site to site tunnel

Hi

I have cisco 877.

I am building a vpn tunnel to a remote site with multiple subnets. I configured the VPN on SDM GUI and after looking at my config something does not look right..

I need access to the following remote subnets

10.124.0.0 255.252.0.0
10.128.0.0 255.248.0.0
192.168.251.0 255.255.255.0
192.168.147.224 255.255.255.224

I try to configure this in the GUI but I get the following code which doesnt look right ..

Can someone help?

ip access-list extended VPN
 remark SDM_ACL Category=4
 permit ip 0.0.0.0 255.255.255.0 0.4.0.0 255.248.0.0
 permit ip 0.0.0.0 255.255.255.0 0.0.0.0 255.248.0.0
 permit ip 0.0.0.0 255.255.255.0 0.0.0.0 255.255.255.0
 permit ip 0.0.0.0 255.255.255.0 0.0.0.0 255.255.255.224
!
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 10.135.196.0 0.0.0.255
access-list 100 remark SDM_ACL Category=2
access-list 100 deny   ip 0.0.0.0 255.255.255.0 0.0.0.0 255.255.255.224
access-list 100 deny   ip 0.0.0.0 255.255.255.0 0.0.0.0 255.255.255.0
access-list 100 deny   ip 0.0.0.0 255.255.255.0 0.0.0.0 255.248.0.0
access-list 100 deny   ip 0.0.0.0 255.255.255.0 0.4.0.0 255.248.0.0
access-list 100 permit ip 10.135.196.0 0.0.0.255 any
dialer-list 1 protocol ip permit
LVL 2
Dan560Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Ken BooneNetwork ConsultantCommented:
Yep.  So the thing is with cisco routers in most cases they want you to enter the inverse mask not the subnet mask with the network.

So in your access-list you want to reach 192.168.251.0 255.255.255.0:  The inverse mask of that is 0.0.0.255

That once is easy though.  Lets look 10.124.0.0 255.252.0.0
The inverse mask of that is 0.3.255.255

So you need to reverse your thinking and use the inverse mask .  It also referred to as the wildcard mask.

Here is a lnk where you can get the info you need for your subnets:
http://www.esubnet.net/inverse-mask.html
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Ernie BeekExpertCommented:
I think it should be something like:

ip access-list extended VPN
 remark SDM_ACL Category=4
 permit ip 10.135.196.0 0.0.0.255 10.124.0.0 0.3.255.255
 permit ip 10.135.196.0 0.0.0.255 10.128.0.0 0.7.255.255
 permit ip 10.135.196.0 0.0.0.255 192.168.251.0 0.0.0.255
 permit ip 10.135.196.0 0.0.0.255 192.168.147.224 0.0.0.31
!
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 10.135.196.0 0.0.0.255
access-list 100 remark SDM_ACL Category=2
access-list 100 deny   ip 10.135.196.0 0.0.0.255 10.124.0.0 0.3.255.255
access-list 100 deny   ip 10.135.196.0 0.0.0.255 10.128.0.0 0.7.255.255
access-list 100 deny   ip 10.135.196.0 0.0.0.255 192.168.251.0 0.0.0.255
access-list 100 deny   ip 10.135.196.0 0.0.0.255 192.168.147.224 0.0.0.31
access-list 100 permit ip 10.135.196.0 0.0.0.255 any
dialer-list 1 protocol ip permit
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Hardware Firewalls

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.