address xxx.xxx.xxx.xx
!
crypto isakmp client configuration group VPN
 key vpnkey
 dns xxx.xxx.xxx.xx
 pool vpnpool
 acl vpn-split-tunnel
 netmask 255.255.255.0
!
crypto ipsec security-association lifetime seconds 1800
!
crypto ipsec transform-set set-60 esp-aes 256 esp-sha-hmac
crypto ipsec transform-set set-10 esp-3des esp-sha-hmac
!
crypto dynamic-map dynmap 1
 set transform-set set-10
!
!
crypto map vpn client authentication list vpn-authentication
crypto map vpn isakmp authorization list vpn-authorization
crypto map vpn client configuration address respond
crypto map vpn 10 ipsec-isakmp
 set peer xxx.xxx.xxx.xx
 set transform-set set-60
 match address 170
crypto map vpn 65535 ipsec-isakmp dynamic dynmap
0
 
JFrederick29Commented:
Looks good.  Can you post access-list 170 and the vpn-split-tunnel access-list.
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
outlaw17Author Commented:
ip access-list extended vpn-split-tunnel
 permit ip 195.125.1.0 0.0.0.255 195.125.10.0 0.0.0.255
!
access-list 170 permit ip 195.125.1.0 0.0.0.255 195.125.50.0 0.0.0.255
access-list 170 permit ip 195.125.1.0 0.0.0.255 195.125.51.0 0.0.0.255
access-list 170 permit ip 195.125.1.0 0.0.0.255 195.125.52.0 0.0.0.255
access-list 170 permit ip 195.125.1.0 0.0.0.255 195.125.53.0 0.0.0.255
access-list 170 permit ip 195.125.1.0 0.0.0.255 195.125.54.0 0.0.0.255
access-list 170 permit ip 195.125.1.0 0.0.0.255 195.125.55.0 0.0.0.255
access-list 170 permit ip 195.125.1.0 0.0.0.255 195.125.56.0 0.0.0.255

ip local pool vpnpool 195.125.10.1 195.125.10.15

these are not public, just private used inside the network
0
 
JFrederick29Commented:
Looks good also.   So with this config, what doesn't work?
0
 
outlaw17Author Commented:
with this config, the site to site stops from working. Maybe from this access-list???

access-list 180 deny   ip 195.125.1.0 0.0.0.255 195.125.10.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 195.125.50.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 195.125.51.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 195.125.52.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 195.125.53.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 195.125.54.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 195.125.55.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 195.125.56.0 0.0.0.255

ip nat inside source list 180 interface FastEthernet0/1 overload
0
 
JFrederick29Commented:
That's the problem, it should be this:

access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.10.0 0.0.0.255
access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.50.0 0.0.0.255
access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.51.0 0.0.0.255
access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.52.0 0.0.0.255
access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.53.0 0.0.0.255
access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.54.0 0.0.0.255
access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.55.0 0.0.0.255
access-list 180 deny ip 195.125.1.0 0.0.0.255 195.125.56.0 0.0.0.255
access-list 180 permit ip 195.125.1.0 0.0.0.255 any
0
 
outlaw17Author Commented:
hi JFrederick, i did what u told me but still didn't work. the problem was with the username and password. The site-to-site was not working coz of it. i created isakmp profile for site-to-site and vpn client so that the site-to-site wouldn't use the username and password and it worked very well. Thank you anyway.

0

Featured Post

Ask an Anonymous Question!

Don't feel intimidated by what you don't know. Ask your question anonymously. It's easy! Learn more and upgrade.

  • 4
  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now