peanutnoggin wrote: » A couple of things jumped out to me... The interface on router 2 is shutdown. Also, router 2 doesn't have an access-list configured designating the traffic to bring up the vpn. HTH. -Peanut
peanutnoggin wrote: » Have you enabled "isakmp"?crypto isakmp enable I haven't configured a site-to-site vpn in awhile... I'm trying to think of other items. Everything appears to be right since you have identical configs (with the "mirrored" access-lists). Have you enabled debugging on the IKE Phase 1? Are you generating traffic from clients within the specified subnets? HTH. -Peanut
bermovick wrote: » What's the topology like? What do you have between the 2?
mikej412 wrote: » Were the routers able to ping each other before you set up the tunnel?
Akiii wrote: » Do I need actually something between the 2 routers for the ipsec tunnel?
Akiii wrote: » Ok so I believe here comes the missunderstanding from my part. Do you actually need a cloud or something between the 2 devices? Can't you just put up an ipsec tunnel between the 2 routers via crossover cable?
bermovick wrote: » I think you probably could, except your interfaces aren't in the same subnet?
bermovick wrote: » You still need 'normal' IP connectivity between the 2 points. Most of my labs involve a router or 2 between the 2 endpoints, but I'd think the premise is the same if there's no physical devices between the 2. It looks like you're confusing what is being encrypted, thinking you'll encrypt 1.0 and 5.0, but what's really going to happen would be you're encrypting data coming in from other networks, through the endpoint routers, and encrypted before being sent out (normal IP routing) your 1.0/5.0 link. ... I'm not sure if I explain it well. It makes sense in my head.....
Building configuration... Current configuration : 1050 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R2 ! boot-start-marker boot-end-marker ! ! no aaa new-model ! resource policy ! memory-size iomem 5 ip cef ! ! ! ! ! ! ! ! ! ! ! crypto isakmp policy 1 encr aes hash md5 authentication pre-share group 5 lifetime 3600 crypto isakmp key woohoo address 192.168.2.2 ! ! crypto ipsec transform-set shorty esp-aes esp-md5-hmac ! crypto map R2_R3 100 ipsec-isakmp set peer 192.168.2.2 set transform-set shorty match address vpn_acl ! ! ! interface FastEthernet0/0 ip address 192.168.2.1 255.255.255.0 duplex auto speed auto crypto map R2_R3 ! interface FastEthernet0/1 ip address 192.168.1.1 255.255.255.0 duplex auto speed auto ! router eigrp 1 network 192.168.1.0 network 192.168.2.0 auto-summary ! ! ip http server no ip http secure-server ! ! ip access-list extended vpn_acl permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255 ! ! ! control-plane ! ! ! line con 0 line aux 0 line vty 0 4 ! ! end
Building configuration... Current configuration : 1050 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R3 ! boot-start-marker boot-end-marker ! ! no aaa new-model ! resource policy ! memory-size iomem 5 ip cef ! ! ! ! ! ! ! ! ! ! ! crypto isakmp policy 1 encr aes hash md5 authentication pre-share group 5 lifetime 3600 crypto isakmp key woohoo address 192.168.2.1 ! ! crypto ipsec transform-set shorty esp-aes esp-md5-hmac ! crypto map R3_R2 100 ipsec-isakmp set peer 192.168.2.1 set transform-set shorty match address vpn_acl ! ! ! interface FastEthernet0/0 ip address 192.168.2.2 255.255.255.0 duplex auto speed auto crypto map R3_R2 ! interface FastEthernet0/1 ip address 192.168.3.1 255.255.255.0 duplex auto speed auto ! router eigrp 1 network 192.168.2.0 network 192.168.3.0 auto-summary ! ! ip http server no ip http secure-server ! ip access-list extended vpn_acl permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255 ! ! ! control-plane ! ! ! line con 0 line aux 0 line vty 0 4 ! ! end
*Mar 1 02:08:33.735: IPSEC(sa_request): , (key eng. msg.) OUTBOUND local= 192.168.2.1, remote= 192.168.2.2, local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.3.0/255.255.255.0/0/0 (type=4), protocol= ESP, transform= esp-aes esp-md5-hmac (Tunnel), lifedur= 3600s and 4608000kb, spi= 0xFCAF55ED(4239349229), conn_id= 0, keysize= 128, flags= 0x400A *Mar 1 02:08:34.023: IPSEC(validate_proposal_request): proposal part #1, (key eng. msg.) INBOUND local= 192.168.2.1, remote= 192.168.2.2, local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.3.0/255.255.255.0/0/0 (type=4), protocol= ESP, transform= esp-aes esp-md5-hmac (Tunnel), lifedur= 0s and 0kb, spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x2 *Mar 1 02:08:34.027: Crypto mapdb : proxy_match src addr : 192.168.1.0 dst addr : 192.168.3.0 protocol : 0 src port : 0 dst port : 0 *Mar 1 02:08:34.031: IPSEC(key_engine): got a queue event with 2 kei messages *Mar 1 02:08:34.031: IPSEC(initialize_sas): , (key eng. msg.) INBOUND local= 192.168.2.1, remote= 192.168.2.2, local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.3.0/255.255.255.0/0/0 (type=4), protocol= ESP, transform= esp-aes esp-md5-hmac (Tunnel), lifedur= 3600s and 4608000kb, spi= 0xFCAF55ED(4239349229), conn_id= 0, keysize= 128, flags= 0x2 *Mar 1 02:08:34.031: IPSEC(initialize_sas): , (key eng. msg.) OUTBOUND local= 192.168.2.1, remote= 192.168.2.2, local_proxy= 192.168.1.0/255.255.255.0/0/0 (type=4), remote_proxy= 192.168.3.0/255.255.255.0/0/0 (type=4), protocol= ESP, transform= esp-aes esp-md5-hmac (Tunnel), lifedur= 3600s and 4608000kb, spi= 0x8E9773AE(2392290222), conn_id= 0, keysize= 128, flags= 0xA *Mar 1 02:08:34.035: Crypto mapdb : proxy_match src addr : 192.168.1.0 dst addr : 192.168.3.0 protocol : 0 src port : 0 dst port : 0 *Mar 1 02:08:34.035: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and 192.168.2.2 *Mar 1 02:08:34.035: IPSec: Flow_switching Allocated flow for sibling 80000002 *Mar 1 02:08:34.035: IPSEC(policy_db_add_ident): src 192.168.1.0, dest 192.168.3.0, dest_port 0 *Mar 1 02:08:34.035: IPSEC(create_sa): sa created, (sa) sa_dest= 192.168.2.1, sa_proto= 50, sa_spi= 0xFCAF55ED(4239349229), sa_trans= esp-aes esp-md5-hmac , sa_conn_id= 2001 *Mar 1 02:08:34.035: IPSEC(create_sa): sa created, (sa) sa_dest= 192.168.2.2, sa_proto= 50, sa_spi= 0x8E9773AE(2392290222), sa_trans= esp-aes esp-md5-hmac , sa_conn_id= 2002
phoeneous wrote: » Wait, you're saying 192.168.2.1/24 and 192.168.2.2/24 are not in the same subnet?
phoeneous wrote: » Ah, I was looking at reply #17 which seems to be correct as far as the subnet between R2 and R3. I also noticed that he doesnt have any routes configured, is this not necessary in a s2s vpn?