cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1231
Views
0
Helpful
14
Replies

internet routing

hugochengym
Level 1
Level 1

Dear Sirs

We would like to configure some internet access route through remote site ISP gateway by using IPSec VPN tunnel. For the rest internet traffic keep using local ISP? Would you please teach me how to configure it?

Hugo

14 Replies 14

Maykol Rojas
Cisco Employee
Cisco Employee

There is nothing very fancy on it. What you need to do is to point the other side network of the VPN to the new ISP connection and put the crypto map on that interface, that will do the trick.

If you have questions, let me know.

Mike

Mike

Maykol, I dont think you got Hugo's question. Unfortunately, this setup is not that easy.

Hugo, if I understood correctly, you would like to route some traffic thru the VPN so that it uses the ISP gateway at remote site and still use your local ISP for the rest of the internet traffic right?

Unfortunately and since VPN is based on layer 3 information (IP) this cannot be done unless you have the specific IP address of the Internet hosts you would like to route through the tunnel, that would make it hard because big sites keep on changing their public IPs.

Think of google.com for example, if you wanted to route all the traffic going to google.com thru the tunnel you would need to get all the IP addresses for google, then define your crypto ACLs from your internal networks to Google's IP Addresses and vice versa. That traffic will traverse the tunnel and use the remote site's ISP and the rest of the traffic would stay local. Now when Google start changing its IP addresses you will start having problems (not problems per-se but the traffic for Google's new IP address will be routed using your local ISP).

So as you can see since VPN uses IP Address for the definition of the interesting traffic instead of domains, this would be hard to accomplish and maintain.

I hope this helps.

Raga

Rega

Thanks for your suggestion and that is what I need exactly. May I have to know any reference guide for me to follow?

Hugo

hi Hugo,

what product/s are you using on your end?

Hugo,

If you know the public IP addresses of the sites you plan to tunnel then you can do a regular Lan to Lan Tunnel and put those public IPs on the interesting traffic for the VPN tunnel.

The commands would depend the hardware that use. What kind of devices are you planning to use to build the VPN tunnel?

Thanks.

Raga

Cisco Adaptive Security Appliance Software Version 8.0(4)

Device Manager Version 6.1(5)51

We are using ASA 5510

Hugo

Paulkazzi

Is that suitable for remote access (VPN Client) but anyway I will try it.

Hugo

Paulkazzi

It is not help for me with your URL. Our situtation is

Site A: ASA 5510 (Wan IP: 12.12.12.12)

Site B: PC with Cisco VPN Client installed  (IPSec tunnel) (Wan IP: 13.13.13.13)

We would to access google.com for example passing through site A (12.12.12.12) by using IPSec tunnel from site B.

For the rest internet traffic, keep using local ISP (13.13.13.13)

Hugo

Luis Diego/Hugo,

If the traffic is site to site tunnels it will work since you WILL know what are the subnets on the other site of the tunnel.

Mike.

Mike

Maykol, again this would work only if you know the Public IP addresses of the sites you want to send thru the VPN tunnel, regardless if it is site to site or VPN Clients.

Hugo,

Lets say that Google's IP Addresses are 1.1.1.1, 1.1.1.2 and 1.1.1.3. Then you would need to send that traffic  thru the VPN tunnel.

Your config would look something like this:

access-list split_tun standard permit host 1.1.1.1

access-list split_tun standard permit host 1.1.1.2

access-list split_tun standard permit host 1.1.1.3

group-policy TEST internal

group-policy TEST attributes

split-tunnel-policy tunnelspecified

split-tunnel-network-list value split_tun

ip local pool TestPool 192.168.100.1-192.168.100.20 mask 255.255.255.0

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto dynamic-map Outside_dyn_map 10 set transform-set ESP-3DES-SHA

crypto map Outside_map 10 ipsec-isakmp dynamic Outside_dyn_map

crypto map Outside_map interface Outside

same-security-traffic permit intra-interface

nat (outside) 1 192.168.100.0 255.255.255.0

crypto isakmp enable Outside

crypto isakmp policy 10

  authentication pre-share

  encryption 3des

  hash sha    

  group 2

  lifetime 86400

crypto isakmp nat-traversal  20

tunnel-group TEST type ipsec-ra

tunnel-group TEST general-attributes

  address-pool TestPool

  default-group-policy TEST

tunnel-group TEST ipsec-attributes

pre-shared-key cisco123

It would be very similar to this:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805734ae.shtml

Only that instead of tunneling all the internet traffic you will be doing specific IP addresses. BTW with the commands I included above you are only using the VPN route the internet traffic for "Google". If you also need to access the subnet behind the ASA-VPN server (lets say 10.10.10.0/24) you would need to add something like this:

access-list split_tun standard permit 10.10.10.0 255.255.255.0

access-list nonat permit ip 10.10.10.0 255.255.255.0 192.168.100.0 255.255.255.0

nat (inside) 0 access-l nonat

I hope this helps. Let us if you have any other questions.

Raga.

Luis Diego,

Good point.

If you have a site to site, you must know the Peer IP address and the networks on the other site to encrypt the traffic, dont you? (Except case with dynamic crypto map, of course this falls in the same category of the RA VPNs because of the use of IP addresses that you dont know)

The trick is to point the peers with a route towards the new link, there is no need to discuss, if you know the networks/hosts in order to do so (Normally on Site to Site you do) thats great, otherwise, it wont work.

Mike.

Mike

Regardless if its VPN Client or site to site you need to know the IP Addresses of the hosts you want to access thru the tunnel (unless you do a full tunnel). Therefore Hugo needs to know the IP addresses of the websites he is planning to route thru the tunnel, that's what I'm trying to say. 

If you just use routing over the internet the traffic will go on clear text, plus you cant route the traffic back to the client's private IP Addresses since those are not routable.

If you dont point the private network towards the new ISP, The ASA will use its routing decision towards the old ISP, thus never hitting the crypto map nor encrypting the traffic.

You are totally right... You need to know the IPs... What I am just saying is that it will be easier to do with L2L since normally you do know the IP of the endpoint and the Networks to be encrypted.

Mike

Mike
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: