2013年6月26日星期三

VPN UP-ACTIVE but cannot ping across VPN


Question:

I have a VPN setup that cisco price I am trying to get workling.  When I issue the command sh crypto session on both routers I get the following:

OFFICE:
Interface: FastEthernet0/0
Session status: UP-ACTIVE   
Peer: 70.193.192.131 port 14275
  IKEv1 SA: local 40.197.68.9/4500 remote 70.193.192.131/14275 Active
  IPSEC FLOW: permit ip 192.168.10.0/255.255.255.0 192.168.30.0/255.255.255.252
        Active SAs: 2, origin: dynamic crypto map

HOME:
Interface: GigabitEthernet0/0
Session status: UP-ACTIVE   
Peer: 40.197.68.9 port 4500
  IKEv1 SA: local 192.168.30.1/4500 remote 40.197.68.9/4500 Active
  IPSEC FLOW: permit ip 192.168.30.0/255.255.255.252 192.168.10.0/255.255.255.0
        Active SAs: 2, origin: crypto map

But when I issue a ping 192.168.10.1 from the home router it returns .....

Here is my network topology:



Attached are my config files.

First, I do not know what I need to do to get the home router to ping the office router.  Secind, what do I do to get the 192.168.2.0 network (phone) to cross the VPN all the way to my phone.

Any help you can provide, I will be greatly thankful for!!!

Answer:

Looking at your config, you're doing NAT per ACL 1, on your OFFICE router, for source of 192.168.10.0/24.  You're NATing your OFFICE LAN to your public interface BEFORE it's being sent through tunnel:

http://www.techrepublic.com/article/understand-the-order-of-operations-for-cisco-ios/6055946 (NAT Order of Operations)

Change it to an extended and insert a line to that to deny NAT for your HOME network destinations across the tunnel:

ip access-list extended SDM_ACL
deny   ip 192.168.10.0 0.0.0.255 192.168.30.0 0.0.0.3
permit ip 192.168.10.0 0.0.0.255 any

That will take care of connectivity to the /30 subnet, but if you're wanting access to the OFFICE from your 110 and 115 VLANs from your HOME, then you'll need to add those networks to Catalyst Switches Price the VPN1-FLA-TRAFFIC and VPN-TRAFFIC ACL's, respectively.

没有评论:

发表评论