SlideShare a Scribd company logo
1 of 11
Download to read offline
CONFIGURING CISCO SITE TO SITE IPSEC VPN WITH DYNAMIC IP
ENDPOINT CISCO ROUTERS
WRITTEN BY ADMINISTRATOR. POSTED IN CISCO ROUTERS - CONFIGURING CISCO ROUTERS (/CISCO-TECHNICAL-KNOWLEDGEBASE/CISCO-
ROUTERS.HTML)
(http://www.firewall.cx)
FRIDAY, 11 MARCH 2016
FIREWALL.CX TEAM
(/MEET-THE-TEAM.HTML)
NEWS
(/NEWS.HTML)
ALTERNATIVE MENU
(/SITE-MAP.HTML)
RECOMMENDED SITES
(/RECOMMENDED-SITES.HTML)
CONTACT US - FEEDBACK
(/CONTACT-US.HTML)
HOME
(/)
NETWORKING
(/networking-topics.html)
CISCO
(/cisco-technical-knowledgebase.html)
MICROSOFT
(/microsoft-knowledgebase.html)
LINUX
(/linux-knowledgebase-tutorials.html)
MORE CONTENT
(/general-topics-reviews.html)
DOWNLOADS
(/downloads.html)
FORUM
(/forums.html)
HOT DOWNLOADS
(http://clixtrac.com/goto/?99230)
NETWORK FORENSIC
ANALYSIS
(HTTP://CLIXTRAC.COM
(http://clixtrac.com/goto/?99229)
NETWORK
VULNERABILITY SCANNER
(HTTP://CLIXTRAC.COM
(http://clixtrac.com/goto/?99229)
NETWORK SECURITY
SCANNER
(HTTP://CLIXTRAC.COM
(/component/banners/click/2.html)
Rating 4.61 (23 Votes)
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
1 of 11 3/11/2016 4:33 PM
This article serves as an extension to our popular Cisco VPN topics covered here on Firewall.cx. While we’ve covered Site to Site IPSec
VPN Tunnel Between Cisco Routers (/cisco-technical-knowledgebase/cisco-routers/867-cisco-router-site-to-site-ipsec-vpn.html) (using
static public IP addresses), we will now take a look on how to configure our headquarter Cisco router to support remote Cisco routers
with dynamic IP addresses. One important note to keep in mind when it comes to this implementation, is that Site-to-Site VPN
networks with Dynamic remote Public IP addresses can only be brought up by the remote site routers as only they are aware of
the headquarter's router Public IP address.
IPSec VPN tunnels can also be configured using GRE (Generic Routing Encapsulation) Tunnels with IPsec encryption. GRE tunnels
greatly simply the configuration and administration of VPN tunnels and are covered in our Configuring Point-to-Point GRE VPN Tunnels
(/cisco-technical-knowledgebase/cisco-routers/868-cisco-router-gre-ipsec.html) article. Lastly, DMVPNs – a new VPN trend that provide
outstanding flexibility and almost no administration overhead can also be examined by reading our Understanding Cisco Dynamic Multipoint
VPN (DMVPN) (/cisco-technical-knowledgebase/cisco-services-tech/896-cisco-dmvpn-intro.html), Dynamic Multipoint VPN (DMVPN)
Deployment Models & Architectures (/cisco-technical-knowledgebase/cisco-services-tech/908-cisco-dmvpn-models.html) and Configuring
Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing - DMVPN Configuration (/cisco-technical-
knowledgebase/cisco-routers/901-cisco-router-dmvpn-configuration.html)articles.
ISAKMP (Internet Security Association and Key Management Protocol) and IPSec (/networking-topics/protocols/127-ip-security-
protocol.html) are essential to building and encrypting the VPN tunnel. ISAKMP, also called IKE (Internet Key Exchange), is the negotiation
protocol that allows two hosts to agree on how to build an IPsec security association. ISAKMP negotiation consists of two phases: Phase
1 and Phase 2.
Phase 1 creates the first tunnel, which protects later ISAKMP negotiation messages. Phase 2 creates the tunnel that protects data.
IPSec then comes into play to encrypt the data using encryption algorithms and provides authentication, encryption and anti-replay
services.
 
IPSEC VPN REQUIREMENTS
To help make this an easy-to-follow exercise, we have split it into two required steps to get the Site-to-Site IPSec Dynamic IP Endpoint
VPN Tunnel to work.
These steps are:
(1) Configure ISAKMP (ISAKMP Phase 1)
(2) Configure IPSec (ISAKMP Phase 2, ACLs, Crypto MAP)
Our example setup consists of the headquarter router R1 which is assigned a static public IP address, and two remote routers, R2 &
R3. Both remote routers (R2 & R3) connect to the Internet and have a dynamic public IP address assigned by the ISP, as shown in the
diagram below:
NETWORK SECURITY
SCANNER
(http://clixtrac.com
/goto/?99232)
FREE HYPER-V &
VMWARE BACKUP
(http://clixtrac.com
/goto/?210273)
RECOMMENDED
DOWNLOADS
Web Security
(http://clixtrac.com
/goto/?99233)
Free Hyper-V & VMware
Backup (http://clixtrac.com
/goto/?210270)
Server AntiSpam
(http://clixtrac.com
/goto/?99234)
Network Scanner
(http://clixtrac.com
/goto/?99235)
IDS Security Manager
(http://clixtrac.com
/goto/?99236)
Web-Proxy Monitor
(http://clixtrac.com
/goto/?99237)
Network Analyzer - Sniffer
(http://clixtrac.com
/goto/?195370)
Cisco VPN Client
(/downloads/cisco-tools-
a-applications.html)
Network Fax Server
Tweet
(//pinterest.com/pin/create/button/?url=http%3A%2F%2Fwww.firewall.cx%2Fcisco-technical-knowledgebase%2Fcisco-routers%2F936-cisco-router-vpn-dynamic-endpoint.html&media=http%3A%2F
%2Fwww.firewall.cx%2Fimages%2Fstories%2Fcisco-router-ipsec-vpn-dynamic-endpoint-1.png&
description=%26amp%3Bnbsp%3BThis%20article%20serves%20as%20an%20extension%20to%20our%20popular%20Cisco%20VPN%20topics%20covered%20here%20on%20Firewall.cx.%20While%20we%26rsquo%3B
Share
106 people like this. Be the
first of your friends.
LikeLike ShareShare
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
2 of 11 3/11/2016 4:33 PM
Our Headquarters is assigned an internal network of 10.10.10.0/24, while Remote Site 1 has been assigned network 20.20.20.0/24.
and Remote Site 2 network 30.30.30.0/24. The goal is to securely connect both remote sites with our headquarters and allow full
communication, without any restrictions.
 
