cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
320
Views
0
Helpful
1
Replies

DMVPN Problem. Full Mesh - Single Hub

dmurray
Level 1
Level 1

Situation. 1 Hub, 2 Spokes (currently)

OSPF. Tunnels up. Routes showing ok.

All routers 1811. IOS 12.4 Adv IP Services.

All sites can ping all tunnel interfaces w/o issue.

LAN Traffic issues as follows:

Hub can ping spoke 1 node, but not spoke 2 node, trace shows traffic stopping at spoke 2 tunnel interface.

Spoke1 can get to HUBLAN, but now SPOKE2LAN. Trace shows Traffic gets to Spoke2 Tunnel Interface

Spoke2 can get to HUBLAN -AND- Spoke1LAN without any issue.

Checked NAT to ensure that SourceLAN-DestLAN is EXCLUDED for all site LANs (ie.: spoke1LAN-HUBLAN and spoke1LAN-Spoke2LAN at spoke1, etc)

If Spoke2 can get to both Hub and Spoke1, I can't figure out why neither the Hub, nor Spoke1 can get to it.

Its gotta be an ACL issue, I'm sure, but I don't see it.

ACLs at Spoke2:

ip access-list extended ACL-vlan1-out

remark Defines what traffic is allowed to leave the local LAN

remark Limits traffic to that coming from the assigned IP Range

permit icmp 192.168.100.0 0.0.0.255 any echo log-input

permit icmp 192.168.100.0 0.0.0.255 any echo-reply log-input

permit icmp 192.168.100.0 0.0.0.255 any traceroute

permit ip 192.168.100.0 0.0.0.255 any log-input

deny ip any any

ip access-list extended NAT-LIST

deny ip 192.168.100.0 0.0.0.255 172.16.1.0 0.0.0.255

deny ip 192.168.100.0 0.0.0.255 192.168.200.0 0.0.0.255

permit ip 192.168.100.0 0.0.3.255 any

!

interface Vlan1

description LEGACY LAN

ip address 192.168.100.1 255.255.255.0

ip access-group ACL-Vlan1-Out in

ip nat inside

ip virtual-reassembly

!

!

interface Tunnel0

bandwidth 1000

ip address 192.168.252.2 255.255.255.0

no ip redirects

ip mtu 1400

ip nhrp authentication NHRP_KEY

ip nhrp map multicast 68.225.80.199

ip nhrp map 192.168.252.1 68.225.80.199

ip nhrp network-id 100000

ip nhrp holdtime 300

ip nhrp nhs 192.168.252.1

ip nhrp cache non-authoritative

ip ospf network broadcast

ip ospf priority 0

delay 1000

tunnel source FastEthernet0

tunnel mode gre multipoint

tunnel key 100000

tunnel protection ipsec profile vpnprof

!

1 Reply 1

dmurray
Level 1
Level 1

belay my last. issue appears to be LAN related at the spoke2 site. For some odd reason client gateways are mysteriously changing.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: