CISCO easy VPN & local subnets

Easyvpn Installer based on http://www.cisco.com/en/US/products/sw/secursw/ps5318/products_configuration_example09186a00806ad10e.shtml

core1 #sh passage int fa0/0

Building configuration...

Current configuration: 303 bytes

!

interface FastEthernet0/0

Description _WAN_INTERFACE_

004f.620a.8771 Mac address

IP 10.74.17.254 255.255.240.0

no ip redirection

no ip unreachable

no ip proxy-arp

NAT outside IP

IP virtual-reassembly

route IP cache flow

automatic duplex

automatic speed

No cdp enable

card crypto VPNMAP1

end

#sh core1 run int fa0/1.1

Building configuration...

Current configuration: 294 bytes

!

interface FastEthernet0/1.1

Description Native_VLAN_1

encapsulation dot1Q 1 native

IP 192.168.40.101 255.255.255.0

IP helper 192.168.40.210

NBAR IP protocol discovery

IP nat inside

IP virtual-reassembly

no ip mroute-cache

entry of service-policy DROP_ONLINE_MOVIES

end

#sh core1 run int fa0/1.50

Building configuration...

Current configuration: 137 bytes

!

interface FastEthernet0/1.50

encapsulation dot1Q 50

192.168.50.1 IP address 255.255.255.0

IP nat inside

IP virtual-reassembly

end

core1 #sh ip int br | UNAs Exc

Interface IP-Address OK? Method State Protocol

FastEthernet0/0 10.74.17.254 YES NVRAM up up

FastEthernet0/1.1 192.168.40.101 YES NVRAM up up

FastEthernet0/1.20 192.168.20.1 YES NVRAM up up

FastEthernet0/1.50 192.168.50.1 YES NVRAM up up

FastEthernet0/1.82 192.168.82.1 YES NVRAM up up

Gateway of last resort is 10.74.16.254 to network 0.0.0.0

C 192.168.40.0/24 is directly connected, FastEthernet0/1.1

192.168.80.0/32 is divided into subnets, subnets 1

S 192.168.80.5 [1/0] via 195.212.29.188

C 192.168.20.0 is directly connected, FastEthernet0/1.20

10.0.0.0/8 is variably divided into subnets, 3 subnets, 3 masks

S 10.10.1.0/31 is directly connected, FastEthernet0/1.1

C 10.10.10.0/24 is directly connected, FastEthernet0/1.10

C 10.74.16.0/20 is directly connected, FastEthernet0/0

S 192.168.0.0/24 is directly connected, FastEthernet0/1.1

C 192.168.50.0/24 is directly connected, FastEthernet0/1.50

S * 0.0.0.0/0 [1/0] via 10.74.16.254

VPNPOOL1 192.168.80.1 192.168.80.5

CUSTOMER

Linux machine using vpnc

cat /etc/vpnc/e_vpn.conf

Xxxxxx gateway IPSec

VPN IPSec ID

IPSec secret xxxxx

IKE psk Authmode

Xauth username yyyyy

Xauth password xxxxx

Target 192.168.50.0/24 192.168.40.0/24 networks

Route - n

Kernel IP routing table

Destination Gateway Genmask Flags metric Ref use Iface

192.168.40.101 0.0.0.0 255.255.255.255 UH 0 0 0 tun0

_VPN_ 9.158.166.129 UGH 255.255.255.255 0 0 0 eth0

9.158.166.129 0.0.0.0 255.255.255.255 UH 0 0 0 eth0

9.0.136.50 9.158.166.129 UGH 255.255.255.255 0 0 0 eth0

192.168.220.0 0.0.0.0 255.255.255.240 U 0 0 0 virbr4

192.100.100.0 0.0.0.0 255.255.255.128 U 0 0 0 virbr5

9.158.166.128 0.0.0.0 255.255.255.128 U 0 0 0 eth0

192.168.80.0 0.0.0.0 255.255.255.0 U 0 0 0 tun0

192.168.40.0 0.0.0.0 255.255.255.0 U 0 0 0 tun0

192.168.50.0 0.0.0.0 255.255.255.0 U 0 0 0 tun0

0.0.0.0 9.158.166.129 0.0.0.0 UG 0 0 0 eth0

Ping - c1 192.168.50.1

PING 192.168.50.1 (192.168.50.1) 56 (84) bytes of data.

-ping 192.168.50.1 - statistics

1 packets transmitted, 0 received, 100% packet loss, time 0ms s

Did I miss something in the config... or something is wrong?

