Hi corness,

Thanks fer your earlier replies....



My setup as follows..

  
pvt network-----Router----Internet-----Pix----pvt network

I want to do a VPN between the private networks using ipsec.I am concerned
with router side.The s0 (10.1.0.1/24) of router is connected to pvt network
and e0(210.11.3.1/24) to internet.

I do the following on my router

access-list 101 permit 10.1.0.0 255.255.255.0 172.1.0.0 255.255.255.255
crypto ipsec transform-set set1 esp-des esp-sha-hmac
crypto map vpn 10 ipsec-isakmp
crypto map vpn 10 match-address 101
crypto map vpn set peer 210.14.7.2
crypto map vpn set transform-set set1

isakmp enable e0
isakmp policy 20
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 authentication rsa-sig
isakmp policy 20 group 1

interface e0
crypto map vpn
--------------------------------------------------------------------
My questions...

1)What kind of static route should I add?(I want only 10.1.0.0 to talk to
172.1.0.0 and vice versa using vpn.Rest all denied)

2)Do I need this if I don`t use nat on my router?
route-map nonat permit 10
  match ip address 130

3)Will this access list help me with security((i.e)except for 172.1.0.0 all
other network cannot reach pvt network)?

access_list 140 permit ip 172.1.0.0 0.0.0.0 any
access_list 140 deny ip any any
acl_group 140 e0 out 

cheers
Ramesh




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=28256&t=21120
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to