<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cisco Routers Archives - Network Guy</title>
	<atom:link href="https://networkguy.de/category/cisco-routers/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Share your knowledge!</description>
	<lastBuildDate>Wed, 26 Sep 2018 13:07:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://networkguy.de/wp-content/uploads/2016/09/cropped-og-image-32x32.jpg</url>
	<title>Cisco Routers Archives - Network Guy</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">35051042</site>	<item>
		<title>Site2Site VPN with ubiquiti and Cisco router</title>
		<link>https://networkguy.de/site2site-vpn-with-ubiquiti-and-cisco-router/</link>
					<comments>https://networkguy.de/site2site-vpn-with-ubiquiti-and-cisco-router/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Thu, 05 Oct 2017 14:58:39 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=1738</guid>

					<description><![CDATA[<p>One of my customer asked me to do a site2site VPN with his home ubiquiti router. I said &#8220;Yeah sure, we can try&#8230;&#8221; and it wasn&#8217;t very hard to accomplish this. Site2site IPsec VPN with dynamic peers to a Cisco router and parralel EasyVPN Cisco VPN users is not possible! In this case, the company is [&#8230;]</p>
<p>The post <a href="https://networkguy.de/site2site-vpn-with-ubiquiti-and-cisco-router/">Site2Site VPN with ubiquiti and Cisco router</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of my customer asked me to do a site2site VPN with his home ubiquiti router. I said &#8220;Yeah sure, we can try&#8230;&#8221; and it wasn&#8217;t very hard to accomplish this. Site2site IPsec VPN with dynamic peers to a Cisco router and parralel EasyVPN Cisco VPN users is not possible! In this case, the company is using SSL VPN for the road warriors, so we had no problem here. First, I configured the Cisco router in the headquarter. The IP subnet at home is 192.168.200.0/24:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null"># Phase 1 Parameter
crypto isakmp policy 10
 encr aes
 authentication pre-share
 group 2

# Phase 2 Parameter
crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac
 mode tunnel
crypto ipsec security-association lifetime seconds 28800

# PreSharedKey for all dynamic VPN partners
crypto isakmp key MYSECRETPASSWORD address 0.0.0.0 no-xauth
crypto dynamic-map DynamicNetworks 10
 description VPN from dynamic IPs
 set transform-set ESP-AES-SHA
 set pfs group2
 match address homeoffice1

ip access-list extended homeoffice1
 permit ip 192.168.10.0 0.0.0.255 192.168.200.0 0.0.0.255
 permit ip 192.168.20.0 0.0.0.255 192.168.200.0 0.0.0.255
 permit ip 192.168.40.0 0.0.0.255 192.168.200.0 0.0.0.255

crypto map CompanyMap 210 ipsec-isakmp dynamic DynamicNetworks

interface GigabitEthernet0/1
 description WAN Interface
 crypto map CompanyMap</pre>
<p>&nbsp;</p>
<p>the Cisco router is now able to react on dynamic VPN peers. Keep in mind to &#8220;no-nat&#8221; VPN traffic, otherwhise you can&#8217;t reach the remote network.</p>
<p>After this I logged on into the ubiquiti interface and saw a very simple GUI :) so I connected to the shell via SSH and found some commands for configuring hidden VPN parameters. After some tries, here&#8217;s my final config:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">configure

set vpn ipsec auto-firewall-nat-exclude enable

# Phase 1 Parameters
set vpn ipsec ike-group MyCompany lifetime 86400
set vpn ipsec ike-group MyCompany proposal 1 dh-group 2
set vpn ipsec ike-group MyCompany proposal 1 encryption aes128
set vpn ipsec ike-group MyCompany proposal 1 hash sha1

# Phase 2 Parameters
set vpn ipsec esp-group MyCompany lifetime 28800
set vpn ipsec esp-group MyCompany pfs dh-group2
set vpn ipsec esp-group MyCompany proposal 1 encryption aes128
set vpn ipsec esp-group MyCompany proposal 1 hash sha1

# PreSharedKey (11.22.33.44 is an example for the fixed VPN gateway IP address)
set vpn ipsec site-to-site peer 11.22.33.44 authentication mode pre-shared-secret
set vpn ipsec site-to-site peer 11.22.33.44 authentication pre-shared-secret MYSECRETPASSWORD
set vpn ipsec site-to-site peer 11.22.33.44 description MyCompany

set vpn ipsec site-to-site peer 11.22.33.44 local-address any
set vpn ipsec site-to-site peer 11.22.33.44 ike-group MyCompany

# Tunnel Definitions
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 1 esp-group MyCompany
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 1 local prefix 192.168.200.0/24
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 1 remote prefix 192.168.10.0/24
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 2 esp-group MyCompany
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 2 local prefix 192.168.200.0/24
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 2 remote prefix 192.168.20.0/24
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 3 local prefix 192.168.200.0/24
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 3 remote prefix 192.168.40.0/24
set vpn ipsec site-to-site peer 11.22.33.44 tunnel 3 esp-group MyCompany

commit</pre>
<p>You can also connect an ubiquiti router to a Sophos UTM or other VPN gateway. Maybe this tutorial is usefull for someone :) have fun!</p>
<p>The post <a href="https://networkguy.de/site2site-vpn-with-ubiquiti-and-cisco-router/">Site2Site VPN with ubiquiti and Cisco router</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/site2site-vpn-with-ubiquiti-and-cisco-router/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1738</post-id>	</item>
		<item>
		<title>Cisco VPN Error 27850 on Windows 10</title>
		<link>https://networkguy.de/cisco-vpn-error-27850-on-windows-10/</link>
					<comments>https://networkguy.de/cisco-vpn-error-27850-on-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Tue, 25 Aug 2015 13:18:17 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=1051</guid>

