cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
301
Views
0
Helpful
3
Replies

Add 1 more tunnel on the existing firewall

shibindong
Level 1
Level 1

I have an existing tunnel between 2 sites: (A and B) configured on 2 FWs. Now I was asked to add 1 more tunnel berween A and C. Since C is new site, I can just copy the existing configuration and change the IP address for site C, how about A? how is the configuration need to be done to add one more tunnel?

The following is my existing config on FW A (only VPN related commands are listed):

access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

access-list NoNAT permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

nat (inside) 0 access-list NoNAT

isakmp enable outside

isakmp key xxxxxxxx address 1.1.1.1 netmask 255.255.255.255

isakmp policy 1 authentication pre-share

isakmp policy 1 encryption 3des

isakmp policy 1 hash md5

isakmp policy 1 group 2

isakmp policy 1 lifetime 86400

crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto map outside_map 1 ipsec-isakmp

crypto map outside_map 1 match address 101

crypto map outside_map 1 set peer 1.1.1.1

crypto map outside_map 1 set transform-set ESP-3DES-MD5

crypto map outside_map interface outside

management-access inside

sysopt connection permit-ipsec

by the way: A site LAN is 192.168.1.0

B site: 192.168.2.0

C site: 192.168.3.0

3 Replies 3

kaachary
Cisco Employee
Cisco Employee

Hi,

Assuming you are using same encryption and authentication parameters as Site B (Same Iskamp policies and same Trnasform set), you require following changes to add a tunnel between Site A and C.

access-list 102 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0

access-list NoNAT permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0

isakmp key xxxxxxxx address netmask 255.255.255.255

crypto map outside_map 2 ipsec-isakmp

crypto map outside_map 2 match address 102

crypto map outside_map 2 set peer

crypto map outside_map 2 set transform-set ESP-3DES-MD5

That's it !!

*Please rate if this helps.

-Kanishka

thanks for your prompt reply, my another question is "2" in the "crypto map outside_map". correct me if i am wrong, "2" in the IPsec should the same as the number in ike configure, right?

No, it doesn't matter.

It could be any number other than "1" as you have one crypto map defined with priority "1".

All the crypto maps on the device, should have the same name, but different sequence number. The sequence number can be random.

It has nothing to do with the IKE policy.

*Please rate if helped.

-Kanishka

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: