assuming gns3 c7200 dynamips appliances
internal and mgmt interface
setup basic mgmt setup (passwords...) snmp? yes mgnt interface --> fa0/1 fdx yes ! nethence 192.168.1.254/24 ! os3 10.9.9.254/24 ! nowhere 10.99.99.254/24
front-facing/public interface
conf terminal interface fa0/0 ! nethence ip address 123.0.0.1 255.255.255.0 ! os3 ip address 123.0.0.2 255.255.255.0 ! nowhere ip address 123.0.0.3 255.255.255.0 no shutdown exit
check
! os3-pc set pcname os3-pc ip 10.9.9.1/24 10.9.9.254 save ping 10.9.9.254 ! nowhere-pc set pcname nowhere-pc ip 10.99.99.1/24 10.99.99.254 save ping 10.99.99.254 ! nethence-pc ping 192.168.1.254 route add -net 10.9.9.0/24 gw 192.168.1.254 route add -net 10.99.99.0/24 gw 192.168.1.254 ! nethence ping 123.0.0.2 ping 123.0.0.3 ! os3 ping 123.0.0.3 write memory
between nethence and os3
crypto isakmp policy 1 encryption aes authentication pre-share group 2
point to the neighbor
! nethence crypto isakmp key beep-beep address 123.0.0.2 ! os3 crypto isakmp key beep-beep address 123.0.0.1 crypto ipsec transform-set some-transport-set esp-aes esp-sha-hmac mode tunnel crypto ipsec profile some-ipsec-profile set transform-set some-transport-set
define the tunnel interface
interface tunnel 0 ! nethence ip address 10.199.199.1 255.255.255.0 tunnel source 123.0.0.1 tunnel destination 123.0.0.2 ! os3 ip address 10.199.199.2 255.255.255.0 tunnel source 123.0.0.2 tunnel destination 123.0.0.1 tunnel mode ipsec ipv4 tunnel protection ipsec profile some-ipsec-profile
you should see this appearing in the console
%LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to up
static routes and enable routing
! nethence ip route 10.9.9.0 255.255.255.0 tunnel 0 ip routing ! os3 ip route 192.168.1.0 255.255.255.0 tunnel 0 ip routing
check and save router configuration
! nethence-pc ping 10.9.9.1 write memory
between nethence and nowhere
nethence
conf terminal crypto isakmp key beep-beep1 address 123.0.0.3 interface tunnel 1 ip address 10.209.209.1 255.255.255.0 tunnel source 123.0.0.1 tunnel destination 123.0.0.3 tunnel mode ipsec ipv4 tunnel protection ipsec profile some-ipsec-profile end
nowhere
conf terminal crypto isakmp policy 1 encryption aes authentication pre-share group 2 exit crypto isakmp key beep-beep1 address 123.0.0.1 crypto ipsec transform-set some-transport-set esp-aes esp-sha-hmac mode tunnel exit crypto ipsec profile some-ipsec-profile set transform-set some-transport-set exit interface tunnel 1 ip address 10.209.209.3 255.255.255.0 tunnel source 123.0.0.3 tunnel destination 123.0.0.1 tunnel mode ipsec ipv4 tunnel protection ipsec profile some-ipsec-profile end
static routes and enable routing
! nethence ip route 10.99.99.0 255.255.255.0 tunnel 1 ! nowhere ip route 192.168.1.0 255.255.255.0 tunnel 1 ip routing
check and save router configuration
! nethence-pc ping 10.99.99.1 write memory
between os3 and nowhere
os3
conf terminal crypto isakmp key beep-beep2 address 123.0.0.3 interface tunnel 2 ip address 10.219.219.2 255.255.255.0 tunnel source 123.0.0.2 tunnel destination 123.0.0.3 tunnel mode ipsec ipv4 tunnel protection ipsec profile some-ipsec-profile end
nowhere
conf terminal crypto isakmp key beep-beep2 address 123.0.0.2 interface tunnel 2 ip address 10.219.219.3 255.255.255.0 tunnel source 123.0.0.3 tunnel destination 123.0.0.2 tunnel mode ipsec ipv4 tunnel protection ipsec profile some-ipsec-profile end
more static routes
! os3 ip route 10.99.99.0 255.255.255.0 tunnel 2 ! nowhere ip route 10.9.9.0 255.255.255.0 tunnel 2
check and save router configuration
! os3-pc ping 10.99.99.1 write memory
%CRYPTO-6-IKMP_MODE_FAILURE: Processing of Informational mode failed with peer at 123.0.0.1 Tunnel0 is up, line protocol is down
==> double check neighbor address and that sets/tags do match
Cisco IPsec VPN Hardware for Cisco 7200 Series Routers At-A-Glance https://www.cisco.com/c/dam/en/us/products/collateral/interfaces-modules/vpn-acceleration-module-2-plus/at_a_glance_c45-466108_v1.pdf
Chapter: Site-to-Site and Extranet VPN Business Scenarios https://www.cisco.com/c/en/us/td/docs/security/vpn_modules/6342/vpn_cg/6342site3.html
Cisco IPsec Easy VPN Configuration https://networklessons.com/uncategorized/cisco-ipsec-easy-vpn-configuration/
How To Use VPCS in GNS3 https://protechgurus.com/how-to-use-vpcs-in-gns3/
IPSec Static Virtual Tunnel Interface https://forum.networklessons.com/t/ipsec-static-virtual-tunnel-interface/2374/7
IPSec Static Virtual Tunnel Interface https://networklessons.com/cisco/ccie-routing-switching-written/ipsec-static-virtual-tunnel-interface/
Quick Configs - Dynamic VTI IPsec (virtual-template, unnumbered, keyring, isakmp) https://www.youtube.com/watch?v=c1FyP71dVOE
#100DaysOfLabbing - Day 1 & 2 https://showipintbri.blogspot.com/2018/07/100daysoflabbing-day-1-2.html
%CRYPTO-6-IKMP_MODE_FAILURE: Processing of Informational mode failed with p https://community.cisco.com/t5/other-security-subjects/crypto-6-ikmp-mode-failure-processing-of-informational-mode/td-p/90618
Cisco System Messages https://www.cisco.com/c/en/us/td/docs/ios/system/messages/guide/consol_smg.html
Chapter: Cisco System Messages Overview https://www.cisco.com/c/en/us/td/docs/ios/system/messages/guide/consol_smg/sm_cnovr.html