					<description><![CDATA[<p>Hello again! Today I wanted to install Cisco VPN Client on my Windows 10 machine but I got always error 27850. I found a knowledge base article that you need to install DNE Update. You can find it here: http://www.citrix.com/go/lp/dne.html If you have install problems. Follow the installation guide for the registry changes. Add a [&#8230;]</p>
<p>The post <a href="https://networkguy.de/cisco-vpn-error-27850-on-windows-10/">Cisco VPN Error 27850 on Windows 10</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello again! Today I wanted to install Cisco VPN Client on my Windows 10 machine but I got always error 27850. I found a knowledge base article that you need to install DNE Update. You can find it here:</p>
<p><a href="http://www.citrix.com/go/lp/dne.html" target="_blank">http://www.citrix.com/go/lp/dne.html</a></p>
<p>If you have install problems. Follow the installation guide for the registry changes. Add a DWORD32 into HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Network with the name &#8220;MaxNumFilters&#8221; and value 14 and restart your machine. When you have problems with error reason 422, follow <a href="http://networkguy.de/?p=241" target="_blank">this</a> instruction.</p>
<p>/edit</p>
<p>I got adapter error messages while connecting. I installed and started <a href="ftp://files.citrix.com/winfix.exe" target="_blank">ftp://files.citrix.com/winfix.exe</a> (it tolded me that Cisco VPN client is using the DNE function. I cleaned it up anyway, did a restart, installed DNE again (<a href="ftp://files.citrix.com/dneupdate.msi" target="_blank">ftp://files.citrix.com/dneupdate.msi</a> 32-Bit / <a href="ftp://files.citrix.com/dneupdate64.msi" target="_blank">ftp://files.citrix.com/dneupdate64.msi</a> 64-Bit). After a new restart I could connect via Cisco VPN)</p>
<p>The post <a href="https://networkguy.de/cisco-vpn-error-27850-on-windows-10/">Cisco VPN Error 27850 on Windows 10</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/cisco-vpn-error-27850-on-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1051</post-id>	</item>
		<item>
		<title>Redundant Internet access with Cisco routers</title>
		<link>https://networkguy.de/redundant-internet-access-with-cisco-routers/</link>
					<comments>https://networkguy.de/redundant-internet-access-with-cisco-routers/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Tue, 17 Mar 2015 10:22:24 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=920</guid>

					<description><![CDATA[<p>You can configure redundant internet lines with Cisco routers. For this we will use route tracking. The configuration of this is also for backing up your VPN lines. In this example we have to internet lines: The main line is 105.1.2.x and the backup line 222.1.2.x (I also bound a crypto map to it): interface Vlan2 description [&#8230;]</p>
<p>The post <a href="https://networkguy.de/redundant-internet-access-with-cisco-routers/">Redundant Internet access with Cisco routers</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You can configure redundant internet lines with Cisco routers. For this we will use route tracking. The configuration of this is also for backing up your VPN lines. In this example we have to internet lines: The main line is 105.1.2.x and the backup line 222.1.2.x (I also bound a crypto map to it):</p>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-921" src="http://networkguy.de/wp-content/uploads/2015/03/redundant-wan.png" alt="redundant-wan" width="708" height="237" srcset="https://networkguy.de/wp-content/uploads/2015/03/redundant-wan.png 708w, https://networkguy.de/wp-content/uploads/2015/03/redundant-wan-300x100.png 300w, https://networkguy.de/wp-content/uploads/2015/03/redundant-wan-620x208.png 620w, https://networkguy.de/wp-content/uploads/2015/03/redundant-wan-195x65.png 195w" sizes="(max-width: 708px) 100vw, 708px" /></p>
<blockquote><p>interface Vlan2<br />
description Main Provider Line<br />
ip address 105.1.2.2 255.255.255.252<br />
no ip unreachables<br />
ip nat outside<br />
crypto map CompanyMap</p>
<p>interface Vlan3<br />
description Backup Provider Line<br />
ip address 222.1.2.2 255.255.255.252<br />
no ip unreachables<br />
ip nat outside<br />
crypto map CompanyMap</p></blockquote>
<p>We will configure a fixed route to the Google DNS Server 8.8.8.8 (you can choose another public server for reachability if you want) to ping this server always over the main line:</p>
<blockquote><p>ip route 8.8.8.8 255.255.255.255 105.1.2.1</p></blockquote>
<p>now it&#8217;s time to configure the tracking of the Google server:</p>
<blockquote><p>ip sla 10<br />
icmp-echo 8.8.8.8 source-ip 105.1.2.2<br />
timeout 1000<br />
threshold 2<br />
frequency 3</p>
<p>ip sla schedule 10 life forver start-time now</p></blockquote>
<p>now the Cisco router is pinging the device. I always ping a server in the internet, because the provider router can be reachable but the internet line not. It&#8217;s also better for use with Dialer-Interfaces. In this case you will use &#8220;source-interface DialerX&#8221; instead of &#8220;source-ip&#8221;. To see if the script is working, you can view the statistics for this:</p>
<blockquote><p>Router#show ip sla statistics<br />
IPSLAs Latest Operation Statistics</p>
<p>IPSLA operation id: 10<br />
Latest RTT: 56 milliseconds<br />
Latest operation start time: *10:16:15.581 UTC Tue Mar 17 2015<br />
Latest operation return code: Over threshold<br />
Number of successes: 67<br />
Number of failures: 0<br />
Operation time to live: Forever</p></blockquote>
<p>We will track the reachability of this ping script. On new Cisco router models (Cisco 886 for example) you will use:</p>
<blockquote><p>track 10 ip sla 10 reachability</p></blockquote>
<p>older devices like Cisco 876:</p>
<blockquote><p>track 10 rtr 10 reachability</p></blockquote>
<p>To use both lines active-standby you will need to configure two default-routes to the internet. One with the tracking of the main line and one fixed route with a higher administrative distance:</p>
<blockquote><p>ip route 0.0.0.0 0.0.0.0 105.1.2.1 track 10<br />
ip route 0.0.0.0 0.0.0.0 222.1.2.1 200</p></blockquote>
<p>So if the tracking is not working (ping to 8.8.8.8 over main line) the second default-route will be used. To configure a redundant NAT, we will use route-maps for this:</p>
<blockquote><p>ip access-list extended NAT-ACL<br />
deny ip any 10.0.0.0 0.255.255.255<br />
deny ip any 172.16.0.0 0.15.255.255<br />
deny ip any 192.168.0.0 0.0.255.255<br />
permit ip 192.168.99.0 0.0.0.255 any</p>
<p>route-map WAN-LINE-1 permit 10<br />
match ip address NAT-ACL<br />
match interface Vlan2</p>
<p>route-map WAN-LINE-2 permit 20<br />
match ip address NAT-ACL<br />
match interface Vlan3</p>
<p>ip nat inside source route-map WAN-LINE-1 interface Vlan2 overload<br />
ip nat inside source route-map WAN-LINE-2 interface Vlan3 overload</p></blockquote>
<p>to make a real fallback test I would recommend to pull out the main line and try to access the internet or your VPN location. In case you are using IPsec VPN, keep in mind to configure both peers and presharedkey for the second WAN line in your headquarter. VPN is only loosing one ping packet, internet access (surfing websites) is direct available, in some cases the NAT needs to change to the second line but this only tooks about 5-10 seconds in my case. If you have any further questions feel free to ask in the comments.</p>
<p>I wish you a nice sunny day :)</p>
<p>The post <a href="https://networkguy.de/redundant-internet-access-with-cisco-routers/">Redundant Internet access with Cisco routers</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/redundant-internet-access-with-cisco-routers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">920</post-id>	</item>
		<item>
		<title>Import Domain certificate from RootCA to your Cisco router</title>
		<link>https://networkguy.de/import-domain-certificate-from-rootca-to-your-cisco-router/</link>
					<comments>https://networkguy.de/import-domain-certificate-from-rootca-to-your-cisco-router/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Tue, 30 Sep 2014 10:28:03 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=814</guid>

					<description><![CDATA[<p>Today I will show you how to import a signed domain certificate from your own Domain Root Certification Authority. First we will generate a certificate for the Cisco router. I needed this for the WebVPN gateway to connect SSL VPN user. In my example, we will use &#8220;vpn.1337company.com&#8220;. You need a working RootCA in your windows [&#8230;]</p>
<p>The post <a href="https://networkguy.de/import-domain-certificate-from-rootca-to-your-cisco-router/">Import Domain certificate from RootCA to your Cisco router</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today I will show you how to import a signed domain certificate from your own Domain Root Certification Authority. First we will generate a certificate for the Cisco router. I needed this for the WebVPN gateway to connect SSL VPN user. In my example, we will use &#8220;<strong>vpn.1337company.com</strong>&#8220;. You need a working RootCA in your windows domain. Go to the server via RDP and open the IIS management console. Go to the server certificates:</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/iis-servercertificates.png"><img decoding="async" class="alignnone size-full wp-image-815" src="http://networkguy.de/wp-content/uploads/2014/09/iis-servercertificates.png" alt="iis-servercertificates" width="664" height="437" srcset="https://networkguy.de/wp-content/uploads/2014/09/iis-servercertificates.png 664w, https://networkguy.de/wp-content/uploads/2014/09/iis-servercertificates-300x197.png 300w, https://networkguy.de/wp-content/uploads/2014/09/iis-servercertificates-620x408.png 620w, https://networkguy.de/wp-content/uploads/2014/09/iis-servercertificates-195x128.png 195w" sizes="(max-width: 664px) 100vw, 664px" /></a></p>
<p>choose &#8220;Create Domain Certificate&#8221;</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/iis-domaincert.png"><img decoding="async" class="alignnone size-full wp-image-816" src="http://networkguy.de/wp-content/uploads/2014/09/iis-domaincert.png" alt="iis-domaincert" width="786" height="307" srcset="https://networkguy.de/wp-content/uploads/2014/09/iis-domaincert.png 786w, https://networkguy.de/wp-content/uploads/2014/09/iis-domaincert-300x117.png 300w, https://networkguy.de/wp-content/uploads/2014/09/iis-domaincert-620x242.png 620w, https://networkguy.de/wp-content/uploads/2014/09/iis-domaincert-195x76.png 195w" sizes="(max-width: 786px) 100vw, 786px" /></a></p>
<p>create the new certificate with the suitable name.</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/iis-certenroll1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-817" src="http://networkguy.de/wp-content/uploads/2014/09/iis-certenroll1.png" alt="iis-certenroll1" width="684" height="517" srcset="https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll1.png 684w, https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll1-300x227.png 300w, https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll1-620x468.png 620w, https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll1-195x147.png 195w" sizes="(max-width: 684px) 100vw, 684px" /></a></p>
<p>choose your RootCA and a friendly name for your certificate</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/iis-certenroll2.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-818" src="http://networkguy.de/wp-content/uploads/2014/09/iis-certenroll2.png" alt="iis-certenroll2" width="684" height="517" srcset="https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll2.png 684w, https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll2-300x227.png 300w, https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll2-620x468.png 620w, https://networkguy.de/wp-content/uploads/2014/09/iis-certenroll2-195x147.png 195w" sizes="(max-width: 684px) 100vw, 684px" /></a></p>
<p>Now we will export the certificate to a pfx file containing the public certificate from your RootCA and the public and private certificate for your website / SSL VPN Gateway. We need to open the local computer certificate management console. Go to Start -&gt; Run, type &#8220;mmc&#8221; and press Enter. Click on File -&gt; Add/Remove Snap-In and choose &#8220;Certificates&#8221;. Choose &#8220;Computer account&#8221;, click Next, Finish and OK. Go to Personal -&gt; Certificates and export your new certificate:</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/cert-export1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-819" src="http://networkguy.de/wp-content/uploads/2014/09/cert-export1.png" alt="cert-export1" width="883" height="403" srcset="https://networkguy.de/wp-content/uploads/2014/09/cert-export1.png 883w, https://networkguy.de/wp-content/uploads/2014/09/cert-export1-300x137.png 300w, https://networkguy.de/wp-content/uploads/2014/09/cert-export1-620x282.png 620w, https://networkguy.de/wp-content/uploads/2014/09/cert-export1-195x88.png 195w" sizes="(max-width: 883px) 100vw, 883px" /></a></p>
<p>export the private key</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/cert-export2.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-820" src="http://networkguy.de/wp-content/uploads/2014/09/cert-export2.png" alt="cert-export2" width="543" height="522" srcset="https://networkguy.de/wp-content/uploads/2014/09/cert-export2.png 543w, https://networkguy.de/wp-content/uploads/2014/09/cert-export2-300x288.png 300w, https://networkguy.de/wp-content/uploads/2014/09/cert-export2-195x187.png 195w" sizes="(max-width: 543px) 100vw, 543px" /></a></p>
<p>choose &#8220;include all certificates&#8230;&#8221; because we need the public certificate from your RootCA</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/cert-export3.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-821" src="http://networkguy.de/wp-content/uploads/2014/09/cert-export3.png" alt="cert-export3" width="542" height="524" srcset="https://networkguy.de/wp-content/uploads/2014/09/cert-export3.png 542w, https://networkguy.de/wp-content/uploads/2014/09/cert-export3-300x290.png 300w, https://networkguy.de/wp-content/uploads/2014/09/cert-export3-195x188.png 195w, https://networkguy.de/wp-content/uploads/2014/09/cert-export3-45x45.png 45w" sizes="(max-width: 542px) 100vw, 542px" /></a></p>
<p>choose a password for export. In my case I used <strong>MyPasswordABC123</strong>. Save the file as sslvpncert.pfx on your desktop.</p>
<p><a href="http://networkguy.de/wp-content/uploads/2014/09/cert-export4.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-822" src="http://networkguy.de/wp-content/uploads/2014/09/cert-export4.png" alt="cert-export4" width="547" height="524" srcset="https://networkguy.de/wp-content/uploads/2014/09/cert-export4.png 547w, https://networkguy.de/wp-content/uploads/2014/09/cert-export4-300x287.png 300w, https://networkguy.de/wp-content/uploads/2014/09/cert-export4-195x186.png 195w" sizes="(max-width: 547px) 100vw, 547px" /></a></p>
<p>&nbsp;</p>
<p>Copy the .pfx file to your Cisco router via TFTP. I always use <a href="http://tftpd32.jounin.net/tftpd32_download.html" target="_blank" rel="noopener">TFTPD32</a> for this.</p>
<blockquote><p>copy tftp flash</p>
<p>crypto pki import vpn.1337company.com pkcs12 sslvpncert.pfx password MyPasswordABC123</p>
<p>Reading file from usbflash0:sslvpncert.pfx<br />
% You already have RSA keys named vpn.1337company.com.<br />
% If you replace them, all router certs issued using these keys<br />
% will be removed.<br />
% Do you really want to replace them? [yes/no]: yes<br />
CRYPTO_PKI: Imported PKCS12 file successfully.</p></blockquote>
<p>now change to the new certificate:</p>
<blockquote><p>webvpn gateway CompanySSLgateway<br />
ip address 8.7.6.5 port 443<br />
ssl trustpoint vpn.1337company.com</p></blockquote>
<p>go to https://yourserveraddress to see if the certificate is bounded to the webserver. If you have any problems or suggestions, please write it in the comments below.</p>
<p>The post <a href="https://networkguy.de/import-domain-certificate-from-rootca-to-your-cisco-router/">Import Domain certificate from RootCA to your Cisco router</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/import-domain-certificate-from-rootca-to-your-cisco-router/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">814</post-id>	</item>
		<item>
		<title>Cisco Site2Site VPN problem with &#8220;Fail to allocate ip address&#8221;</title>
		<link>https://networkguy.de/cisco-site2site-vpn-problem-with-fail-to-allocate-ip-address/</link>
					<comments>https://networkguy.de/cisco-site2site-vpn-problem-with-fail-to-allocate-ip-address/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Fri, 15 Aug 2014 07:46:05 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=796</guid>

					<description><![CDATA[<p>Today I configured a site2site VPN on a Cisco Router. The remote device was a Palo Alto. Phase 1 was working correctly but we got problems with Phase 2, the debug logs said: *Aug 15 09:13:06.899: ISAKMP:(6035):Total payload length: 12 *Aug 15 09:13:06.899: ISAKMP:(6035): sending packet to 80.70.60.50 my_port 500 peer_port 500 (R) MM_KEY_EXCH *Aug 15 [&#8230;]</p>
<p>The post <a href="https://networkguy.de/cisco-site2site-vpn-problem-with-fail-to-allocate-ip-address/">Cisco Site2Site VPN problem with &#8220;Fail to allocate ip address&#8221;</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today I configured a site2site VPN on a Cisco Router. The remote device was a Palo Alto. Phase 1 was working correctly but we got problems with Phase 2, the debug logs said:</p>
<blockquote><p>*Aug 15 09:13:06.899: ISAKMP:(6035):Total payload length: 12<br />
*Aug 15 09:13:06.899: ISAKMP:(6035): sending packet to 80.70.60.50 my_port 500 peer_port 500 (R) MM_KEY_EXCH<br />
*Aug 15 09:13:06.899: ISAKMP:(6035):Sending an IKE IPv4 Packet.<br />
*Aug 15 09:13:06.899: ISAKMP:(6035):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE<br />
*Aug 15 09:13:06.899: ISAKMP:(6035):Old State = IKE_R_MM5  New State = IKE_P1_COMPLETE</p>
<p>*Aug 15 09:13:06.903: ISAKMP:(6035):Need config/address<br />
*Aug 15 09:13:06.903: ISAKMP: set new node 1642552031 to CONF_ADDR<br />
*Aug 15 09:13:06.903: ISAKMP:(6035):No IP address pool defined for ISAKMP!<br />
*Aug 15 09:13:06.903: ISAKMP:(6035):peer does not do paranoid keepalives.<br />
*Aug 15 09:13:06.903: ISAKMP:(6035):deleting SA reason &#8220;<strong>Fail to allocate ip address</strong>&#8221; state (R) CONF_ADDR     (peer 80.70.60.50)</p>
<p>*Aug 15 09:13:06.903: ISAKMP:(6035):deleting node 1642552031 error FALSE reason &#8220;No Error&#8221;<br />
*Aug 15 09:13:06.903: ISAKMP:(6035):peer does not do paranoid keepalives.</p>
<p>*Aug 15 09:13:06.903: ISAKMP (6035): FSM action returned error: 2<br />
*Aug 15 09:13:06.903: ISAKMP:(6035):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE<br />
*Aug 15 09:13:06.903: ISAKMP:(6035):Old State = IKE_P1_COMPLETE  New State = IKE_CONFIG_MODE_SET_SENT</p></blockquote>
<p>Fail to allocate ip address? Within a site2site VPN? The problem was the command &#8220;<strong>crypto map XXXXX client configuration address initiate</strong>&#8220;. There was already a configured EasyVPN for clients. Normally I configure &#8220;<strong>crypto map XXXXX client configuration address respond</strong>&#8221; for giving the vpn-pool and other parameters to the connected clients. After I deleted the initiate command, the phase 2 was working great and the tunnel was established!</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://networkguy.de/cisco-site2site-vpn-problem-with-fail-to-allocate-ip-address/">Cisco Site2Site VPN problem with &#8220;Fail to allocate ip address&#8221;</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/cisco-site2site-vpn-problem-with-fail-to-allocate-ip-address/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">796</post-id>	</item>
		<item>
		<title>Configuring internal DSL for Annex A line (like in Netherland)</title>
		<link>https://networkguy.de/configuring-internal-dsl-for-annex-a-line-like-in-netherland/</link>
					<comments>https://networkguy.de/configuring-internal-dsl-for-annex-a-line-like-in-netherland/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Wed, 02 Apr 2014 12:54:21 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=670</guid>

					<description><![CDATA[<p>A UK customer expanded to the netherlands where the local provider &#8220;Van den Bulk Telecom&#8221; delivered only a dsl line. So we need a Cisco Router with a built in modem with options for later VDSL use. Actually they provide an ADSL Annex A line. The provider gives us the following informations: Line: ADSL2+ over [&#8230;]</p>
<p>The post <a href="https://networkguy.de/configuring-internal-dsl-for-annex-a-line-like-in-netherland/">Configuring internal DSL for Annex A line (like in Netherland)</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A UK customer expanded to the netherlands where the local provider &#8220;Van den Bulk Telecom&#8221; delivered only a dsl line. So we need a Cisco Router with a built in modem with options for later VDSL use. Actually they provide an ADSL Annex A line. The provider gives us the following informations:</p>
<p>Line: ADSL2+ over POTS<br />
Type: Annex A<br />
Speed: 20.000/1.024<br />
VPI: 0<br />
VCI: 35<br />
Login via: PPPoA<br />
Operating-Mode: vmux<br />
PPPoE-Login and -Password: anything</p>
<p>We have chosen the model 887VA Router:</p>
<blockquote><p>Router#show inventory<br />
NAME: &#8220;887VA&#8221;, DESCR: &#8220;887VA chassis, Hw Serial#: xxx, Hw Revision: 1.0&#8221;<br />
PID: CISCO887VA-SEC-K9 , VID: V02, SN: xxx</p></blockquote>
<p>first I configured a normal dialer interface for login</p>
<blockquote><p>interface Dialer1<br />
ip address negotiated<br />
ip mtu 1492<br />
ip nat outside<br />
ip virtual-reassembly in<br />
encapsulation ppp<br />
dialer pool 1<br />
dialer-group 1<br />
ppp authentication chap pap callin<br />
ppp chap hostname blabla<br />
ppp chap password blabla<br />
ppp pap sent-username blabla password blabla</p></blockquote>
<p>after this we need the correct atm-config for this. Based on the information given by the provider, I tried this:</p>
<blockquote><p>interface ATM0<br />
no ip address<br />
no atm ilmi-keepalive<br />
pvc 0/35<br />
encapsulation aal5mux ppp dialer<br />
dialer pool-member 1<br />
no shutdown</p></blockquote>
<p>the customer connected the delivered device directly to the adsl line and it worked from start :) didn&#8217;t thought that this would work like a charm!</p>
<p>The post <a href="https://networkguy.de/configuring-internal-dsl-for-annex-a-line-like-in-netherland/">Configuring internal DSL for Annex A line (like in Netherland)</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/configuring-internal-dsl-for-annex-a-line-like-in-netherland/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">670</post-id>	</item>
		<item>
		<title>Router on the edge</title>
		<link>https://networkguy.de/router-on-the-edge/</link>
					<comments>https://networkguy.de/router-on-the-edge/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Sat, 25 May 2013 10:03:40 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<category><![CDATA[Dell Switching]]></category>
		<category><![CDATA[HPE Networking]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=465</guid>

					<description><![CDATA[<p>Good morning everyone! Today I want to explain a configuration for routing internal networks with a layer 3 routing switch and a router for accessing the internet. I call it &#8220;router on the edge&#8221;. The definition &#8220;edge router&#8221; is typically a router running EBGP (External Border Gateway Protocol) so I invent a new definition :) [&#8230;]</p>
<p>The post <a href="https://networkguy.de/router-on-the-edge/">Router on the edge</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Good morning everyone! Today I want to explain a configuration for routing internal networks with a layer 3 routing switch and a router for accessing the internet. I call it &#8220;router on the edge&#8221;. The definition &#8220;edge router&#8221; is typically a router running EBGP (External Border Gateway Protocol) so I invent a new definition :)</p>
<p>&#8220;Router on the edge&#8221; is different to &#8220;Router on a stick&#8221;. The cable-connects are the same but here we will route internal networks with a fast layer 3 switch.</p>
<p>In my example I will configure a Cisco router and a Dell switch as our core-routing-switch. I will also add code for a HP ProCurve switch. First we will plan our current network with three vlans:</p>
<p>VLAN 5 (Door to the Internet)<br />
VLAN 10 (Servers)<br />
VLAN 20 (Clients)<br />
VLAN 30 (Guests)</p>
<p>I don&#8217;t use default VLAN 1 because in case of a forgotten non-tagged port, the device connected to it, will be in this VLAN. Now we will configure the Dell switch with several VLANs. I choose three /24 Class C networks and a /30 network between the core switch and the Cisco router (192.168.5.1):</p>
<blockquote><p>vlan database<br />
vlan 5,10,20,30</p>
<p>ip routing<br />
ip route 0.0.0.0 0.0.0.0 192.168.5.1</p>
<p>interface vlan 5<br />
name &#8220;Door-to-Internet&#8221;<br />
routing<br />
ip address 192.168.5.2 255.255.255.252<br />
no ip proxy-arp</p>
<p>interface vlan 10<br />
name &#8220;Server&#8221;<br />
routing<br />
ip address 192.168.10.1 255.255.255.0<br />
no ip proxy-arp</p>
<p>interface vlan 20<br />
name &#8220;Clients&#8221;<br />
routing<br />
ip address 192.168.20.1 255.255.255.0<br />
no ip proxy-arp</p>
<p>interface vlan 30<br />
name &#8220;Guests&#8221;<br />
routing<br />
ip address 192.168.30.1 255.255.255.0<br />
no ip proxy-arp</p>
<p>interface ethernet 1/g1<br />
description &#8220;Here is the Cisco router connected&#8221;</p>
<p>interface range ethernet 1/g2-1/g10<br />
description &#8220;Here are servers connected&#8221;<br />
switchport access vlan 10</p>
<p>interface range ethernet 1/g2-11/g20<br />
description &#8220;Here are clients connected&#8221;<br />
switchport access vlan 20</p>
<p>interface range ethernet 1/g21-1/g24<br />
description &#8220;This is for guests&#8221;<br />
switchport access vlan 30</p></blockquote>
<p>Routing is now enabled between your networks. You can also configure access-lists for your vlan interfaces. The following allows the dhcp relay option (ip-helper address pointed to your central DHCP server), blocks connection into other private networks connected to the core switch but let all internet traffic through the interface. We will use this for our guests vlan:</p>
<blockquote><p>access-list guests_in permit udp any any eq 67<br />
access-list guests_in permit udp any any eq 68<br />
access-list guests_in permit icmp 192.168.30.0 0.0.0.255 192.168.30.1 0.0.0.0<br />
access-list guests_in deny ip 192.168.30.0 0.0.0.255 10.0.0.0 0.255.255.255<br />
access-list guests_in deny ip 192.168.30.0 0.0.0.255 172.16.0.0 0.15.255.255<br />
access-list guests_in deny ip 192.168.30.0 0.0.0.255 192.168.0.0 0.0.255.255<br />
access-list guests_in permit ip 192.168.30.0 0.0.0.255 any</p>
<p>interface vlan 30<br />
ip access-group guests_in in 1</p></blockquote>
<p>To bring the devices online, we will configure our router like this:</p>
<blockquote><p>interface GigabitEthernet0/0<br />
description Connect to core switch<br />
ip address 192.168.5.1 255.255.255.252<br />
ip nat inside<br />
ip inspect lan in<br />
ip virtual-reassembly<br />
ip tcp adjust-mss 1452</p>
<p>interface GigabitEthernet0/1<br />
description Connect to service provider<br />
ip address 80.60.50.40 255.255.255.0<br />
ip nat outside</p>
<p>ip access-list extended NAT-ACL<br />
deny ip any 10.0.0.0 0.255.255.255<br />
deny ip any 192.168.0.0 0.0.255.255<br />
deny ip any 172.16.0.0 0.15.255.255<br />
permit ip 192.168.0.0 0.0.255.255 any</p>
<p>ip nat inside source list NAT-ACL interface GigabitEthernet0/1 overload</p>
<p>ip route 192.168.10.0 255.255.255.0 192.168.5.2<br />
ip route 192.168.20.0 255.255.255.0 192.168.5.2<br />
ip route 192.168.30.0 255.255.255.0 192.168.5.2<br />
ip route 0.0.0.0 0.0.0.0 80.60.50.1</p></blockquote>
<p dir="LTR" align="LEFT">This also works with a Dialer interface as the default gateway. Keep in mind that you need to configure backward routes to the internal networks via the directly connected core switch and always configure access-lists nearest to the source (so every access-list will be configured and bound in the core switch). The nat overload rule is natting all packets beginning with &#8220;192.168.&#8221;.</p>
<p dir="LTR" align="LEFT">For users with HP ProCurve Switches you can take this config:</p>
<blockquote>
<p dir="LTR" align="LEFT">ip routing</p>
<p dir="LTR" align="LEFT">vlan 5<br />
name &#8220;Door-to-Internet&#8221;<br />
untagged 1<br />
ip address 192.168.5.2 255.255.255.252</p>
<p dir="LTR" align="LEFT">vlan 10<br />
name &#8220;Server&#8221;<br />
untagged 2-10<br />
ip address 192.168.10.1 255.255.255.0</p>
<p dir="LTR" align="LEFT">interface vlan 20<br />
name &#8220;Clients&#8221;<br />
untagged 11-20<br />
ip address 192.168.20.1 255.255.255.0</p>
<p dir="LTR" align="LEFT">interface vlan 30<br />
name &#8220;Guests&#8221;<br />
untagged 21-24<br />
ip address 192.168.30.1 255.255.255.0</p>
<p dir="LTR" align="LEFT">ip route 0.0.0.0 0.0.0.0 192.168.5.1<br />
ip default-gateway 192.168.5.1</p>
</blockquote>
<p dir="LTR" align="LEFT">in case that you are use the routing feature on a HP ProCurve switch, the &#8220;ip default-gateway&#8221; needs to be extended with &#8220;ip route 0.0&#8230;.&#8221; because this is the gateway for all packets routed by the vlan interfaces.</p>
<p dir="LTR" align="LEFT">Feel free to ask and comment this article. I think I will also explain &#8220;router on the edge&#8221; with a Sophos UTM appliance for beeing the way to the internet :) happy weekend!</p>
<p>The post <a href="https://networkguy.de/router-on-the-edge/">Router on the edge</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/router-on-the-edge/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">465</post-id>	</item>
		<item>
		<title>Site2Site VPN Tunnel with ClientVPN @ Cisco IOS</title>
		<link>https://networkguy.de/site2site-vpn-tunnel-with-clientvpn-cisco-ios/</link>
					<comments>https://networkguy.de/site2site-vpn-tunnel-with-clientvpn-cisco-ios/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Wed, 10 Apr 2013 08:17:30 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=420</guid>

