Evan,
Terminate the VPN connection with a SVTI. this will allow it to be a part
of the VRF. No changes necessary on the remote END. Still static site to
site tunnel.
interface Virtual-Template 1 type tunnel
ip vrf XXX
ip unnumbered XXX
tunnel mode ipsec ipv4
tunnel protection profile ipsec XXX
crypto isakmp profile L2L
match address <peer-IP>
virtual-template 1
crypto ipsec transform-set 3DES esp-3des esp-md5-hmac
crypto ipsec profile XXX
set peer x.x.x.x
set isakmp-profile L2L
set transform-set 3DES
So on and so forth. I don't have this on a console so I may be missing some
stuff but this should be the start of it atleast.
Regards,
Tyson Scott - CCIE #13513 R&S, Security, and SP
Technical Instructor - IPexpert, Inc.
Mailto: tscott_at_ipexpert.com
Telephone: +1.810.326.1444, ext. 208
Live Assistance, Please visit: www.ipexpert.com/chat
eFax: +1.810.454.0130
-----Original Message-----
From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
ron.wilkerson_at_gmail.com
Sent: Thursday, February 04, 2010 9:23 PM
To: Evan Weston; ccielab_at_groupstudy.com
Subject: Re: VPN to a VRF?
Just configure vrf aware ipsec on r1
-----Original Message-----
From: "Evan Weston" <evan_weston_at_hotmail.com>
Date: Fri, 5 Feb 2010 11:57:29
To: <ccielab_at_groupstudy.com>
Subject: VPN to a VRF?
Hi all,
In a lab I have a simple VPN between 2 routers back to back:
R1
int fa0/0
ip add 10.100.12.1 255.255.255.0
!
int lo0
ip add 1.1.1.1 255.255.255.0
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
!
crypto isakmp key CLIENT1 address 10.100.12.2
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto map VPN_CMAP 10 ipsec-isakmp
set peer 10.100.12.2
set transform-set ESP-3DES-SHA
match address TO_CLIENT
!
interface fa0/0
crypto map VPN_CMAP
!
ip access-list extended TO_CLIENT
permit ip host 1.1.1.1 host 2.2.2.2
!
ip route 0.0.0.0 0.0.0.0 10.100.12.2
R2
int fa0/0
ip add 10.100.12.2 255.255.255.0
!
int lo0
ip add 2.2.2.2 255.255.255.0
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
!
crypto isakmp key CLIENT1 address 10.100.12.1
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto map VPN_CMAP 10 ipsec-isakmp
set peer 10.100.12.1
set transform-set ESP-3DES-SHA
match address TO_SERVER
!
interface fa0/0
crypto map VPN_CMAP
!
ip access-list extended TO_SERVER
permit ip host 2.2.2.2 host 1.1.1.1
!
ip route 0.0.0.0 0.0.0.0 10.100.12.1
Say if I wanted to take the loopback0 interface on R1 and put it in a
different VRF table so on R1:
ip vrf TEST_VRF
rd1:1
int lo0
ip vrf forwarding TEST_VRF
ip address 1.1.1.1 255.255.255.255
Is there a way I can modify my VPN so I can still have 1.1.1.1 and 2.2.2.2
talk to each other or do I need to go for easy VPN at this point?
Cheers!
Evan
Blogs and organic groups at http://www.ccie.net
Received on Thu Feb 04 2010 - 22:13:52 ART
This archive was generated by hypermail 2.2.0 : Mon Mar 01 2010 - 06:28:35 ART