2 Routers s2s vpn

Hi,
I'm watching Jeremy's CCNA Sec nuggets and there's an implementing s2s vpn through cli section. I've redone it for like 3 times now and still couldn't get it to work, I cannot ping the other router. Help is appreciated, here are my confs:
Router 1
[HTML] Test5#sh run
Building configuration...
Current configuration : 1207 bytes
!
version 12.4
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Test5
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 25
!
!
ip cef
!
!
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto isakmp policy 60
encr aes
authentication pre-share
group 2
crypto isakmp key cbt address 192.168.1.1
!
!
crypto ipsec transform-set jeremy esp-aes esp-sha-hmac
!
crypto map s2s-vpn 100 ipsec-isakmp
set peer 192.168.1.1
set transform-set jeremy
match address 100
!
!
!
!
interface Loopback0
ip address 10.0.2.250 255.255.255.0
shutdown
!
interface FastEthernet2/0
ip address 192.168.5.1 255.255.255.0
speed 100
full-duplex
crypto map s2s-vpn
!
interface FastEthernet2/1
ip address 192.168.9.1 255.255.255.0
duplex full
speed 100
!
router eigrp 80
network 10.0.0.0
no auto-summary
!
ip http server
no ip http secure-server
!
ip forward-protocol nd
!
!
access-list 100 permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255
!
!
!
control-plane
!
!
!
!
!
!
!
dial-peer cor custom
!
!
!
!
!
line con 0
logging synchronous
line aux 0
line vty 0 4
login
!
!
end[/HTML]Router2
[HTML]
outer(config)#do sh run
Building configuration...
Current configuration : 994 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
no network-clock-participate slot 1
no network-clock-participate wic 0
no aaa new-model
ip subnet-zero
ip cef
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto isakmp policy 10
encr aes
authentication pre-share
group 2
crypto isakmp key cbt address 192.168.5.1
!
!
crypto ipsec transform-set jeremy esp-aes esp-sha-hmac
!
crypto map s2s-vpn 100 ipsec-isakmp
set peer 192.168.5.1
set transform-set jeremy
match address 100
!
!
!
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex full
speed 100
crypto map s2s-vpn
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
no ip http server
no ip http secure-server
ip classless
!
!
access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255
!
!
!
!
!
!
!
!
line con 0
line aux 0
line vty 0 4
!
!
end
[/HTML]
I'm watching Jeremy's CCNA Sec nuggets and there's an implementing s2s vpn through cli section. I've redone it for like 3 times now and still couldn't get it to work, I cannot ping the other router. Help is appreciated, here are my confs:
Router 1
[HTML] Test5#sh run
Building configuration...
Current configuration : 1207 bytes
!
version 12.4
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Test5
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 25
!
!
ip cef
!
!
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto isakmp policy 60
encr aes
authentication pre-share
group 2
crypto isakmp key cbt address 192.168.1.1
!
!
crypto ipsec transform-set jeremy esp-aes esp-sha-hmac
!
crypto map s2s-vpn 100 ipsec-isakmp
set peer 192.168.1.1
set transform-set jeremy
match address 100
!
!
!
!
interface Loopback0
ip address 10.0.2.250 255.255.255.0
shutdown
!
interface FastEthernet2/0
ip address 192.168.5.1 255.255.255.0
speed 100
full-duplex
crypto map s2s-vpn
!
interface FastEthernet2/1
ip address 192.168.9.1 255.255.255.0
duplex full
speed 100
!
router eigrp 80
network 10.0.0.0
no auto-summary
!
ip http server
no ip http secure-server
!
ip forward-protocol nd
!
!
access-list 100 permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255
!
!
!
control-plane
!
!
!
!
!
!
!
dial-peer cor custom
!
!
!
!
!
line con 0
logging synchronous
line aux 0
line vty 0 4
login
!
!
end[/HTML]Router2
[HTML]
outer(config)#do sh run
Building configuration...
Current configuration : 994 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
no network-clock-participate slot 1
no network-clock-participate wic 0
no aaa new-model
ip subnet-zero
ip cef
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto isakmp policy 10
encr aes
authentication pre-share
group 2
crypto isakmp key cbt address 192.168.5.1
!
!
crypto ipsec transform-set jeremy esp-aes esp-sha-hmac
!
crypto map s2s-vpn 100 ipsec-isakmp
set peer 192.168.5.1
set transform-set jeremy
match address 100
!
!
!
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex full
speed 100
crypto map s2s-vpn
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
no ip http server
no ip http secure-server
ip classless
!
!
access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255
!
!
!
!
!
!
!
!
line con 0
line aux 0
line vty 0 4
!
!
end
[/HTML]
Comments
The interface on router 2 is shutdown. Also, router 2 doesn't have an access-list configured designating the traffic to bring up the vpn. HTH.
-Peanut
-Mayor Cory Booker
Thanks I realized the interface was done before you posted
crypto isakmp enable
I haven't configured a site-to-site vpn in awhile... I'm trying to think of other items. Everything appears to be right since you have identical configs (with the "mirrored" access-lists). Have you enabled debugging on the IKE Phase 1? Are you generating traffic from clients within the specified subnets? HTH.
-Peanut
-Mayor Cory Booker
I'll load up gns3 and plug in your configs and see what I can figure out.
Current goal: Dunno
Yes, enabling isakmp was my first commands. I've connected the routers together with a crossover cable and tried to ping the other one, or set one of them as my default GW and ping the other router but no luck.
Ákos
Current goal: Dunno
Ok so I believe here comes the missunderstanding from my part. Do you actually need a cloud or something between the 2 devices? Can't you just put up an ipsec tunnel between the 2 routers via crossover cable?
access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255
Onto router 1 and
access-list 100 permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255
On to router 2. In my experience, I've always needed an access list for both directions on each router, so you pretty much end up with the same ACL on each.
CCIE Progress - Hours reading - 15, hours labbing - 1
They are newly set up routers, didn't try it. Both interfaces are in up up.
Do I need actually something between the 2 routers for the ipsec tunnel? Or a normal Crossover cable can do the job?
I think you probably could, except your interfaces aren't in the same subnet?
Current goal: Dunno
Yes they aren't but I thought that the ipsec will do the routing between the subnets. So I'm really courius now that what do I have to place between the 2 routers or how to configure them to get it work.
A
It looks like you're confusing what is being encrypted, thinking you'll encrypt 1.0 and 5.0, but what's really going to happen would be you're encrypting data coming in from other networks, through the endpoint routers, and encrypted before being sent out (normal IP routing) your 1.0/5.0 link.
... I'm not sure if I explain it well. It makes sense in my head.....
Current goal: Dunno
thanks
I'll try to set up one of my routers as a GW and ping the other side with the modification that you guys told me that should be enough for ip connectivity, I hope it will work
Secondly: R1 and R4 are computers here. They just LOOK like routers (I can't get QEMU to work, so I use routers as endpoint devices).
R2 and R3 are going to create a VPN tunnel for traffic going between the 192.168.1.0 and 192.168.3.0 networks. I still need normal IP connectivity from end-to-end though.
Here's the running-config from R2 and R3. R1 and R4 have no config other than ip addresses on the appropriate interface, and a default route.
R2
and R3
Verified with debug crypto ipsec
Current goal: Dunno
Thanks again for your help
Á
Current goal: Dunno
Wait, you're saying 192.168.2.1/24 and 192.168.2.2/24 are not in the same subnet?
If you look at the configs in the OP he is using 192.168.5.1/24 on one side and 192.168.1.1/24 on the other for the link between the routers.
Ah, I was looking at reply #17 which seems to be correct as far as the subnet between R2 and R3.
I also noticed that he doesnt have any routes configured, is this not necessary in a s2s vpn?
You would need some sort of route to get to the peer address. Which in this case happens to be a directly connected address so there is no need to add a route manually.
Gotcha. I'm studying with the same cbt as him and ironically I'm doing both the vpn videos tonight.
From network A, I have the router set to 10.23.1.150 for 0/0, and a static IP from our ISP for 0/1.
On Network B I have the router set to 192.168.1.1 for 0/0, and 0/1 has a static IP from our ISP.
If I am working on Network A and want to send data over the VPN, do I send it to 10.23.1.150 ? The main Gateway is another router with an address of 10.23.1.1
Thanks for the help.
Bill