Thanks for the reply, but this doesnt work
I have the more specific acl and even created a LOG to syslog and its 
matching correctly but doesnt work

any ideas






On Wed, 2003-06-25 at 15:35, Robert Perez wrote:
> I would do your more specific ACL entry and make sure your inverted mask is
> correct such as 192.1.1.0 0.0.0.255.  Once you do that then issue the
> following commands to reset the tunnel and force a renegotiation.  
> 
> Clear crypto ipsec sa
> clear crypto isakmp sa
> 
> That should do it...
> 
> -----Original Message-----
> From: ian williams [mailto:[EMAIL PROTECTED] 
> Sent: Wednesday, June 25, 2003 8:33 AM
> To: [EMAIL PROTECTED]
> Subject: crypto maps and IPSEC tunnels [7:71341]
> 
> 
> Hi
> 
> I have just setup a IPSEC tunnel between to routers and tunneling a source
> address of 192.168.50.1 going to a host on router B 172.x.x.x./24
Everything
> works with the current configs given below. But I want to change the acl
101
> on router B from using a class A mask to something like a class C mask or
> even a host address. I have changed the ACL 101 and even added a deny ip
any
> any log to the end to see what is being dropped. The VPN tunnel doesnt come
> up unless I use a class A mask like showen below. I know this is an ACL but
> is being used for matching traffic, do they work differently and dont
> support host address ??
> 
> Thanks
> 
> Ian
> 
> 
> 
> Here is the config of router A
> 
> 
> !
> crypto isakmp policy 10
>  encr 3des
>  hash md5
>  authentication pre-share
> crypto isakmp key cisco address 10.10.10.10
> !
> !
> crypto ipsec transform-set TEST esp-3des
> !
> crypto map cisco 1 ipsec-isakmp
>  set peer 10.10.10.10
>  set transform-set TEST
>  match address 101
> 
> access-list 101 permit ip 192.0.0.0 0.255.255.255 10.0.0.0 0.255.255.255
> access-list 101 permit ip 192.0.0.0 0.255.255.255 172.0.0.0 0.255.255.255
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> Here is the config router B
> 
> crypto isakmp policy 10
>  encr 3des
>  hash md5
>  authentication pre-share
> crypto isakmp key password address 10.10.10.20
> !
> !
> crypto ipsec transform-set TEST esp-3des
> !
> crypto map cisco 1 ipsec-isakmp
>  set peer 10.10.10.20
>  set transform-set TEST
>  match address 101
> 
> access-list 101 permit ip 172.0.0.0 0.255.255.255 192.0.0.0 0.255.255.255
> access-list 101 permit ip host 10.10.10.10 host 10.10.10.20




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=71353&t=71341
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to