Question : Cisco IKE/IPSEC Question

On the CISCO FAQ:
-------------------------------------------------------------------------
Configuring IPSec
Whether you use pre−shared keys or configure a CA, once you setup Internet Key Exchange IKE, you still
have to setup IPSec. Regardless of which IKE method we use, the configuration steps for IPSec are the same.

To configure IPSec, we need to:

Create extended ACL  
Create IPSec transform(s) ·
Create crypto map ·
Apply crypto map to interface ·
Create Extended ACL

The command below is a very simple ACL that allows the routers to talk to one another (a Telnet from one
router to the next, for example).

dt3−45a(config)# access−list 101 permit ip host 192.168.10.38 host 192.168.10.66

A more realistic ACL looks like the command below. This command is an ordinary extended ACL, where
192.168.3.0 is a subnet behind the router in question, and 10.3.2.0 is a subnet somewhere behind the peer router. Remember that permit means encrypt and deny means don't encrypt.

dt3−45a(config)#access−list 101 permit ip 192.168.3.0 0.0.0.255 10.3.2.0 0.0.0.255

-------------------------------------------------------------------------


I have 2 Q..

1. Can I create an extended access list with only certain ports, so that only traffic on certain ports gets encrypted? I.E. Telnet, or Terminal Services(citrix)?

2. I have 1 or 2 GRE tunnels from One point on the internet to another on the internet. Can I encrypt the GRE traffic going over the tunnel to HQ, but allow Local NAT for the users at the branch office?

Thanks in advance.



Answer : Cisco IKE/IPSEC Question

If you setup a GRE tunnel, and put the crypto map on the tunnel, not on the serial interface, then you don't have to worry about nat or no-nat at all. A simple route statement directing traffic to the HQ site subnet to go through the GRE tunnel should be all you need.

i.e.

interface Tunnel0
 ip address 192.168.100.1 255.255.255.0
 no ip directed-broadcast
 tunnel source FastEthernet0/0
 tunnel destination 10.3.3.1
 crypto map mymap
!

ip route 10.10.0.0 255.255.0.0 192.168.100.2



http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800946b8.shtml

Random Solutions  
 
programming4us programming4us