Follow these steps:

101 extended IP access list

1 deny ip any 192.168.80.0 0.0.0.255

!

Renumber list of access IP 101 10 10

Thank you.

Please note all useful posts

Tags: Cisco Security

Similar Questions

  • PlayBook & cisco Easy VPN Server 831

    I don't seem to be able to connect to my router 831 cisco easy vpn server is configured by using my Blackberry Playbook.  Looking at the console of the router I can see Debugging but don't know what it means.  I have attached debugging as well as glued my setup, if someone is able to help me at all it would be much appreciated.  Thank you very much.

    Current configuration: 2574 bytes
    !
    version 12.3
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    router host name
    !
    enable secret 5 $1$ FM71$ y4ejS2icnqX79b9gD92E81
    enable password xxxx
    !
    username privilege 15 password 0 $1$ W1fA CRWS_Ritesh $ o1oSEpa163775446
    username privilege 15 secret 5 shamilton wFLF $1$ $ 8eRxnrrgVHMXXC0bXdEGi1
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login ciscocp_vpn_xauth_ml_1 local
    AAA authorization exec default local
    AAA authorization ciscocp_vpn_group_ml_1 LAN
    AAA - the id of the joint session
    IP subnet zero
    no ip Routing
    !
    !
    audit of IP notify Journal
    Max-events of po verification IP 100
    No ftp server enable write
    !
    !
    !
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    ISAKMP xauth timeout 15 crypto

    !
    ISAKMP crypto client configuration group ciscogroup
    (deleted) 0 key
    DNS 172.16.60.246 172.16.60.237
    pool SDM_POOL_3
    ACL 100
    Save-password
    include-local-lan
    !
    !
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    !
    crypto dynamic-map SDM_DYNMAP_1 1
    game of transformation-ESP-3DES-SHA
    market arriere-route
    !
    !
    card crypto SDM_CMAP_1 client authentication list ciscocp_vpn_xauth_ml_1
    map SDM_CMAP_1 isakmp authorization list ciscocp_vpn_group_ml_1 crypto
    client configuration address map SDM_CMAP_1 crypto answer
    map SDM_CMAP_1 65535-isakmp dynamic SDM_DYNMAP_1 ipsec crypto
    !
    !
    !
    !
    interface Ethernet0
    IP 172.16.60.241 255.255.255.0
    IP nat inside
    no ip route cache
    !
    interface Ethernet1
    DHCP IP address
    NAT outside IP
    no ip route cache
    automatic duplex
    map SDM_CMAP_1 crypto
    !
    interface FastEthernet1
    no ip address
    Shutdown
    automatic duplex
    automatic speed
    !
    interface FastEthernet2
    no ip address
    Shutdown
    automatic duplex
    automatic speed
    !
    interface FastEthernet3
    no ip address
    Shutdown
    automatic duplex
    automatic speed
    !
    interface FastEthernet4
    no ip address
    automatic duplex
    automatic speed
    !
    local IP SDM_POOL_1 172.16.60.190 pool 172.16.60.199
    pool of local SDM_POOL_2 192.168.1.1 IP 192.168.1.100
    local IP SDM_POOL_3 172.16.61.100 pool 172.16.61.150
    IP nat inside source overload map route SDM_RMAP_1 interface Ethernet1
    IP classless
    !
    IP http server
    no ip http secure server
    !
    Remark SDM_ACL category of access list 1 = 2
    access-list 1 permit 172.16.60.0 0.0.0.255
    Note access-list 100 category CCP_ACL = 4
    access-list 100 permit ip 172.16.60.0 0.0.0.255 any
    public RO SNMP-server community
    Enable SNMP-Server intercepts ATS
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    exec-timeout 120 0
    password xxxxx
    length 0
    !
    max-task-time 5000 Planner
    !
    end

    Stace,

    *Mar  1 06:40:15.258: ISAKMP: transform 1, ESP_AES

    *Mar  1 06:40:15.258: ISAKMP:   attributes in transform:

    *Mar  1 06:40:15.262: ISAKMP:      SA life type in seconds

    *Mar  1 06:40:15.262: ISAKMP:      SA life duration (basic) of 10800

    *Mar  1 06:40:15.262: ISAKMP:      encaps is 61443

    *Mar  1 06:40:15.262: ISAKMP:      key length is 256

    *Mar  1 06:40:15.262: ISAKMP:      authenticator is HMAC-SHA

    *Mar  1 06:40:15.262: ISAKMP (0:14): atts are acceptable.

    *Mar  1 06:40:15.262: ISAKMP (0:14): IPSec policy invalidated proposal

    *Mar  1 06:40:15.262: ISAKMP (0:14): phase 2 SA policy not acceptable! (local 14

    The other end offers AES 256 and SHA IPSec transform set.

    While you have configured:

    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

    Suggestion:

    Add a new set of transofrm and apply it under crypto map.

    HTH,

    Marcin

  • Cisco easy VPN + loopback interface. static ip address for the client

    Good day people.

    I have a couple a question and answer on which I can't google for a period. BTW I maybe simly use bad aproach to choose keywords.

    Thus,.

    (1) is it possible to assign the same IP to the same customer every time that it authenticated, preferably without using DHCP? Definely im sure it is possible, but can't find match configuration examples (my camera's 1921 Cisco IOS 15.0.1).

    (2) is it possible to assign the dynamic crypto map to the loopback interface (to make EASY VPN Server accessible through two interfaces - maybe you recommend another approach instead?) - that I move the map workingcrypto of int phy loopback - I can not connect with reason "SA Phace1 policy proposal" not accepted

    Hello

    (1) you can attach to the same IP to the same username using RADIUS

    (2) If you have 2 outside interfaces

    Then, you would use

    mymap-address loop0 crypto card

    int gig0/0

    crypto mymap map

    int g0/1

    cryptp map mymap

    By doing so, the local address would actually be the loop0 but Cryptography card HAS to be applied on physical output interfaces

    See you soon

    OLivier

  • Cannot access the internal network with Cisco easy vpn client RV320

    I have a cisco RV320 (firmware v1.1.1.06) and created a tunnel easy vpn (= split tunnel tunnel mode), then I installed the cisco client vpn v5.0.07.0290 in Windows 7 64 bit, I can connect to the vpn, but I do not see the other pc ping nor them, no idea?

    Thank you

    Hello

    1. is the firewall on the active Windows 7 computer? If so, please disable it

    2. can you check that you get a correct IP address in the range of the POOL of IP configured?

    3. When you perform the tracert command to access an internal server, it crosses the VPN¨?

    4. is the tunnel of split giving you access to internal IP subnets defined?

    5. on the RV320 you see the user connected and sending and receiving bytes?

    Don t forget to rate and score as correct the helpful post!

    David Castro,

    Kind regards

  • Cisco easy VPN access Internet without Split Tunnel

    Hey guys

    IM wondering if anyone has a config that can help me get access to internet via an easy vpn tunnel on a cisco 877 router.

    Basically, we are traveling to be users able to use the internet through vpn, rather than using split tunneling. The reason for this is that we have several sites that are attached by lists of external IP access for some services.

    We hope that mobile users to interact with these sites through the central router and use external IP of access routers secure sites.

    I hope that makes sense. I know that we can use a proxy but we also use other services of bases no proxy on these sites, it would be rather routed direct access.

    Thank you

    Luke

    Hi Luke,.

    Please use the installation of the client VPN (complete tunnel) link below.

    http://www.Cisco.com/en/us/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps6659/prod_white_paper0900aecd80313bd0.PDF

    Note the useful message.

    Thank you

    Kasi

  • Cisco 1700 Setup as a hub for Cisco Anyconnect VPN

    The complete configuration for the router is attached. Additional configuration includes forwarding port 443 (the two tcp/udp), udp 4500, udp 500 and udp 50 to 192.168.1.20.

    Objective: Configure Cisco 1700 router as a VPN server, which a Cisco Anyconnect VPN client in. The VPN server is behind a NAT.

    Question 1: The Cisco Anyconnect client pulls its set of configuration of the router? I just need to point to the correct IP address and hit connect and it will do the rest? If not, what additional client side configuration must be done? I noticed, it tries to connect on port 443 to my router, but I don't really know why and I know that my router is not listening on this port, so I know I'm missing something:-D.

    Question 2: What are the features specifically include easy vpn server? I am confused as to exactly what it is. From what I can tell when you configure easy vpn server you simply set up a regular VPN.

    Question 3: Cisco Easy VPN remote has something to do with Cisco Anyconnect or they are completely distinct?

    Sorry for the newbie questions. It's really hard to understand the different systems and features on it and most of the examples I found dealt with the VPN router to router rather than configurations just for computers of end users, but I'll be the first to admit that I am new on this hahaha.

    Thanks for your help.

    PS: Any comment on the misconfigs are welcome. I'm still trying to understand fully exactly what each command does.

    Grant

    Grant,

    AnyConnect can do SSLVPN or IPsec (with IKEv2), ezvpn is all about IKEv1, it won't work.

    There (part 3) customers who will be able to connect to ezvpn, as well as the former customer Cisco VPN, but AC is not.

    BTW... it's not 50/UDP, this is IP protocol 50 (or sometimes 51) - ESP (or AH).

    You don't have TCP and UDP 443 for IPsec, but you may need them for SSL.

    And seriously... series of 1700? Wow, this is a 'retro' kit :-) Support ended 6 years ago.

    M.

  • Easy VPN with the Tunnel Interface virtual IPSec dynamic

    Hi all

    I configured easy vpn remote on a cisco 1841 and dynamic server easy vpn with virtual tunnel interface on the server (cisco 7200, 12.4.15T14)

    http://www.Cisco.com/en/us/partner/prod/collateral/iosswrel/ps6537/ps6586/ps6635/prod_white_paper0900aecd803645b5.html

    It works with easy vpn remote to the client mode and mode network-extesión, but it doesn't seem to work when I configure mode plus network on the client of the cpe, or when I try to have TWO inside the ez crypto interfaces. On the customer's site, I see two associations of security, but on the server PE site only security SA!

    Without virtual dynamic tunnel interface, dynamic map configuration is ok... This is a limitation of the virtual tunnnel dynamic interface?

    Federica

    If one side is DVTI and the other uses a dynamic map, it does support only 1 SA. If the two end uses DVTI or the two end uses dynamic card then it supports several SAs.

    Here is the note of documentation for your reference:

    Note: Multiple inside interfaces are supported only when the Cisco Easy VPN server and the Cisco Easy VPN client have the same type of Easy VPN configuration. In other words, both must use a Legacy Easy VPN configuration, or both must use a DVTI configuration.

    Here's the URL:

    http://www.Cisco.com/en/us/docs/iOS/sec_secure_connectivity/configuration/guide/sec_easy_vpn_rem_ps6441_TSD_Products_Configuration_Guide_Chapter.html#wp1046365

    Hope that answers your question.

  • Drops of easy vpn due to change of address IP ISP

    I do some testing with Cisco Easy VPN between 2 IOS routers.

    The VPN server is behind a static NAT (made by a checkpoint firewall) and it has a fixed IP address.

    Simple VPN client works on a residential xDSL connection. It is behind a NAT router provided by the ISP.

    The internet router has a dynamic public IP address and it changes every 36 hours (ISP is, can not change).

    The easy vpn works great. Both devices detect NAT and enable NAT-transparency. The link appears and works well.

    The question I have, is that when changes in xDSL router's public IP address, the IPSEC link falls and can't get back online.

    It seems that the change of the public IP address prevents the client in order to re-establish the VPN.

    When I reboot the router to vpn client, VPN back upward.

    Someone has encountered this and is there a way I can avoid this problem?

    Hi Tom,

    I have reproduced this issue in my lab, and instead of charging the EzVPN client, you can simply delete the order "crypto ipsec ezvpn client YOUR_EZVPN ' outside interface and it should do."

    Now, since it is foolish to do it manually whenever it breaks down, I suggest:

    -Configured IP SLA accessibility and the tracks through the tunnel.

    -With a 'Beach' object, you can define if it breaks down or not.

    -In the case of a failure, then remove and add the command ezvpn from outside.

    -To do this, you can use the EEM.

    Please see this:

    10 IP sla monitor

    type echo protocol ipIcmpEcho 172.16.10.1 source-interface FastEthernet0/1

    monitor IP sla 10 calendar life never start-time now

    !

    track 10 rtr 10 accessibility

    !

    EzVPN_DOWN event manager applet

    syslog event model ' % FOLLOW-UP-5-STATE: 10 rtr 10 accessibility Down-> Up.

    command action 1.0 cli 'enable '.

    action 1.1 cli command "configures terminal.

    Action 1.2, command cli "f0/0 interface.

    Action 1.3 cli no command "no ipsec encryption YOUR_EZVPN ezvpn client.

    Action 1.4 cli command "crypto ipsec client ezvpn YOUR_EZVPN.

    Action 1.5 cli command "end".

    Where:

    FastEthernet0 / 1---> within the interface

    FastEthernet0 / 0---> outside interface

    172.16.10.1---> remote IP accessible by tunnel EzVPN, when operational.

    So basically, when SLA reports the failure (most likely because the tunnel is down) the router deletes the command EzVPN and again.

    HTH.

    Portu.

    Please note all useful posts

    Post edited by: Javier Portuguez

  • Easy VPN with IPSec VPN L2L (Site - to - Site) in the same ASA 5505

    Hi Experts,

    We have an ASA 5505 in our environment, and currently two IPSec VPN L2L tunnels are established. But we intend to connect with VPN (Network Extension Mode) easy to another site as a customer. Is it possible to configure easy VPN configurations by keeping the currently active IPSec L2L VPN(Site-to-Site) tunnels? If not possible is there any work around?

    Here's the warning we get then tried to configure the easy VPN Client.

    NOCMEFW1 (config) # vpnclient enable

    * Delete "nat (inside) 0 S2S - VPN"

    * Detach crypto card attached to the outside interface

    * Remove the tunnel groups defined by the user

    * Remove the manual configuration of ISA policies

    CONFLICT of CONFIG: Configuration that would prevent the Cisco Easy VPN Remo success

    you

    operation was detected and listed above. Please solve the

    above a configuration and re - activate.

    Thanks and greetings

    ANUP sisi

    "Dynamic crypto map must be installed on the server device.

    Yes, dynamic crypto is configured on the EasyVPN server.

    Thank you

  • Easy VPN Hardware instead of easy VPN software

    Hello world

    I need configuration for the VPN routers in Cisco connect 30 branch offices to the main office using Internet links

    connection to the Main Office have a static public IP address but the problem is that the remote Branches have dynamic public IP that changes every time when you reboot the ADSL router and I can't buy public static IP for each branch to Point - to-Point VPN and I don't want to use the easy VPN software in remote branches what I want is the use of the router in remote branches instead of the easy VPN software

    Please, what is the order of configuration that make the work of road Cisco cisco easy VPN software.

    Thank you

    Hello

    Instead of having to use the IPsec client software on computers, you can use a router IOS or ASA as a material EzVPN client.

    Only some models can be used as clients for example IOS 831 s, 871 s (small) or ASA 5505.

    An example configuration:

    http://www.Cisco.com/en/us/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps6659/prod_white_paper0900aecd80313bd0.PDF

    Federico.

  • Installation easy vpn Cisco 871

    I have a Cisco 871 router sitting behind my adsl router and I have configured to accept vpn connections from clients from outside (partially configured by cli and partly by SDM).

    It works well, in that I can connect my LAN and access my network inside resources, however I can't access the web when connected via vpn.

    Is it perhaps to nat? I hope that someone can see why in my config. Thank you.

    Hi Chris,

    The only reason I understand here, customers lose their ability to achieve internet when connected by VPN is, according to the current configuration, all traffic (including the NetBIOS) runs through the tunnel. So when a package leaves the machine with a source of intellectual property (one of the private ip address of the pool set) of the client and the destination 4.2.2.2 (can be any ip on the internet), there is no translation defined for the ip address of the VPN client on the router.

    Thus, package from the computer of the customer with an address NON-Routable cannot access the internet for obivous reasons.

    To work around the problem, try this.

    access-list 5 by 192.168.1.0 0.0.0.255

    (assuming that 192.168.1.0 is that the VPN client subnet have access)

    Then,

    Crypto home isakmp client configuration group

    key xxxx

    ACL 5< binding="" the="" acl="">

    By creating the acl the binder to the configuration of the client, and 5 am Division of traffic in the tunnel. In other words, only for the 192.168.1.x subnet traffic will pass through the tunnel and rest will take the path of the LOCAL ISP.

    I hope this helps...!

    Concerning

    M.

  • Cisco 831 - easy VPN server

    Hello

    I am trying to create an easy VPN server on Cisco 831. When I "test" the easy VPN he said that it tested successfully, but when I try to VPN in the router of the built in Windows XP VPN client, I'm unable to connect.

    Does anyone have recommendations for how to configure easy VPN? I basically just selected all the default options. I was not able to find tutorials in the Cisco online documentation.

    Do I need to have the Cisco VPN client to connect to the Cisco router?

    Other thoughts?

    Your IP address pool you are trying to assign to remote users is part of your local network, which is not the best way to assign the ip address to the VPN Clients, and I've seen a lot of problems in the past were route it not forwards the packets to the client. This allows you to change the POOL of something other than your LAN. E.g. 192.168.1.0/24.

    Also, make sure that you re - configure your 102 ACL accordingly.

    Once you make changes, try to connect again and let me know how it goes.

    Kind regards

    Arul

    * Please note all useful messages *.

  • Easy VPN not able to access the local network

    Hi guys,.

    little hope can help me, I'll give you a run down on the config.

    I have a border router that is a no. 2851 connected to the No. 2851 is a switch cisco 3750 running Routing inter - vlan with four VLANS.

    I have easy VPN server on the edge router No. 2851 I am able to connect remotely from a client vpn cisco with a problem but I can't access the local network on the server, I tried everything with no luck.

    I have a cisco VPN client installed on a 64-bit windows system 7 and I also tried with windows xp 32-bit system and still no luck.

    Please I need help I need to get this race to end of trading today.

    I will be copying and pasting the edge router config please if someone get review and see if the config is good.

    You need to change your ACL PAT of standard to extend and to deny traffic to be translated to the Pool of VPN:

    access-list 120 deny ip 10.10.10.0 0.0.0.3 10.10.50.0 0.0.0.255

    access-list 120 deny ip 192.168.XX.0 0.0.0.255 10.10.50.0 0.0.0.255

    access-list 120 deny ip 172.16.XX.0 0.0.0.255 10.10.50.0 0.0.0.255

    access-list 120 deny ip 172.1X.20.0 0.0.0.255 10.10.50.0 0.0.0.255

    access-list 120 deny ip 192.168.XX.0 0.0.0.255 10.10.50.0 0.0.0.255

    access-list 120 allow ip 10.10.10.0 0.0.0.3 all

    IP access-list 120 permit 192.168.XX.0 0.0.0.255 any

    IP access-list 120 permit 172.16.XX.0 0.0.0.255 aniy

    IP access-list 120 permit 172.1X.20.0 0.0.0.255 any

    IP access-list 120 permit 192.168.XX.0 0.0.0.255 any

    overload of IP nat inside source list 120 interface Dialer0

    no nat ip within the source of the list 1 overload interface Dialer0

    clear the ip nat trans *.

    Hope that helps.

  • Easy vpn server issues of Cisco 800 series.

    Hello.

    I want to deploy the easy vpn server on cisco 876 and 877 10 routers and access from a remote location (company headquarters). When I leave the firewall of the router off the vpn server works. When I turn it on it doesn't.

    Although I allow all traffic to my ip for example 80.76.61.158 I can't access the vpn server.

    I tried a place to let the firewall off and it worked fine.

    I use SDM to configure the vpn server. Any ideas what I can do with the cause of firewall I really can't leave it "open."

    Thanks in advance.

    It would be a good idea to paste the configuration of the VPN server to the firewall.

    Kind regards

    Kamal

  • Easy VPN - acl

    Hello

    There is an "acl" parameter that is not clear to me, it is configured at customer site:

    Crypto ipsec VPN ezvpn client

    connect auto

    Cisco key band EASYVPN

    client mode

    peer 10.0.0.1

    username cisco password cisco

    xauth userid local mode

    ACL 101

    Everything that I added to the ACL 101 tunnel is always present. I found a description:

    Step 6

    ACL {name - acl |}                 ACL-number}
    Example:

    Device (ezvpn-crypto-config) # acl acl-list1

    Specifies several subnets in a VPN tunnel.

    "Specifies several subnets in a VPN tunnel".  -what it means, source?

    I tried to use this setting, and I added the access list:

    access-list 123 allow ip 10.10.10.0 0.0.0.255 host 20.0.0.20

    access-list 123 allow ip 50.50.50.0 0.0.0.255 host 20.0.0.20

    where 10.10.10.0 and 50.50.50.0 are source and 20.0.0.20 is the destination.

    When I ping with source 10.10.10.3 (physical int) for 20.0.0.20 - numbers of BA & desc packages grows.

    but when I ping with source 50.50.50.50 (int loop) for 20.0.0.20 - I see that it wasn't to push into the tunnel.

    Could someone explain how the work parameter and for what is it?

    Thank you

    Hubert

    Hubert,

    Ref:

    http://www.Cisco.com/en/us/docs/iOS-XML/iOS/sec_conn_esyvpn/configuration/15-2mt/sec-easy-VPN-rem.html

    in client mode several subnets are not supported, nor what they sense.

    You specify what internal subnets of announcement to the server that are configured behind this device.

    In client mode, the server sees only the assigned IP address.

    M.

Maybe you are looking for