Re: ######Experts on Ezvpn please help#### Ezvpn is not

From: marc abel <marcabel_at_gmail.com>
Date: Tue, 5 Nov 2013 09:53:40 -0600

Your acl:

access-list 101 permit ip host 33.33.33.33 host 192.168.6.1

doesn't appear to match your loopback address

interface Loopback0
 ip address 7.7.53.3 255.255.255.255

On Mon, Nov 4, 2013 at 11:26 PM, jeremy co <jeremy.cool14_at_gmail.com> wrote:

> *7.7.53.3----R3-----R6----- 192.168.6.1*
> *R6 is the server and R3 is the client.*
>
>
> Manual mode work. so config is good.but if I try the following it fails and
> Im not sure if this how it should.be
>
> *Desire beahvior:* If I ping from Lo on R3 to 92.168.6.1, it trigger the
> tunnel only when it sees this traffic, tunnel shoud not be active anyother
> time.
>
> But it doesnt work as above, im not sure pinging from loopback can trigger
> the ACl at all or not ???? or it needs to eb triggered from a device behind
> R3?
>
> *Scenario 1:* Connect ACL 101
>
> access-list 101 permit ip host 33.33.33.33 host 192.168.6.1
>
> If I try to ping from loo0 to 192.168.6.1 this doesnt start the
> traffic.(even if I add route to 192.168.6.1 to fa0/1 on R3 still isakmp
> wouldnt be triggered)
>
> *Scenario 2:* Conenct acl 101 + I connect manually.
>
> If I connect manually (crypto ipsec client ezvpn) , then I can ping
> 192.168.6.1 with out having a static route.
>
> the problem is it doesnt care if I source it from R3 L0 or not, ipsec
> counter increment, so it doesnt really honor the ACL..
>
>
>
> *R3:*
> R3# sh run | s crypto|interface
>
> crypto ipsec client ezvpn EASY
> connect acl 101
> group ezvpn_DVTI key cisco123
> mode client
> peer 7.7.19.6
> virtual-interface 1
> username cisco password cisco
> xauth userid mode local
>
> interface Loopback0
> ip address 7.7.53.3 255.255.255.255
> crypto ipsec client ezvpn EASY inside
>
> interface FastEthernet0/1
> ip address 7.7.19.3 255.255.255.0
> speed 100
> full-duplex
> crypto ipsec client ezvpn EASY
>
> interface Virtual-Template1 type tunnel
> no ip address
> tunnel mode ipsec ipv4
>
>
>
>
> *----------------------------------------------------------------------------------------------------------
> *
> *R6:*
>
> R6#sh run | s crypto|pool|aaa|Virtual
> aaa new-model
> aaa authentication login ikev1-list local
> aaa authorization network ikev1-list local
> aaa session-id common
> ip dhcp pool pool19
> network 7.7.19.0 255.255.255.0
> lease infinite
> crypto isakmp policy 1
> encr 3des
> hash md5
> authentication pre-share
> group 2
> crypto isakmp client configuration address-pool local pool2
> crypto isakmp client configuration group ezvpn_DVTI
> key cisco123
> pool pool2
> crypto isakmp profile isakmp_profile_dvti
> match identity group ezvpn_DVTI
> client authentication list ikev1-list
> isakmp authorization list ikev1-list
> client configuration address respond
> client configuration group ezvpn_DVTI
> virtual-template 2
> local-address FastEthernet0/1
> crypto ipsec transform-set cisco esp-3des esp-md5-hmac
> crypto ipsec profile ikev1
> set transform-set cisco
> set isakmp-profile isakmp_profile_dvti
> interface Virtual-Template1
> no ip address
> !
> interface Virtual-Template2 type tunnel
> ip unnumbered FastEthernet0/1
> tunnel mode ipsec ipv4
> tunnel protection ipsec profile ikev1
> !
> ip local pool pool2 13.1.1.1 13.1.1.10
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
>
>
>
>
>
>

-- 
Marc Abel
CCIE #35470
(Routing and Switching)
Blogs and organic groups at http://www.ccie.net
Received on Tue Nov 05 2013 - 09:53:40 ART

This archive was generated by hypermail 2.2.0 : Wed Jan 01 2014 - 20:26:19 ART