					<description><![CDATA[<p>Good Morning everyone! I want to describe several VPN configurations on a Cisco router, ASA firewall and Sophos UTM. I will start with Cisco IOS on a Cisco router. In this example you will learn to configure a site2site VPN tunnel with a coincident client VPN access. First we will configure the basic IPsec VPN settings. [&#8230;]</p>
<p>The post <a href="https://networkguy.de/site2site-vpn-tunnel-with-clientvpn-cisco-ios/">Site2Site VPN Tunnel with ClientVPN @ Cisco IOS</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Good Morning everyone!</p>
<p>I want to describe several VPN configurations on a Cisco router, ASA firewall and Sophos UTM. I will start with Cisco IOS on a Cisco router. In this example you will learn to configure a site2site VPN tunnel with a coincident client VPN access.</p>
<p>First we will configure the basic IPsec VPN settings. Start with Phase 1:</p>
<blockquote><p>crypto isakmp policy 10<br />
encr aes<br />
authentication pre-share<br />
group 2</p></blockquote>
<p>There are other commands you can use for this like hash or lifetime. Not seeing this in your config means, that the default value is configured. For example: lifetime is by default 86400 seconds (1 day). After this we will configure the site2site parameters like remote IP address, pre shared key and Phase 2 values. In our example we (subnet 192.168.10.0 /24) want to connect to 44.55.66.77 to our Brasilia branch office (subnet 172.16.8.0 /24).</p>
<blockquote><p>crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac</p>
<p>crypto isakmp key MyLittlePr3Sh@r3dK3y address 44.55.66.77 no-xauth</p>
<p>crypto map MyCompanyMap 10 ipsec-isakmp<br />
set peer 44.55.66.77<br />
set security-association lifetime seconds 28800<br />
set transform-set ESP-AES-SHA<br />
match address vpn-brasilia</p>
<p>ip access-list extended vpn-brasilia<br />
permit ip 192.168.10.0 0.0.0.255  172.16.8.0 0.0.0.255</p>
<p>interface Dialer1<br />
description My WAN Link (can also be a Ethernet-Interface)<br />
ip access-group wan_in in<br />
crypto map MyCompanyMap</p>
<p>ip access-list extended wan_in<br />
remark Protocols for VPN<br />
permit ahp any any<br />
permit esp any any<br />
permit udp any any eq isakmp<br />
permit udp any any eq non500-isakmp</p>
<p>ip route 0.0.0.0 0.0.0.0 Dialer1</p>
<p>ip access-list extended tonat<br />
deny ip any 10.0.0.0 0.255.255.255<br />
deny ip any 172.16.0.0 0.15.255.255<br />
deny ip any 192.168.0.0 0.0.255.255<br />
permit ip 192.168.10.0 0.0.0.255 any</p>
<p>ip nat inside source list tonat interface Dialer1 overload</p></blockquote>
<p>be sure to allow the protocols from outside to inside. I always choose AES and SHA because its more secure and much more faster than 3DES (three times DES). I also got problems with MD5 between Cisco and Juniper. On Brasilia Router you need to configure the same only with the opposite values such remote peer address and the access-list for vpn-interested traffic like our &#8220;vpn-brasilia&#8221;. Keep in mind to not (!) nat into this networks!</p>
<p>To add Cisco Client VPN (EasyVPN) to this config you need to add this:</p>
<p>We will use local authentication but you can also use a RADIUS server for this.</p>
<blockquote><p>aaa new-model<br />
aaa authentication login userauth local<br />
aaa authorization network groupauth local</p>
<p>username drdoom password !nh3LL</p>
<p>!define the IP address pool for the connected VPN clients:<br />
ip local pool vpn-pool 192.168.255.1 192.168.255.254</p>
<p>!define the network where your vpn clients can connect to; this will also be the route(s) for your client<br />
ip access-list extended vpn-clients<br />
<em id="__mceDel">permit ip 192.168.10.0 0.0.0.255 192.168.255.0 0.0.0.255</em></p>
<p>!configure a new VPN group; you can configure more than one<br />
crypto isakmp client configuration group myVPNclients<br />
key The3ndIsN3@r<br />
dns 192.168.10.6<br />
domain mycompany.local<br />
pool vpn-pool<br />
acl vpn-clients<br />
netmask 255.255.255.0<br />
!this will enable saving the clients password to the cisco vpn client; its very insecure because the password is stored (encrypted) locally at C:\Program Files (x86)\Cisco Systems\VPN Client\Profiles<br />
save-password</p>
<p>crypto dynamic-map DynamicPeers 10<br />
set transform-set ESP-AES-SHA</p>
<p>crypto map MyCompanyMap client authentication list userauth<br />
crypto map MyCompanyMap isakmp authorization list groupauth<br />
crypto map MyCompanyMap client configuration address respond<br />
crypto map MyCompanyMap 200 ipsec-isakmp dynamic DynamicPeers<br />
! the dynamic crypto map needs to have the highest order number at the crypto map MyCompanyMap because your VPN clients are always coming from a dynamic WAN address and in other case the fix site2site VPN tunnels are not working.</p>
<p>&nbsp;</p></blockquote>
<p>&nbsp;</p>
<p>Now you can download the Cisco VPN client at <a href="http://www.cisco.com/" target="_blank">www.cisco.com</a> with a CCO account and can configure a new entry:</p>
<p>&nbsp;</p>
<p><a href="http://networkguy.de/wp-content/uploads/2013/04/cisco-vpn-client.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-422" alt="cisco-vpn-client" src="http://networkguy.de/wp-content/uploads/2013/04/cisco-vpn-client.png" width="446" height="416" srcset="https://networkguy.de/wp-content/uploads/2013/04/cisco-vpn-client.png 446w, https://networkguy.de/wp-content/uploads/2013/04/cisco-vpn-client-300x280.png 300w, https://networkguy.de/wp-content/uploads/2013/04/cisco-vpn-client-160x150.png 160w" sizes="(max-width: 446px) 100vw, 446px" /></a></p>
<p>&nbsp;</p>
<p>Feel free to comment and ask to this post, I can explaine in more detail and can extend this tutorial.</p>
<p>The post <a href="https://networkguy.de/site2site-vpn-tunnel-with-clientvpn-cisco-ios/">Site2Site VPN Tunnel with ClientVPN @ Cisco IOS</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/site2site-vpn-tunnel-with-clientvpn-cisco-ios/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">420</post-id>	</item>
		<item>
		<title>Configuring a fallback for default-route on a Cisco router</title>
		<link>https://networkguy.de/configuring-a-fallback-for-default-route-on-a-cisco-router/</link>
					<comments>https://networkguy.de/configuring-a-fallback-for-default-route-on-a-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Tue, 20 Nov 2012 14:29:43 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=330</guid>

					<description><![CDATA[<p>This was a wish from one of my customer and I was investing a lot of time to connect the site2site VPN on both WAN uplinks with EIGRP metric and so on&#8230; but there is another simple way to configure an automatic default-route fallback which solves all our problems in case the primary WAN links [&#8230;]</p>
<p>The post <a href="https://networkguy.de/configuring-a-fallback-for-default-route-on-a-cisco-router/">Configuring a fallback for default-route on a Cisco router</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This was a wish from one of my customer and I was investing a lot of time to connect the site2site VPN on both WAN uplinks with EIGRP metric and so on&#8230; but there is another simple way to configure an automatic default-route fallback which solves all our problems in case the primary WAN links will fail:</p>
<p>We will configure a task which pings every three seconds to a self-defined target (for example the central-office router):</p>
<blockquote><p>ip sla 10<br />
icmp-echo 99.22.11.44<br />
timeout 1000<br />
threshold 2<br />
frequency 3</p>
<p>ip sla schedule 10 life forever start-time now</p></blockquote>
<p>Now we will define that the target needs to be reachable</p>
<blockquote><p>track 10 rtr 1 reachability</p></blockquote>
<p>/edi: On Version 15.x use this:</p>
<blockquote><p>track 10 ip sla 10 reachability</p></blockquote>
<p>the primary WAN uplink / default-route will only be used when the target is reachable and will only use our secondary WAN link (in this example a dialer-interface) in case the icmp echo is not working. So we also add a default-route out to the dialer-interface with a higher <del>distance metric</del> administrative distance:</p>
<blockquote><p>ip route 0.0.0.0 0.0.0.0 88.77.66.55 track 10<br />
ip route 0.0.0.0 0.0.0.0 Dialer1 200</p></blockquote>
<p>to be on the safe side we will also NAT overload for both interfaces:</p>
<blockquote><p>ip access-list extended tonat_wan1<br />
deny   ip any 10.0.0.0 0.255.255.255<br />
deny   ip any 172.16.0.0 0.15.255.255<br />
deny   ip any 192.168.0.0 0.0.255.255<br />
permit ip 192.168.23.0 0.0.0.255 any</p>
<p>ip access-list extended tonat_wan2<br />
deny   ip any 10.0.0.0 0.255.255.255<br />
deny   ip any 172.16.0.0 0.15.255.255<br />
deny   ip any 192.168.0.0 0.0.255.255<br />
permit ip 192.168.23.0 0.0.0.255 any</p>
<p>ip nat inside source list tonat_primary_wan interface FastEthernet0 overload</p>
<p>ip nat inside source list tonat_secondary_wan interface Dialer1 overload</p></blockquote>
<p>you can also bind your VPN crypto map to both WAN uplinks so you will also have a VPN fallback. <strong>Keep in mind to configure &#8220;ip tcp adjust-mss 1452&#8221; at your internal LAN interface, otherwise you can&#8217;t surf on webservers in the internet.</strong></p>
<p>The post <a href="https://networkguy.de/configuring-a-fallback-for-default-route-on-a-cisco-router/">Configuring a fallback for default-route on a Cisco router</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/configuring-a-fallback-for-default-route-on-a-cisco-router/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">330</post-id>	</item>
		<item>
		<title>Quality of Service within a VPN tunnel over Dialer-Interface</title>
		<link>https://networkguy.de/quality-of-service-within-a-vpn-tunnel-over-dialer-interface/</link>
					<comments>https://networkguy.de/quality-of-service-within-a-vpn-tunnel-over-dialer-interface/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Fri, 04 May 2012 10:05:33 +0000</pubDate>
				<category><![CDATA[Cisco Routers]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=69</guid>

					<description><![CDATA[<p>Today I will show you how to configure QoS for outgoing SIP VoIP traffic who goes throw a VPN tunnel / crypto-map. To solve this we need to create class-maps for all IP traffic and for our SIP traffic and bind them to the crypto map and the outgoing interface because VPN traffic is encapsulated [&#8230;]</p>
<p>The post <a href="https://networkguy.de/quality-of-service-within-a-vpn-tunnel-over-dialer-interface/">Quality of Service within a VPN tunnel over Dialer-Interface</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today I will show you how to configure QoS for outgoing SIP VoIP traffic who goes throw a VPN tunnel / crypto-map. To solve this we need to create class-maps for all IP traffic and for our SIP traffic and bind them to the crypto map and the outgoing interface because VPN traffic is encapsulated &#8220;within&#8221; the router. First we configure our class-map for all outgoing traffic:</p>
<blockquote><p>class-map match-any MyCompleteTraffic<br />
match any</p></blockquote>
<p>this will be our access-list and class-map which defines our &#8220;interesting&#8221; priority-packets:</p>
<blockquote><p>ip access-list extended QoS_Packets<br />
permit tcp any any eq 5904<br />
permit tcp any eq 5904 any</p>
<p>class-map match-any MyPriorityPackets<br />
match access-group name QoS_Packets</p></blockquote>
<p>A very important thing is to configure the bandwidth in the WAN interface which is going to the world wide web. Even if you have a FastEthernet interface connected to the ISP router with a speed (for example) a 5 MBit sync line because the default bandwidth on a FastEthernet interface is 100MBit! Our WAN interface is a Dialer for a standard ADSL line:</p>
<blockquote><p>interface Dialer1<br />
description ADSL line with 6/0,7 MBit Up/Down<br />
bandwidth 6000<br />
bandwidth receive 700</p></blockquote>
<p>Now we will configure policy-maps where we bind the pre-defined class-maps:</p>
<blockquote><p>policy-map SIP_Priority<br />
class MyPriorityPackets<br />
priority percent 20 // here we will define the granted bandwidth for our SIP traffic in Kbits or in percent<br />
class class-default<br />
fair-queue<br />
random-detect</p>
<p>policy-map OutgoingTraffic<br />
class MyCompleteTraffic<br />
shape average percent 95 // take the nearly complete upload bandwidth which is available in bits or also configure a percentage number<br />
service-policy SIP_Priority</p></blockquote>
<p>We need to configure QoS pre-classify on the specific crypto-map and bind the service-policy for all outgoing traffic to the ip nat outside interface:</p>
<blockquote><p>Router(config-crypto-map)#qos ?<br />
pre-classify  Enable QOS classification before packets are tunnel encapsulated</p>
<p>crypto map CompanyMap 10 ipsec-isakmp<br />
description Tunnel to central office<br />
set peer x.x.x.x<br />
set transform-set ESP-AES-SHA<br />
match address vpn_traffic<br />
<strong>qos pre-classify</strong></p>
<p>interface Dialer1<br />
crypto map CompanyMap<br />
service-policy output OutgoingTraffic</p></blockquote>
<p>To define the reservated upload for your VoIP traffic can be calculated. I found a cool website calculator @ <a href="http://www.asteriskguru.com/tools/bandwidth_calculator.php" target="_blank">http://www.asteriskguru.com/tools/bandwidth_calculator.php</a>. In my case I had only one IP phone at the branch office so 32 kbit would be the recommondation for the SIP traffic.</p>
<p>To check the QoS configuration you can look to the priorized packets with &#8220;show policy-map interface Dialer1&#8221;:</p>
<blockquote><p> Dialer1</p>
<p>Service-policy output: OutgoingTraffic</p>
<p>Class-map: MyCompleteTraffic (match-any)<br />
17999 packets, 1960216 bytes<br />
5 minute offered rate 3000 bps, drop rate 0 bps<br />
Match: any<br />
Queueing<br />
queue limit 64 packets<br />
(queue depth/total drops/no-buffer drops) 0/0/0<br />
(pkts output/bytes output) 0/0<br />
shape (average) cir 5700000, bc 57000, be 57000<br />
target shape rate 5700000</p>
<p>Service-policy : SIP_Priority</p>
<p>queue stats for all priority classes:</p>
<p>queue limit 64 packets<br />
(queue depth/total drops/no-buffer drops) 0/0/0<br />
(pkts output/bytes output) 0/0</p>
<p>Class-map: MyPriorityPackets (match-any)<br />
6713 packets, 490018 bytes<br />
5 minute offered rate 0 bps, drop rate 0 bps<br />
Match: access-group name QoS_Packets<br />
6713 packets, 490018 bytes<br />
5 minute rate 0 bps<br />
Priority: 20% (600 kbps), burst bytes 15000, b/w exceed drops: 0</p>
<p>Class-map: class-default (match-any)<br />
11286 packets, 1470198 bytes<br />
5 minute offered rate 3000 bps, drop rate 0 bps<br />
Match: any<br />
Queueing<br />
queue limit 64 packets<br />
(queue depth/total drops/no-buffer drops/flowdrops) 0/0/0/0<br />
(pkts output/bytes output) 0/0<br />
Fair-queue: per-flow queue limit 16<br />
Exp-weight-constant: 9 (1/512)<br />
Mean queue depth: 0 packets<br />
class     Transmitted       Random drop      Tail/Flow drop Minimum Maximum Mark<br />
pkts/bytes    pkts/bytes       pkts/bytes    thresh  thresh  prob</p>
<p>0               0/0               0/0              0/0                 20            40  1/10<br />
1               0/0               0/0              0/0                 22            40  1/10<br />
2               0/0               0/0              0/0                 24            40  1/10<br />
3               0/0               0/0              0/0                 26            40  1/10<br />
4               0/0               0/0              0/0                 28            40  1/10<br />
5               0/0               0/0              0/0                 30            40  1/10<br />
6               0/0               0/0              0/0                 32            40  1/10<br />
7               0/0               0/0              0/0                 34            40  1/10</p>
<p>Class-map: class-default (match-any)<br />
0 packets, 0 bytes<br />
5 minute offered rate 0 bps, drop rate 0 bps<br />
Match: any</p>
<p>queue limit 64 packets<br />
(queue depth/total drops/no-buffer drops) 0/0/0<br />
(pkts output/bytes output) 0/0</p></blockquote>
<p>If you have any other wishes for QoS instructions, please just let me know! Have a nice weekend!</p>
<p>The post <a href="https://networkguy.de/quality-of-service-within-a-vpn-tunnel-over-dialer-interface/">Quality of Service within a VPN tunnel over Dialer-Interface</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/quality-of-service-within-a-vpn-tunnel-over-dialer-interface/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">69</post-id>	</item>
	</channel>
</rss>
