hi i m setting up easy vpn between two 3640 routers, 1 is a server and the other is client, ios is c3640-jk9o3s-mz.124-12,, on the server i had a loopback address of 184.108.40.206, now at client under client configuration i selected mode client, everything goes well i m asked for xauth, i entered n on client a loopback is formed and ip from the pool is assigned to it ( my pool was 220.127.116.11 - 18.104.22.168) ip assigend was 22.214.171.124, at server i issued reverse-route under dynamic-map, so after assingning the ip it created a static route to 126.96.36.199/32 !!! till here its fine but wat abt the client ??? client didnt setup any route for the the receiving ip !! now suppose if i want to ping the loopback of server 188.8.131.52 the client wont be able to ping it cause the same network is found on its loopback interface right, now plz tell me the solution of it, like server is there any way to inject the route automatically or do i have to do anything else plz tell me
First off, what is the purpose of the loopback interface in our case? Secondly, do we have split tunnel configured?
The server does inject the routes for the network/subnets and hosts configured in the Split tunnel ACL. So if split tunnel is configured then you might want to add the loopback ip to it. If the split tunnel is not configured then by default a default route is pushed.
can anybody tell me how to configure gre over easy vpn ??? i have easy vpn formed between 2 routers, one as a server and 1 as a client ( im using with 12.4 t1 ios ) now i want all the traffic to go thru the tunnel just like in site to site vpn, but i m not able to do it easy vpn, nor i found any such configuration example on cisco !! is this scenrios possible at all ?? if some1 has done it plz tell me
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :