Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

Add 1 more tunnel on the existing firewall

I have an existing tunnel between 2 sites: (A and B) configured on 2 FWs. Now I was asked to add 1 more tunnel berween A and C. Since C is new site, I can just copy the existing configuration and change the IP address for site C, how about A? how is the configuration need to be done to add one more tunnel?

The following is my existing config on FW A (only VPN related commands are listed):

access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

access-list NoNAT permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

nat (inside) 0 access-list NoNAT

isakmp enable outside

isakmp key xxxxxxxx address 1.1.1.1 netmask 255.255.255.255

isakmp policy 1 authentication pre-share

isakmp policy 1 encryption 3des

isakmp policy 1 hash md5

isakmp policy 1 group 2

isakmp policy 1 lifetime 86400

crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto map outside_map 1 ipsec-isakmp

crypto map outside_map 1 match address 101

crypto map outside_map 1 set peer 1.1.1.1

crypto map outside_map 1 set transform-set ESP-3DES-MD5

crypto map outside_map interface outside

management-access inside

sysopt connection permit-ipsec

by the way: A site LAN is 192.168.1.0

B site: 192.168.2.0

C site: 192.168.3.0

3 REPLIES
Cisco Employee

Re: Add 1 more tunnel on the existing firewall

Hi,

Assuming you are using same encryption and authentication parameters as Site B (Same Iskamp policies and same Trnasform set), you require following changes to add a tunnel between Site A and C.

access-list 102 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0

access-list NoNAT permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0

isakmp key xxxxxxxx address netmask 255.255.255.255

crypto map outside_map 2 ipsec-isakmp

crypto map outside_map 2 match address 102

crypto map outside_map 2 set peer

crypto map outside_map 2 set transform-set ESP-3DES-MD5

That's it !!

*Please rate if this helps.

-Kanishka

New Member

Re: Add 1 more tunnel on the existing firewall

thanks for your prompt reply, my another question is "2" in the "crypto map outside_map". correct me if i am wrong, "2" in the IPsec should the same as the number in ike configure, right?

Cisco Employee

Re: Add 1 more tunnel on the existing firewall

No, it doesn't matter.

It could be any number other than "1" as you have one crypto map defined with priority "1".

All the crypto maps on the device, should have the same name, but different sequence number. The sequence number can be random.

It has nothing to do with the IKE policy.

*Please rate if helped.

-Kanishka

91
Views
0
Helpful
3
Replies