Configuring Site To Site Ipsec VPN Tunnel Between Cisco Routers
Configuring Site To Site Ipsec VPN Tunnel Between Cisco Routers
Configuring Site To Site Ipsec VPN Tunnel Between Cisco Routers
Site 1 is configured with an internal network of 10.10.10.0/24, while Site 2 is configured with
network 20.20.20.0/24. The goal is to securely connect both LAN networks and allow full communication
between them, without any restrictions.
Next we are going to define a pre shared key for authentication with our peer (R2 router) by using the
following command:
R1(config)# crypto isakmp key firewallcx address 1.1.1.2
The peers pre shared key is set to firewallcx and its public IP Address is 1.1.1.2. Every time R1 tries to
establish a VPN tunnel with R2 (1.1.1.2), this pre shared key will be used.
CONFIGURE IPSEC
To configure IPSec we need to setup the following in order:
- Create extended ACL
- Create IPSec Transform
- Create Crypto Map
- Apply
crypto
map
to
the
public
interface
VPN-TRAFFIC
FastEthernet0/1
Note that you can assign only one crypto map to an interface.
As soon as we apply crypto map on the interface, we receive a message from the router that confirms
isakmp is on: ISAKMP is ON.
At this point, we have completed the IPSec VPN configuration on the Site 1 router.
We now move to the Site 2 router to complete the VPN configuration. The settings for Router 2 are
identical, with the only difference being the peer IP Addresses and access lists:
R2(config)# crypto isakmp policy 1
R2(config-isakmp)# encr 3des
R2(config-isakmp)# hash md5
R2(config-isakmp)# authentication pre-share
R2(config-isakmp)# group 2
R2(config-isakmp)# lifetime 86400
R2(config)# crypto isakmp key firewallcx address 1.1.1.1
R2(config)# ip access-list extended VPN-TRAFFIC
R2(config-ext-nacl)# permit ip 20.20.20.0 0.0.0.255 10.10.10.0 0.0.0.255
R2(config)# crypto ipsec transform-set TS esp-3des esp-md5-hmac
R2(config)# crypto map CMAP 10 ipsec-isakmp
R2(config-crypto-map)# set peer 1.1.1.1
R2(config-crypto-map)# set transform-set TS
R2(config-crypto-map)# match address VPN-TRAFFIC
R2(config)# interface FastEthernet0/1
R2(config- if)# crypto map CMAP
Network Address Translation (NAT) is most likely to be configured to provide Internet access to internal
hosts. When configuring a Site-to-Site VPN tunnel, it is imperative to instruct the router not to perform
NAT (deny NAT) on packets destined to the remote VPN network(s).
This is easily done by inserting a deny statement at the beginning of the NAT access lists as shown
below:
For Site 1s router:
R1(config)# ip nat inside source list 100 interface fastethernet0/1 overload
R1(config)# access-list 100 remark -=[Define NAT Service]=R1(config)# access-list 100 deny ip 10.10.10.0 0.0.0.255 20.20.20.0 0.0.0.255
R1(config)# access-list 100 permit ip 10.10.10.0 0.0.0.255 any
R1(config)# access-list 100 remark
The first ping received a timeout, but the rest received a reply, as expected. The time required to bring up
the VPN Tunnel is sometimes slightly more than 2 seconds, causing the first ping to timeout.
To verify the VPN Tunnel, use the show crypto session command:
R1# show crypto session
Crypto session current status
Interface: FastEthernet0/1
Session status: UP-ACTIVE
Peer: 1.1.1.2 port 500