Question : Adding multipe ipsec policies to a cisco router

Hi,
I have just successfully created an IPSEC VPN tunnel between two cisco routers with the config I pasted below. My question is, how do I connect another router to this ipsec tunnel. Eg, the config pasted below is the IPSEC tunnel between Sydney and Rydalmere head office. I now need to connect our parammatta office to the IPsec VPN in Sydney, so all 3 are running. Can someone please advice how to get the 3rd policy integrated into this design?

Thanks


Cisco router at Head Office

crypto isakmp policy 20
 encr aes 256
 authentication pre-share
 group 2
 lifetime 28800
crypto isakmp key {sharekey} address 203.94.149.X

crypto ipsec transform-set crazy_johns_tset esp-aes 256 esp-sha-hmac

crypto map cj_map 10 ipsec-isakmp
 set peer 203.94.149.X
 set transform-set crazy_johns_tset
 match address 102

Other Site config

crypto isakmp policy 20
 hash md5
 authentication pre-share
 group 2
 lifetime 28800

crypto isakmp key {sharekey} address 203.38.180.X

crypto ipsec transform-set crazy_johns_tset esp-aes 256 esp-sha-hmac
!
crypto map cj_map 10 ipsec-isakmp
 set peer 203.38.180.X
 set transform-set crazy_johns_tset
 match address 102

Answer : Adding multipe ipsec policies to a cisco router

Just need to add to your crypto map:

i.e.:

!  Add a new crypto isakmp key statement for the new peer
crypto isakmp key {sharekey} address x.x.x.x

!  Add a new crypto map entry - same name different sequence number
crypto map cj_map 20 ipsec-isakmp
 set peer x.x.x.x
 set transform-set crazy_johns_tset
 match address 103

! Make sure access-list 103 is defined for traffic that will flow between these two sites

Hope that helps
Random Solutions  
 
programming4us programming4us