CONFIGURE ISAKMP (IKE) - (ISAKMP PHASE 1)
IKE exists only to establish SAs (Security Association) for IPsec. Before it can do this, IKE must negotiate an SA (an ISAKMP SA)
relationship with the peer.
To begin, we’ll start working on the Headquarter router (R1).
First step is to configure an ISAKMP Phase 1 policy:
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
The above commands define the following (in listed order):
3DES - The encryption method to be used for Phase 1.
MD5 - The hashing algorithm
Pre-share - Use Pre-shared key as the authentication method
Group 2 - Diffie-Hellman group to be used
86400 – Session key lifetime. Expressed in either kilobytes (after x-amount of traffic, change the key) or seconds. Value set is the default
value.
We should note that ISAKMP Phase 1 policy is defined globally. This means that if we have five different remote sites and configured five
different ISAKMP Phase 1 policies (one for each remote router), when our router tries to negotiate a VPN tunnel with each site it will send
all five policies and use the first match that is accepted by both ends. Since we only have one ISAKMP policy, this will be used for all
remote VPN routers.
Next we are going to define a pre-shared key for authentication with our peers (R2 & R3 routers) by using the following command:
crypto isakmp key firewallcx address 0.0.0.0 0.0.0.0
The peers pre-shared key is set to firewallcx and note that we are defining a remote public IP address of 0.0.0.0 0.0.0.0. This tells our
headquarter router that the remote routers have dynamic public IP addresses and ensures it will try to negotiate and establish a VPN
(http://clixtrac.com
/goto/?100607)
Forensic Security Analysis
(http://clixtrac.com
/goto/?195375)
Web Vulnerability Scanner
(http://clixtrac.com
/goto/?191594)
WEBSITE SCANNER
(http://clixtrac.com
/goto/?211418)
NETWORK ANALYZER
(http://clixtrac.com
/goto/?195373)
(http://feeds.feedburner.com
/firewallcx)
(http://twitter.com
/firewallcx)
(https://www.facebook.com
/firewallcx)
(http://www.linkedin.com
/groups?home=&
gid=1037867)
JOIN US:
FACEBOOK - LIKE US!
POPULAR SECURITY
ARTICLES
Implications of Unsecure
Webservers & Websites
(/general-topics-reviews
/security-articles/1072-
implications-of-unsecure-
webservers-and-websites-
for-oganizations-
companies.html)
The Importance of
Firewall.…
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
3 of 11 3/11/2016 4:33 PM
tunnel with any router that requests it.
CONFIGURE IPSEC
To configure IPSec we need to setup the following in order:
- Create extended ACL
- Create IPSec Transform
- Create Dynamic Crypto Maps
- Apply crypto map to the public interface
Let us examine each of the above steps.
CREATING EXTENDED ACL
Next step is to create an access-list and define the traffic we would like the router to pass through each VPN tunnel. In this example, for
the first VPN tunnel it would be traffic from headquarters (10.10.10.0/24) to remote site 1 (20.20.20.0/24) and for the second VPN tunnel
it will be from our headquarters (10.10.10.0/24) to remote site 2 (30.30.30.0/24). Access-lists that define VPN traffic are sometimes
called crypto access-list or interesting traffic access-list.
Because we are dealing with two separate VPN tunnels, we’ll need to create one set of access-lists for each:
ip access-list extended VPN1-TRAFFIC
permit ip 10.10.10.0 0.0.0.255 20.20.20.0 0.0.0.255
!
ip access-list extended VPN2-TRAFFIC
permit ip 10.10.10.0 0.0.0.255 30.30.30.0 0.0.0.255
CREATE IPSEC TRANSFORM (ISAKMP PHASE 2 POLICY)
Now we need to create the transform set used to protect our data. We’ve named our transform set TS:
crypto ipsec transform-set TS esp-3des esp-md5-hmac
The above command defines the following:
- ESP-3DES - Encryption method
- MD5 - Hashing algorithm
CREATE DYNAMIC CRYPTO MAPS
The Crypto Map is the last step of our setup and connects the previously defined ISAKMP and IPSec configuration together. We will
need one dynamic crypto map for each remote endpoint, which means a total of two crypto maps for our setup.
First we create a crypto map named VPN which will be applied to the public interface of our headquarter router, and connect it with the
dynamic crypto maps we named as hq-vpn.
crypto map VPN 1 ipsec-isakmp dynamic hq-vpn
The ipsec-isakmp tag tells the router that this crypto map is an IPsec crypto map. Now we create our two dynamic crypto maps using
the following configuration commands:
Automating Web Security-
Penetration Testing
(/general-topics-reviews
/security-articles/1074-
automation-
web-application-security-
testing.html)
Choosing a Web
Application Security
Scanner (/general-topics-
reviews/security-articles
/1083-choosing-
web-application-security-
scanner.html)
Statistics Highlight the State
of Security of Web
Applications (/general-
topics-reviews/security-
articles/1073-state-
of-security-of-web-
applications.html)
Comparing Netsparker
Cloud & Desktop based
Security Software
(/general-topics-reviews
/cloud-based-solutions
/1079-cloud-based-
vs-desktop-based-security-
solutions.html)
How to Protect your
Websites and Web Server
from Hackers (/general-
topics-reviews/security-
articles/1092-security-
tips-how-to-protect-
your-websites-
and-webservers-
from-hackers.html)
CISCO PRESS REVIEW
PARTNER
(/site-news/316-firewall-
ciscopress.html)
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
4 of 11 3/11/2016 4:33 PM
crypto dynamic-map hq-vpn 10
set security-association lifetime seconds 86400
set transform-set TS
match address VPN1-TRAFFIC
!
crypto dynamic-map hq-vpn 11
set security-association lifetime seconds 86400
set transform-set TS
match address VPN2-TRAFFIC
Notice how we create one dynamic map for each remote network. The configuration is similar for each dynamic crypto map, with only the
instance number (10 , 11) and match address (VPN1-TRAFFIC , VPN2-TRAFFIC) changing.
Adding additional remote sites in the future is as easy as simply adding more dynamic crypto maps, incrementing the index number and
specifying the match address extended access-lists for each remote network.
 
APPLY CRYPTO MAP TO THE PUBLIC INTERFACE
The final step is to apply our crypto map to the public interface of the headquarter router, which is FastEthernet0/1. In many cases, this
might be a serial or ATM (ADSL - Dialer) interface:
interface FastEthernet0/1
crypto map VPN
Note that you can assign only one crypto map to an interface.
As soon as we apply crypto map on the interface, we receive a message from the router that confirms isakmp is on: “ISAKMP is ON”.
At this point, we have completed the IPSec VPN configuration on our headquarter router and we can move to the remote endpoint
routers.
CONFIGURING REMOTE ENDPOINT ROUTERS (DYNAMIC PUBLIC IP ADDRESSES)
Our remote routers connect to the Internet and are assigned a dynamic IP address which changes periodically by the ISP. In most part,
the configuration is similar to that of the headquarter router, but with a few minor changes.
In the configuration below, IP address 74.200.90.5 represents the public IP address of our headquarter router.
Remote Site 1 Router
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
!
crypto isakmp key firewallcx address 74.200.90.5
!
ip access-list extended VPN-TRAFFIC
permit ip 20.20.20.0 0.0.0.255 10.10.10.0 0.0.0.255
!
crypto ipsec transform-set TS esp-3des esp-md5-hmac
!
Notify me of new articles
Subscribe
CISCO MENU
CISCO ROUTERS
(/cisco-technical-
knowledgebase/cisco-
routers.html)
CISCO SWITCHES
(/cisco-technical-
knowledgebase/cisco-
switches.html)
CISCO VOIP/CCME -
CALLMANAGER
(/cisco-technical-
knowledgebase/cisco-
voice.html)
CISCO FIREWALLS
(/cisco-technical-
knowledgebase/cisco-
firewalls.html)
CISCO WIRELESS
(/cisco-technical-
knowledgebase/cisco-
wireless.html)
CISCO SERVICES &
TECHNOLOGIES
(/cisco-technical-
knowledgebase/cisco-
services-tech.html)
CISCO AUTHORS & CCIE
INTERVIEWS
(/cisco-technical-
knowledgebase/ccie-
experts.html)
POPULAR CISCO
ARTICLES
DMVPN Configuration (/cisco-
technical-knowledgebase
/cisco-routers/901-cisco-
router-dmvpn-
configuration.html)
Cisco IP SLA (/cisco-
technical-knowledgebase
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
5 of 11 3/11/2016 4:33 PM
crypto map vpn-to-hq 10 ipsec-isakmp
set peer 74.200.90.5
set transform-set TS
match address VPN-TRAFFIC
!
interface FastEthernet0/1
crypto map vpn-to-hq
Remote Site 2 Router
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 86400
!
crypto isakmp key firewallcx address 74.200.90.5
!
ip access-list extended VPN-TRAFFIC
permit ip 30.30.30.0 0.0.0.255 10.10.10.0 0.0.0.255
!
crypto ipsec transform-set TS esp-3des esp-md5-hmac
!
crypto map vpn-to-hq 10 ipsec-isakmp
set peer 74.200.90.5
set transform-set TS
match address VPN-TRAFFIC
!
interface FastEthernet0/1
crypto map vpn-to-hq
It is noticeable that the only major difference between the two routers configuration is the extended access list.
 
NETWORK ADDRESS TRANSLATION (NAT) AND IPSEC VPN TUNNELS
Network Address Translation (NAT) is most likely to be configured to provide Internet access to internal hosts. When configuring a
Site-to-Site VPN tunnel, it is imperative to instruct the router not to perform NAT (deny NAT) on packets destined to the remote VPN
networks.
This is easily done by inserting a deny statement at the beginning of the NAT access lists as shown below:
For the headquarter router, deny NAT for packets destined to the remote VPN networks, but allow NAT for all other networks (Internet):
ip nat inside source list 100 interface fastethernet0/1 overload
!
access-list 100 remark -=[Define NAT Service]=-
access-list 100 deny ip 10.10.10.0 0.0.0.255 20.20.20.0 0.0.0.255
access-list 100 deny ip 10.10.10.0 0.0.0.255 30.30.30.0 0.0.0.255
access-list 100 permit ip 10.10.10.0 0.0.0.255 any
access-list 100 remark
For Remote Site 1 Router, deny NAT for packets destined to the headquarter network:
/cisco-routers/813-cisco-
router-ipsla-basic.html)
VLAN Security (/cisco-
technical-knowledgebase
/cisco-switches/818-cisco-
switches-vlan-security.html)
4507R-E Installation (/cisco-
technical-knowledgebase
/cisco-switches/948-cisco-
switches-4507re-ws-x45-
sup7l-e-installation.html)
CallManager Express Intro
(/cisco-technical-
knowledgebase/cisco-
voice/371-cisco-ccme-part-
1.html)
Secure CME - SRTP & TLS
(/cisco-technical-
knowledgebase/cisco-
voice/956-cisco-voice-
cme-secure-voip.html)
Cisco Password Crack
(/cisco-technical-
knowledgebase/cisco-routers
/358-cisco-type7-password-
crack.html)
Site-to-Site VPN (/cisco-
technical-knowledgebase
/cisco-routers/867-cisco-
router-site-to-site-ipsec-
vpn.html)
FREE CISCO LAB
PARTNER
(http://clixtrac.com
/goto/?99238)
POPULAR LINUX
ARTICLES
Linux Init & RunLevels (/linux-
knowledgebase-tutorials/linux-
administration/845-linux-
administration-runlevels.html)
Linux Groups & Users (/linux-
knowledgebase-tutorials/linux-
administration/842-linux-
groups-user-accounts.html)
Linux Performance Monitoring
(/linux-knowledgebase-
tutorials/linux-administration
/837-linux-system-resource-
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
6 of 11 3/11/2016 4:33 PM
ip nat inside source list 100 interface fastethernet0/1 overload
!
access-list 100 remark -=[Define NAT Service]=-
access-list 100 deny ip 20.20.20.0 0.0.0.255 10.10.10.0 0.0.0.255
access-list 100 permit ip 20.20.20.0 0.0.0.255 any
access-list 100 remark
For Remote Site 2 Router, deny NAT for packets destined to the headquarter network:
ip nat inside source list 100 interface fastethernet0/1 overload
!
access-list 100 remark -=[Define NAT Service]=-
access-list 100 deny ip 30.30.30.0 0.0.0.255 10.10.10.0 0.0.0.255
access-list 100 permit ip 30.30.30.0 0.0.0.255 any
access-list 100 remark
BRINGING UP AND VERIFYING THE VPN TUNNEL
At this point, we’ve completed our configuration and the VPN Tunnel is ready to be brought up. To initiate the VPN Tunnel, we need to
force one packet to traverse the VPN and this can be achieved by pinging from one router to another. There is however one caveat that
was mentioned in the beginning of this article:
Site to Site VPN networks with Dynamic remote Public IP addresses can only be brought up by the remote sites.
The reason for this is simple and logical. Only the remote site routers are aware of the headquarter’s public IP address (74.200.90.5)
because it is static, and therefore only the remote router can initiate the VPN tunnel.
From Remote Site 1, let’s ping the headquarter router:
R2# ping 10.10.10.1 source fastethernet0/1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds:
Packet sent with a source address of 73.54.120.100
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 42/46/5
The first ping received a timeout, but the rest received a reply, as expected. The time required to bring up the VPN Tunnel is sometimes
slightly more than 2 seconds, causing the first ping to timeout.
To verify the VPN Tunnel, use the show crypto session command:
R2# show crypto session
Crypto session current status
Interface: FastEthernet0/1
Session status: UP-ACTIVE
Peer: 74.200.90.5 port 500
IKE SA: local 73.54.120.100/500 remote 74.200.90.5 /500 Active
IPSEC FLOW: permit ip 20.20.20.0/255.255.255.0 10.10.10.0/255.255.255.0
Active SAs: 2, origin: crypto map
From Remote Site 2, let’s ping the headquarter router:
monitoring.html)
Linux Vim Editor (/linux-
knowledgebase-tutorials/linux-
administration/836-linux-
vi.html)
Linux Samba (/linux-
knowledgebase-tutorials
/system-and-network-services
/848-linux-services-
samba.html)
Linux DHCP Server (/linux-
knowledgebase-tutorials
/system-and-network-services
/849-linux-services-
dhcp-server.html)
Linux Bind DNS (/general-
topics-reviews/linuxunix-
related/829-linux-
bind-introduction.html)
Linux File & Folder
Permissions (/general-topics-
reviews/linuxunix-related
/introduction-to-linux/299-linux-
file-folder-permissions.html)
Linux OpenMosix (/general-
topics-reviews/linuxunix-
related/openmosix-linux-
supercomputer.html)
Linux Network Config (/linux-
knowledgebase-tutorials/linux-
administration/851-linux-
services-tcpip.html)
BANDWIDTH
MONITORING
(http://clixtrac.com
/goto/?99758)
RSS SUBSCRIPTION
Subscribe to Firewall.cx RSS
Feed by Email
(http://feedburner.google.com
/fb/a/mailverify?uri=firewallcx&
loc=en_US)
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
7 of 11 3/11/2016 4:33 PM
R3# ping 10.10.10.1 source fastethernet0/1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds:
Packet sent with a source address of 85.100.120.5
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 47/50/53 ms
Again, the first ping received a timeout, but the rest received a reply, as expected. The time required to bring up the VPN Tunnel is
sometimes slightly more than 2 seconds, causing the first ping to timeout.
To verify the VPN Tunnel, use the show crypto session command:
R3# show crypto session
Crypto session current status
Interface: FastEthernet0/1
Session status: UP-ACTIVE
Peer: 74.200.90.5 port 500
IKE SA: local 85.100.120.5/500 remote 74.200.90.5 /500 Active
IPSEC FLOW: permit ip 30.30.30.0/255.255.255.0 10.10.10.0/255.255.255.0
Active SAs: 2, origin: crypto map
Issuing the show crypto session command at the headquarter router will reveal all remote routers public IP addresses. This is usually
a good shortcut when trying to figure out the public IP address of your remote routers.
(/cisco-technical-knowledgebase/cisco-routers.html)
Back to Cisco Routers Section (/cisco-technical-knowledgebase/cisco-routers.html)
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
8 of 11 3/11/2016 4:33 PM
33 Comments Sort by
Admasu Marie
it is really nice.
Like · Reply · 1 · 30 January 2013 15:20
Галч Отгонбилэг · Database Administrator at Monos group
Nice article.
Like · Reply · 1 · 4 February 2013 12:01
Demba Sonko · Maulana Azad National Institute of Technology, Bhopal
Great Article....
Like · Reply · 1 · 5 March 2013 00:10
Muneer Chakkalakkal · MAMO college manassery
System Admin Ict Qatar.
it is very help full.
Like · Reply · 1 · 25 February 2013 01:44
Edwin Pieters
For R1 (HQ router) I guess you ment :
interface fastethernet0/1
crypto map hq-vpn.
Small typo byt yet again excellent tutorial thanks a lot for this
Like · Reply · 1 · 28 March 2013 15:24
Chris Partsenidis · Founder, Editor-in-Chief at Firewall.cx
Thanks for the tip Edwin - small but important typo. We've also changed the crypto maps to ensure users do
not get confused with the remote R2/R3 routers. Thanks again!
Like · Reply · 28 March 2013 19:55
Derek Hyland
Shouldn't the WAN interface on the HQ router have the crypto map 'VPN' applied on it since 'hq-vpn' isn't a
crypto map in of itself?
Like · Reply · 1 · 18 May 2013 02:58
Chris Partsenidis · Founder, Editor-in-Chief at Firewall.cx
Derek Hyland, you are correct! There is a misconfiguration in the code. I've updated the article to reflect the
correct command. Thanks for your input!
Like · Reply · 1 · 18 May 2013 06:13
Show 2 more replies in this thread
Facebook Comments Plugin
OldestOldest
Add a comment...
Load 10 more comments
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
9 of 11 3/11/2016 4:33 PM
ARTICLES TO READ NEXT:
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
10 of 11 3/11/2016 4:33 PM
CCENT/CCNA
ROUTER BASICS (/CISCO-
TECHNICAL-
KNOWLEDGEBASE/CISCO-
ROUTERS/250-CISCO-
ROUTER-BASICS.HTML)
SUBNETTING
OSI MODEL
IP PROTOCOL
CISCO ROUTERS
SSL WEBVPN
SECURING ROUTERS
POLICY BASED ROUTING
ROUTER ON-A-STICK
VPN SECURITY
UNDERSTAND DMVPN
GRE/IPSEC CONFIGURATION
SITE-TO-SITE IPSEC VPN
IPSEC MODES
CISCO HELP
VPN CLIENT WINDOWS 8
VPN CLIENT WINDOWS 7
CCP DISPLAY PROBLEM
CISCO SUPPORT APP.
WINDOWS 2012
NEW FEATURES
LICENSING
HYPER-V / VDI
INSTALL HYPER-V
LINUX
FILE PERMISSIONS
WEBMIN
GROUPS - USERS
SAMBA SETUP
FIREWALL.CX TEAM
(/MEET-THE-TEAM.HTML)
NEWS
(/NEWS.HTML)
ALTERNATIVE MENU
(/SITE-MAP.HTML)
RECOMMENDED SITES
(/RECOMMENDED-SITES.HTML)
CONTACT US - FEEDBACK
(/CONTACT-US.HTML)
© Copyright 2000-2016 Firewall.cx - All Rights Reserved
Information and images contained on this site is copyrighted material.
Firewall.cx - Cisco Networking, VPN - IPSec, Security, Cisco Switching, Cisco Routers, Cisco VoIP- CallManager Express & UC500, Windows Server, Virtualization, Hyper-V, Web Security, Linux Administration
Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn...
11 of 11 3/11/2016 4:33 PM

More Related Content

What's hot

BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
Rassul Ismailov
 

What's hot (20)

Brksec 2101 deploying web security
Brksec 2101  deploying web securityBrksec 2101  deploying web security
Brksec 2101 deploying web security
 
An Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & GraphingAn Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
An Express Guide ~ Cacti for IT Infrastructure Monitoring & Graphing
 
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASAОсновные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
 
BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
 
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
 
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to Hero
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
Deep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private CloudDeep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private Cloud
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeSetting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
 
Cumulus Linux 2.5.5 What's New
Cumulus Linux 2.5.5 What's NewCumulus Linux 2.5.5 What's New
Cumulus Linux 2.5.5 What's New
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 

Viewers also liked

Marketing Presentation
Marketing PresentationMarketing Presentation
Marketing Presentation
Azhar Khan
 
(2016 10-06)enfermedades transmitidas por garrapatas(doc)
(2016 10-06)enfermedades transmitidas por garrapatas(doc)(2016 10-06)enfermedades transmitidas por garrapatas(doc)
(2016 10-06)enfermedades transmitidas por garrapatas(doc)
UDMAFyC SECTOR ZARAGOZA II
 

Viewers also liked (17)

Masoutenancedestagemichelin
MasoutenancedestagemichelinMasoutenancedestagemichelin
Masoutenancedestagemichelin
 
Islamic Concept of Jihad
Islamic Concept of JihadIslamic Concept of Jihad
Islamic Concept of Jihad
 
Collage
CollageCollage
Collage
 
Marketing Presentation
Marketing PresentationMarketing Presentation
Marketing Presentation
 
SHADER
SHADERSHADER
SHADER
 
LAS PLANTAS
LAS PLANTASLAS PLANTAS
LAS PLANTAS
 
Pay Your Interns - OpenLab Workshop
Pay Your Interns - OpenLab WorkshopPay Your Interns - OpenLab Workshop
Pay Your Interns - OpenLab Workshop
 
Método de multiresiduos para el análisis de pesticidas en pimiento y tomate p...
Método de multiresiduos para el análisis de pesticidas en pimiento y tomate p...Método de multiresiduos para el análisis de pesticidas en pimiento y tomate p...
Método de multiresiduos para el análisis de pesticidas en pimiento y tomate p...
 
LDA & LSI : à quoi peuvent-ils servir dans un moteur de recherche
LDA & LSI : à quoi peuvent-ils servir dans un moteur de rechercheLDA & LSI : à quoi peuvent-ils servir dans un moteur de recherche
LDA & LSI : à quoi peuvent-ils servir dans un moteur de recherche
 
Esta puente, mi espalda
Esta puente, mi espaldaEsta puente, mi espalda
Esta puente, mi espalda
 
TIG PD: "Take Your Classroom Global"
TIG PD: "Take Your Classroom Global"TIG PD: "Take Your Classroom Global"
TIG PD: "Take Your Classroom Global"
 
Barbault andré. tratado práctico de astrología
Barbault andré. tratado práctico de astrologíaBarbault andré. tratado práctico de astrología
Barbault andré. tratado práctico de astrología
 
Diario de doble entrada
Diario de doble entradaDiario de doble entrada
Diario de doble entrada
 
Diario de doble entrada naysa
Diario de doble entrada naysaDiario de doble entrada naysa
Diario de doble entrada naysa
 
Sistem solar
Sistem solarSistem solar
Sistem solar
 
Formación de alumnos para el futuro
Formación de alumnos para el futuroFormación de alumnos para el futuro
Formación de alumnos para el futuro
 
(2016 10-06)enfermedades transmitidas por garrapatas(doc)
(2016 10-06)enfermedades transmitidas por garrapatas(doc)(2016 10-06)enfermedades transmitidas por garrapatas(doc)
(2016 10-06)enfermedades transmitidas por garrapatas(doc)
 

Similar to Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers

26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
mmoizuddin
 
Cisco.350-701.v2021-12-14.q124.pdf
Cisco.350-701.v2021-12-14.q124.pdfCisco.350-701.v2021-12-14.q124.pdf
Cisco.350-701.v2021-12-14.q124.pdf
RoysLoudes
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
abdenour boussioud
 
EMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdf
EMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdfEMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdf
EMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdf
jawed29
 

Similar to Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers (20)

26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
Lan to lan vpn
Lan to lan vpnLan to lan vpn
Lan to lan vpn
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 
Vpn
VpnVpn
Vpn
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)
 
Lksn2017 itnsa modul2
Lksn2017 itnsa modul2Lksn2017 itnsa modul2
Lksn2017 itnsa modul2
 
PLNOG 13: Jacek Wosz: User Defined Network
PLNOG 13: Jacek Wosz: User Defined NetworkPLNOG 13: Jacek Wosz: User Defined Network
PLNOG 13: Jacek Wosz: User Defined Network
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)
 
Cisco.350-701.v2021-12-14.q124.pdf
Cisco.350-701.v2021-12-14.q124.pdfCisco.350-701.v2021-12-14.q124.pdf
Cisco.350-701.v2021-12-14.q124.pdf
 
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
 
Cloud stack networking shapeblue technical deep dive
Cloud stack networking   shapeblue technical deep diveCloud stack networking   shapeblue technical deep dive
Cloud stack networking shapeblue technical deep dive
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
 
[workshop] The Revolutionary WebRTC
[workshop] The Revolutionary WebRTC[workshop] The Revolutionary WebRTC
[workshop] The Revolutionary WebRTC
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Multicloud connectivity using OpenNHRP
Multicloud connectivity using OpenNHRPMulticloud connectivity using OpenNHRP
Multicloud connectivity using OpenNHRP
 
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
 
EMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdf
EMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdfEMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdf
EMEAR_Security_TAC_2021_IPSec_Site_to_Site_VPNs_on_FTD_Overview.pdf
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 

Recently uploaded

一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
wpkuukw
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
oopacde
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
ahmedjiabur940
 
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Priya Reddy
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
ougvy
 
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get CytotecBuy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
tufbav
 
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Obat Aborsi 088980685493 Jual Obat Aborsi
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
wpkuukw
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
wpkuukw
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
drmarathore
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
uodye
 

Recently uploaded (20)

一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
 
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get CytotecBuy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
 
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
 
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURELANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
LANDSLIDE MONITORING AND ALERT SYSTEM FINAL YEAR PROJECT BROCHURE
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
 
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime GuwahatiGuwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 

Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers

  • 1. CONFIGURING CISCO SITE TO SITE IPSEC VPN WITH DYNAMIC IP ENDPOINT CISCO ROUTERS WRITTEN BY ADMINISTRATOR. POSTED IN CISCO ROUTERS - CONFIGURING CISCO ROUTERS (/CISCO-TECHNICAL-KNOWLEDGEBASE/CISCO- ROUTERS.HTML) (http://www.firewall.cx) FRIDAY, 11 MARCH 2016 FIREWALL.CX TEAM (/MEET-THE-TEAM.HTML) NEWS (/NEWS.HTML) ALTERNATIVE MENU (/SITE-MAP.HTML) RECOMMENDED SITES (/RECOMMENDED-SITES.HTML) CONTACT US - FEEDBACK (/CONTACT-US.HTML) HOME (/) NETWORKING (/networking-topics.html) CISCO (/cisco-technical-knowledgebase.html) MICROSOFT (/microsoft-knowledgebase.html) LINUX (/linux-knowledgebase-tutorials.html) MORE CONTENT (/general-topics-reviews.html) DOWNLOADS (/downloads.html) FORUM (/forums.html) HOT DOWNLOADS (http://clixtrac.com/goto/?99230) NETWORK FORENSIC ANALYSIS (HTTP://CLIXTRAC.COM (http://clixtrac.com/goto/?99229) NETWORK VULNERABILITY SCANNER (HTTP://CLIXTRAC.COM (http://clixtrac.com/goto/?99229) NETWORK SECURITY SCANNER (HTTP://CLIXTRAC.COM (/component/banners/click/2.html) Rating 4.61 (23 Votes) Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 1 of 11 3/11/2016 4:33 PM
  • 2. This article serves as an extension to our popular Cisco VPN topics covered here on Firewall.cx. While we’ve covered Site to Site IPSec VPN Tunnel Between Cisco Routers (/cisco-technical-knowledgebase/cisco-routers/867-cisco-router-site-to-site-ipsec-vpn.html) (using static public IP addresses), we will now take a look on how to configure our headquarter Cisco router to support remote Cisco routers with dynamic IP addresses. One important note to keep in mind when it comes to this implementation, is that Site-to-Site VPN networks with Dynamic remote Public IP addresses can only be brought up by the remote site routers as only they are aware of the headquarter's router Public IP address. IPSec VPN tunnels can also be configured using GRE (Generic Routing Encapsulation) Tunnels with IPsec encryption. GRE tunnels greatly simply the configuration and administration of VPN tunnels and are covered in our Configuring Point-to-Point GRE VPN Tunnels (/cisco-technical-knowledgebase/cisco-routers/868-cisco-router-gre-ipsec.html) article. Lastly, DMVPNs – a new VPN trend that provide outstanding flexibility and almost no administration overhead can also be examined by reading our Understanding Cisco Dynamic Multipoint VPN (DMVPN) (/cisco-technical-knowledgebase/cisco-services-tech/896-cisco-dmvpn-intro.html), Dynamic Multipoint VPN (DMVPN) Deployment Models & Architectures (/cisco-technical-knowledgebase/cisco-services-tech/908-cisco-dmvpn-models.html) and Configuring Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing - DMVPN Configuration (/cisco-technical- knowledgebase/cisco-routers/901-cisco-router-dmvpn-configuration.html)articles. ISAKMP (Internet Security Association and Key Management Protocol) and IPSec (/networking-topics/protocols/127-ip-security- protocol.html) are essential to building and encrypting the VPN tunnel. ISAKMP, also called IKE (Internet Key Exchange), is the negotiation protocol that allows two hosts to agree on how to build an IPsec security association. ISAKMP negotiation consists of two phases: Phase 1 and Phase 2. Phase 1 creates the first tunnel, which protects later ISAKMP negotiation messages. Phase 2 creates the tunnel that protects data. IPSec then comes into play to encrypt the data using encryption algorithms and provides authentication, encryption and anti-replay services.   IPSEC VPN REQUIREMENTS To help make this an easy-to-follow exercise, we have split it into two required steps to get the Site-to-Site IPSec Dynamic IP Endpoint VPN Tunnel to work. These steps are: (1) Configure ISAKMP (ISAKMP Phase 1) (2) Configure IPSec (ISAKMP Phase 2, ACLs, Crypto MAP) Our example setup consists of the headquarter router R1 which is assigned a static public IP address, and two remote routers, R2 & R3. Both remote routers (R2 & R3) connect to the Internet and have a dynamic public IP address assigned by the ISP, as shown in the diagram below: NETWORK SECURITY SCANNER (http://clixtrac.com /goto/?99232) FREE HYPER-V & VMWARE BACKUP (http://clixtrac.com /goto/?210273) RECOMMENDED DOWNLOADS Web Security (http://clixtrac.com /goto/?99233) Free Hyper-V & VMware Backup (http://clixtrac.com /goto/?210270) Server AntiSpam (http://clixtrac.com /goto/?99234) Network Scanner (http://clixtrac.com /goto/?99235) IDS Security Manager (http://clixtrac.com /goto/?99236) Web-Proxy Monitor (http://clixtrac.com /goto/?99237) Network Analyzer - Sniffer (http://clixtrac.com /goto/?195370) Cisco VPN Client (/downloads/cisco-tools- a-applications.html) Network Fax Server Tweet (//pinterest.com/pin/create/button/?url=http%3A%2F%2Fwww.firewall.cx%2Fcisco-technical-knowledgebase%2Fcisco-routers%2F936-cisco-router-vpn-dynamic-endpoint.html&media=http%3A%2F %2Fwww.firewall.cx%2Fimages%2Fstories%2Fcisco-router-ipsec-vpn-dynamic-endpoint-1.png& description=%26amp%3Bnbsp%3BThis%20article%20serves%20as%20an%20extension%20to%20our%20popular%20Cisco%20VPN%20topics%20covered%20here%20on%20Firewall.cx.%20While%20we%26rsquo%3B Share 106 people like this. Be the first of your friends. LikeLike ShareShare Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 2 of 11 3/11/2016 4:33 PM
  • 3. Our Headquarters is assigned an internal network of 10.10.10.0/24, while Remote Site 1 has been assigned network 20.20.20.0/24. and Remote Site 2 network 30.30.30.0/24. The goal is to securely connect both remote sites with our headquarters and allow full communication, without any restrictions.   CONFIGURE ISAKMP (IKE) - (ISAKMP PHASE 1) IKE exists only to establish SAs (Security Association) for IPsec. Before it can do this, IKE must negotiate an SA (an ISAKMP SA) relationship with the peer. To begin, we’ll start working on the Headquarter router (R1). First step is to configure an ISAKMP Phase 1 policy: crypto isakmp policy 1 encr 3des hash md5 authentication pre-share group 2 lifetime 86400 The above commands define the following (in listed order): 3DES - The encryption method to be used for Phase 1. MD5 - The hashing algorithm Pre-share - Use Pre-shared key as the authentication method Group 2 - Diffie-Hellman group to be used 86400 – Session key lifetime. Expressed in either kilobytes (after x-amount of traffic, change the key) or seconds. Value set is the default value. We should note that ISAKMP Phase 1 policy is defined globally. This means that if we have five different remote sites and configured five different ISAKMP Phase 1 policies (one for each remote router), when our router tries to negotiate a VPN tunnel with each site it will send all five policies and use the first match that is accepted by both ends. Since we only have one ISAKMP policy, this will be used for all remote VPN routers. Next we are going to define a pre-shared key for authentication with our peers (R2 & R3 routers) by using the following command: crypto isakmp key firewallcx address 0.0.0.0 0.0.0.0 The peers pre-shared key is set to firewallcx and note that we are defining a remote public IP address of 0.0.0.0 0.0.0.0. This tells our headquarter router that the remote routers have dynamic public IP addresses and ensures it will try to negotiate and establish a VPN (http://clixtrac.com /goto/?100607) Forensic Security Analysis (http://clixtrac.com /goto/?195375) Web Vulnerability Scanner (http://clixtrac.com /goto/?191594) WEBSITE SCANNER (http://clixtrac.com /goto/?211418) NETWORK ANALYZER (http://clixtrac.com /goto/?195373) (http://feeds.feedburner.com /firewallcx) (http://twitter.com /firewallcx) (https://www.facebook.com /firewallcx) (http://www.linkedin.com /groups?home=& gid=1037867) JOIN US: FACEBOOK - LIKE US! POPULAR SECURITY ARTICLES Implications of Unsecure Webservers & Websites (/general-topics-reviews /security-articles/1072- implications-of-unsecure- webservers-and-websites- for-oganizations- companies.html) The Importance of Firewall.… Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 3 of 11 3/11/2016 4:33 PM
  • 4. tunnel with any router that requests it. CONFIGURE IPSEC To configure IPSec we need to setup the following in order: - Create extended ACL - Create IPSec Transform - Create Dynamic Crypto Maps - Apply crypto map to the public interface Let us examine each of the above steps. CREATING EXTENDED ACL Next step is to create an access-list and define the traffic we would like the router to pass through each VPN tunnel. In this example, for the first VPN tunnel it would be traffic from headquarters (10.10.10.0/24) to remote site 1 (20.20.20.0/24) and for the second VPN tunnel it will be from our headquarters (10.10.10.0/24) to remote site 2 (30.30.30.0/24). Access-lists that define VPN traffic are sometimes called crypto access-list or interesting traffic access-list. Because we are dealing with two separate VPN tunnels, we’ll need to create one set of access-lists for each: ip access-list extended VPN1-TRAFFIC permit ip 10.10.10.0 0.0.0.255 20.20.20.0 0.0.0.255 ! ip access-list extended VPN2-TRAFFIC permit ip 10.10.10.0 0.0.0.255 30.30.30.0 0.0.0.255 CREATE IPSEC TRANSFORM (ISAKMP PHASE 2 POLICY) Now we need to create the transform set used to protect our data. We’ve named our transform set TS: crypto ipsec transform-set TS esp-3des esp-md5-hmac The above command defines the following: - ESP-3DES - Encryption method - MD5 - Hashing algorithm CREATE DYNAMIC CRYPTO MAPS The Crypto Map is the last step of our setup and connects the previously defined ISAKMP and IPSec configuration together. We will need one dynamic crypto map for each remote endpoint, which means a total of two crypto maps for our setup. First we create a crypto map named VPN which will be applied to the public interface of our headquarter router, and connect it with the dynamic crypto maps we named as hq-vpn. crypto map VPN 1 ipsec-isakmp dynamic hq-vpn The ipsec-isakmp tag tells the router that this crypto map is an IPsec crypto map. Now we create our two dynamic crypto maps using the following configuration commands: Automating Web Security- Penetration Testing (/general-topics-reviews /security-articles/1074- automation- web-application-security- testing.html) Choosing a Web Application Security Scanner (/general-topics- reviews/security-articles /1083-choosing- web-application-security- scanner.html) Statistics Highlight the State of Security of Web Applications (/general- topics-reviews/security- articles/1073-state- of-security-of-web- applications.html) Comparing Netsparker Cloud & Desktop based Security Software (/general-topics-reviews /cloud-based-solutions /1079-cloud-based- vs-desktop-based-security- solutions.html) How to Protect your Websites and Web Server from Hackers (/general- topics-reviews/security- articles/1092-security- tips-how-to-protect- your-websites- and-webservers- from-hackers.html) CISCO PRESS REVIEW PARTNER (/site-news/316-firewall- ciscopress.html) Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 4 of 11 3/11/2016 4:33 PM
  • 5. crypto dynamic-map hq-vpn 10 set security-association lifetime seconds 86400 set transform-set TS match address VPN1-TRAFFIC ! crypto dynamic-map hq-vpn 11 set security-association lifetime seconds 86400 set transform-set TS match address VPN2-TRAFFIC Notice how we create one dynamic map for each remote network. The configuration is similar for each dynamic crypto map, with only the instance number (10 , 11) and match address (VPN1-TRAFFIC , VPN2-TRAFFIC) changing. Adding additional remote sites in the future is as easy as simply adding more dynamic crypto maps, incrementing the index number and specifying the match address extended access-lists for each remote network.   APPLY CRYPTO MAP TO THE PUBLIC INTERFACE The final step is to apply our crypto map to the public interface of the headquarter router, which is FastEthernet0/1. In many cases, this might be a serial or ATM (ADSL - Dialer) interface: interface FastEthernet0/1 crypto map VPN Note that you can assign only one crypto map to an interface. As soon as we apply crypto map on the interface, we receive a message from the router that confirms isakmp is on: “ISAKMP is ON”. At this point, we have completed the IPSec VPN configuration on our headquarter router and we can move to the remote endpoint routers. CONFIGURING REMOTE ENDPOINT ROUTERS (DYNAMIC PUBLIC IP ADDRESSES) Our remote routers connect to the Internet and are assigned a dynamic IP address which changes periodically by the ISP. In most part, the configuration is similar to that of the headquarter router, but with a few minor changes. In the configuration below, IP address 74.200.90.5 represents the public IP address of our headquarter router. Remote Site 1 Router crypto isakmp policy 1 encr 3des hash md5 authentication pre-share group 2 lifetime 86400 ! crypto isakmp key firewallcx address 74.200.90.5 ! ip access-list extended VPN-TRAFFIC permit ip 20.20.20.0 0.0.0.255 10.10.10.0 0.0.0.255 ! crypto ipsec transform-set TS esp-3des esp-md5-hmac ! Notify me of new articles Subscribe CISCO MENU CISCO ROUTERS (/cisco-technical- knowledgebase/cisco- routers.html) CISCO SWITCHES (/cisco-technical- knowledgebase/cisco- switches.html) CISCO VOIP/CCME - CALLMANAGER (/cisco-technical- knowledgebase/cisco- voice.html) CISCO FIREWALLS (/cisco-technical- knowledgebase/cisco- firewalls.html) CISCO WIRELESS (/cisco-technical- knowledgebase/cisco- wireless.html) CISCO SERVICES & TECHNOLOGIES (/cisco-technical- knowledgebase/cisco- services-tech.html) CISCO AUTHORS & CCIE INTERVIEWS (/cisco-technical- knowledgebase/ccie- experts.html) POPULAR CISCO ARTICLES DMVPN Configuration (/cisco- technical-knowledgebase /cisco-routers/901-cisco- router-dmvpn- configuration.html) Cisco IP SLA (/cisco- technical-knowledgebase Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 5 of 11 3/11/2016 4:33 PM
  • 6. crypto map vpn-to-hq 10 ipsec-isakmp set peer 74.200.90.5 set transform-set TS match address VPN-TRAFFIC ! interface FastEthernet0/1 crypto map vpn-to-hq Remote Site 2 Router crypto isakmp policy 1 encr 3des hash md5 authentication pre-share group 2 lifetime 86400 ! crypto isakmp key firewallcx address 74.200.90.5 ! ip access-list extended VPN-TRAFFIC permit ip 30.30.30.0 0.0.0.255 10.10.10.0 0.0.0.255 ! crypto ipsec transform-set TS esp-3des esp-md5-hmac ! crypto map vpn-to-hq 10 ipsec-isakmp set peer 74.200.90.5 set transform-set TS match address VPN-TRAFFIC ! interface FastEthernet0/1 crypto map vpn-to-hq It is noticeable that the only major difference between the two routers configuration is the extended access list.   NETWORK ADDRESS TRANSLATION (NAT) AND IPSEC VPN TUNNELS Network Address Translation (NAT) is most likely to be configured to provide Internet access to internal hosts. When configuring a Site-to-Site VPN tunnel, it is imperative to instruct the router not to perform NAT (deny NAT) on packets destined to the remote VPN networks. This is easily done by inserting a deny statement at the beginning of the NAT access lists as shown below: For the headquarter router, deny NAT for packets destined to the remote VPN networks, but allow NAT for all other networks (Internet): ip nat inside source list 100 interface fastethernet0/1 overload ! access-list 100 remark -=[Define NAT Service]=- access-list 100 deny ip 10.10.10.0 0.0.0.255 20.20.20.0 0.0.0.255 access-list 100 deny ip 10.10.10.0 0.0.0.255 30.30.30.0 0.0.0.255 access-list 100 permit ip 10.10.10.0 0.0.0.255 any access-list 100 remark For Remote Site 1 Router, deny NAT for packets destined to the headquarter network: /cisco-routers/813-cisco- router-ipsla-basic.html) VLAN Security (/cisco- technical-knowledgebase /cisco-switches/818-cisco- switches-vlan-security.html) 4507R-E Installation (/cisco- technical-knowledgebase /cisco-switches/948-cisco- switches-4507re-ws-x45- sup7l-e-installation.html) CallManager Express Intro (/cisco-technical- knowledgebase/cisco- voice/371-cisco-ccme-part- 1.html) Secure CME - SRTP & TLS (/cisco-technical- knowledgebase/cisco- voice/956-cisco-voice- cme-secure-voip.html) Cisco Password Crack (/cisco-technical- knowledgebase/cisco-routers /358-cisco-type7-password- crack.html) Site-to-Site VPN (/cisco- technical-knowledgebase /cisco-routers/867-cisco- router-site-to-site-ipsec- vpn.html) FREE CISCO LAB PARTNER (http://clixtrac.com /goto/?99238) POPULAR LINUX ARTICLES Linux Init & RunLevels (/linux- knowledgebase-tutorials/linux- administration/845-linux- administration-runlevels.html) Linux Groups & Users (/linux- knowledgebase-tutorials/linux- administration/842-linux- groups-user-accounts.html) Linux Performance Monitoring (/linux-knowledgebase- tutorials/linux-administration /837-linux-system-resource- Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 6 of 11 3/11/2016 4:33 PM
  • 7. ip nat inside source list 100 interface fastethernet0/1 overload ! access-list 100 remark -=[Define NAT Service]=- access-list 100 deny ip 20.20.20.0 0.0.0.255 10.10.10.0 0.0.0.255 access-list 100 permit ip 20.20.20.0 0.0.0.255 any access-list 100 remark For Remote Site 2 Router, deny NAT for packets destined to the headquarter network: ip nat inside source list 100 interface fastethernet0/1 overload ! access-list 100 remark -=[Define NAT Service]=- access-list 100 deny ip 30.30.30.0 0.0.0.255 10.10.10.0 0.0.0.255 access-list 100 permit ip 30.30.30.0 0.0.0.255 any access-list 100 remark BRINGING UP AND VERIFYING THE VPN TUNNEL At this point, we’ve completed our configuration and the VPN Tunnel is ready to be brought up. To initiate the VPN Tunnel, we need to force one packet to traverse the VPN and this can be achieved by pinging from one router to another. There is however one caveat that was mentioned in the beginning of this article: Site to Site VPN networks with Dynamic remote Public IP addresses can only be brought up by the remote sites. The reason for this is simple and logical. Only the remote site routers are aware of the headquarter’s public IP address (74.200.90.5) because it is static, and therefore only the remote router can initiate the VPN tunnel. From Remote Site 1, let’s ping the headquarter router: R2# ping 10.10.10.1 source fastethernet0/1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds: Packet sent with a source address of 73.54.120.100 .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 42/46/5 The first ping received a timeout, but the rest received a reply, as expected. The time required to bring up the VPN Tunnel is sometimes slightly more than 2 seconds, causing the first ping to timeout. To verify the VPN Tunnel, use the show crypto session command: R2# show crypto session Crypto session current status Interface: FastEthernet0/1 Session status: UP-ACTIVE Peer: 74.200.90.5 port 500 IKE SA: local 73.54.120.100/500 remote 74.200.90.5 /500 Active IPSEC FLOW: permit ip 20.20.20.0/255.255.255.0 10.10.10.0/255.255.255.0 Active SAs: 2, origin: crypto map From Remote Site 2, let’s ping the headquarter router: monitoring.html) Linux Vim Editor (/linux- knowledgebase-tutorials/linux- administration/836-linux- vi.html) Linux Samba (/linux- knowledgebase-tutorials /system-and-network-services /848-linux-services- samba.html) Linux DHCP Server (/linux- knowledgebase-tutorials /system-and-network-services /849-linux-services- dhcp-server.html) Linux Bind DNS (/general- topics-reviews/linuxunix- related/829-linux- bind-introduction.html) Linux File & Folder Permissions (/general-topics- reviews/linuxunix-related /introduction-to-linux/299-linux- file-folder-permissions.html) Linux OpenMosix (/general- topics-reviews/linuxunix- related/openmosix-linux- supercomputer.html) Linux Network Config (/linux- knowledgebase-tutorials/linux- administration/851-linux- services-tcpip.html) BANDWIDTH MONITORING (http://clixtrac.com /goto/?99758) RSS SUBSCRIPTION Subscribe to Firewall.cx RSS Feed by Email (http://feedburner.google.com /fb/a/mailverify?uri=firewallcx& loc=en_US) Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 7 of 11 3/11/2016 4:33 PM
  • 8. R3# ping 10.10.10.1 source fastethernet0/1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds: Packet sent with a source address of 85.100.120.5 .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 47/50/53 ms Again, the first ping received a timeout, but the rest received a reply, as expected. The time required to bring up the VPN Tunnel is sometimes slightly more than 2 seconds, causing the first ping to timeout. To verify the VPN Tunnel, use the show crypto session command: R3# show crypto session Crypto session current status Interface: FastEthernet0/1 Session status: UP-ACTIVE Peer: 74.200.90.5 port 500 IKE SA: local 85.100.120.5/500 remote 74.200.90.5 /500 Active IPSEC FLOW: permit ip 30.30.30.0/255.255.255.0 10.10.10.0/255.255.255.0 Active SAs: 2, origin: crypto map Issuing the show crypto session command at the headquarter router will reveal all remote routers public IP addresses. This is usually a good shortcut when trying to figure out the public IP address of your remote routers. (/cisco-technical-knowledgebase/cisco-routers.html) Back to Cisco Routers Section (/cisco-technical-knowledgebase/cisco-routers.html) Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 8 of 11 3/11/2016 4:33 PM
  • 9. 33 Comments Sort by Admasu Marie it is really nice. Like · Reply · 1 · 30 January 2013 15:20 Галч Отгонбилэг · Database Administrator at Monos group Nice article. Like · Reply · 1 · 4 February 2013 12:01 Demba Sonko · Maulana Azad National Institute of Technology, Bhopal Great Article.... Like · Reply · 1 · 5 March 2013 00:10 Muneer Chakkalakkal · MAMO college manassery System Admin Ict Qatar. it is very help full. Like · Reply · 1 · 25 February 2013 01:44 Edwin Pieters For R1 (HQ router) I guess you ment : interface fastethernet0/1 crypto map hq-vpn. Small typo byt yet again excellent tutorial thanks a lot for this Like · Reply · 1 · 28 March 2013 15:24 Chris Partsenidis · Founder, Editor-in-Chief at Firewall.cx Thanks for the tip Edwin - small but important typo. We've also changed the crypto maps to ensure users do not get confused with the remote R2/R3 routers. Thanks again! Like · Reply · 28 March 2013 19:55 Derek Hyland Shouldn't the WAN interface on the HQ router have the crypto map 'VPN' applied on it since 'hq-vpn' isn't a crypto map in of itself? Like · Reply · 1 · 18 May 2013 02:58 Chris Partsenidis · Founder, Editor-in-Chief at Firewall.cx Derek Hyland, you are correct! There is a misconfiguration in the code. I've updated the article to reflect the correct command. Thanks for your input! Like · Reply · 1 · 18 May 2013 06:13 Show 2 more replies in this thread Facebook Comments Plugin OldestOldest Add a comment... Load 10 more comments Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 9 of 11 3/11/2016 4:33 PM
  • 10. ARTICLES TO READ NEXT: Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 10 of 11 3/11/2016 4:33 PM
  • 11. CCENT/CCNA ROUTER BASICS (/CISCO- TECHNICAL- KNOWLEDGEBASE/CISCO- ROUTERS/250-CISCO- ROUTER-BASICS.HTML) SUBNETTING OSI MODEL IP PROTOCOL CISCO ROUTERS SSL WEBVPN SECURING ROUTERS POLICY BASED ROUTING ROUTER ON-A-STICK VPN SECURITY UNDERSTAND DMVPN GRE/IPSEC CONFIGURATION SITE-TO-SITE IPSEC VPN IPSEC MODES CISCO HELP VPN CLIENT WINDOWS 8 VPN CLIENT WINDOWS 7 CCP DISPLAY PROBLEM CISCO SUPPORT APP. WINDOWS 2012 NEW FEATURES LICENSING HYPER-V / VDI INSTALL HYPER-V LINUX FILE PERMISSIONS WEBMIN GROUPS - USERS SAMBA SETUP FIREWALL.CX TEAM (/MEET-THE-TEAM.HTML) NEWS (/NEWS.HTML) ALTERNATIVE MENU (/SITE-MAP.HTML) RECOMMENDED SITES (/RECOMMENDED-SITES.HTML) CONTACT US - FEEDBACK (/CONTACT-US.HTML) © Copyright 2000-2016 Firewall.cx - All Rights Reserved Information and images contained on this site is copyrighted material. Firewall.cx - Cisco Networking, VPN - IPSec, Security, Cisco Switching, Cisco Routers, Cisco VoIP- CallManager Express & UC500, Windows Server, Virtualization, Hyper-V, Web Security, Linux Administration Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/936-cisco-router-vpn-dyn... 11 of 11 3/11/2016 4:33 PM