draft – OSPF + NAT + BGP + AREA 0 over IPSEC

OSPF + NAT + BGP
We are NOT distributing the default route from R1 here, as we’ve done on the OSPF and BGP PoCs. We here rather assume the R2 and R3 routers are the default route for their respective network.
R2 (c7200)
interface FastEthernet0/0
ip address 10.1.1.1 255.255.255.0
ip nat inside
ip ospf 1 area 1
no shut
interface FastEthernet0/1
ip address 200.0.0.1 255.255.255.252
ip nat outside
no shut
router ospf 1
redistribute connected
passive-interface FastEthernet0/1
router bgp 65000
neighbor 200.0.0.2 remote-as 65002
ip nat inside source list 1 interface fa0/1 overload
ip nat inside source list 2 interface fa0/1 overload
access-list 1 permit 10.1.1.0 0.0.0.255
access-list 2 permit 192.168.122.0 0.0.0.255
R3 (c7200)
interface FastEthernet0/0
ip address 200.0.0.2 255.255.255.252
ip nat outside
no shut
interface FastEthernet0/1
ip address 10.3.3.254 255.255.255.0
ip nat inside
ip ospf 1 area 2
no shut
router ospf 1
redistribute connected
passive-interface FastEthernet0/0
router bgp 65002
neighbor 200.0.0.1 remote-as 65000
ip nat inside source list 1 interface fa0/0 overload
ip nat inside source list 2 interface fa0/0 overload
access-list 1 permit 10.3.3.0 0.0.0.255
access-list 2 permit 10.4.4.0 0.0.0.255
R1 (c3725) and its default route against the next hop
interface FastEthernet0/0
ip address 192.168.122.196 255.255.255.0
ip ospf 1 area 1
no shut
interface FastEthernet0/1
ip address 10.1.1.254 255.255.255.0
ip ospf 1 area 1
no shut
router ospf 1
redistribute connected
ip route 0.0.0.0 0.0.0.0 10.1.1.1
R4 (c3725) and its default route against the next hop
interface FastEthernet0/0
ip address 10.3.3.1 255.255.255.0
ip ospf 1 area 2
no shut
interface FastEthernet0/1
ip address 10.4.4.254 255.255.255.0
ip ospf 1 area 2
no shut
router ospf 1
redistribute connected
ip route 0.0.0.0 0.0.0.0 10.3.3.254
PC1
ip address 10.4.4.1/24 10.4.4.254 save
NAT1
route add -net 10.1.1.0/24 gw 192.168.122.196
route add -net 10.2.2.0/24 gw 192.168.122.196
route add -net 10.3.3.0/24 gw 192.168.122.196
route add -net 10.4.4.0/24 gw 192.168.122.196
route add -net 200.0.0.0/30 gw 192.168.122.196
The big news here is that OSPF AREA 0 works over the secured pipe. Hence no need for the static routes against the other network location.
R2
crypto isakmp policy 1
encr aes
authentication pre-share
group 2
crypto isakmp key beep-beep address 200.0.0.2
crypto ipsec transform-set some-transport-set esp-aes esp-sha-hmac
crypto ipsec profile some-ipsec-profile
set transform-set some-transport-set
interface Tunnel0
ip address 10.199.199.1 255.255.255.0
tunnel source 200.0.0.1
tunnel mode ipsec ipv4
tunnel destination 200.0.0.2
tunnel protection ipsec profile some-ipsec-profile
ip ospf 1 area 0
!ip route 10.3.3.0 255.255.255.0 Tunnel0
!ip route 10.4.4.0 255.255.255.0 Tunnel0
R3
crypto isakmp policy 1
encr aes
authentication pre-share
group 2
crypto isakmp key beep-beep address 200.0.0.1
crypto ipsec transform-set some-transport-set esp-aes esp-sha-hmac
crypto ipsec profile some-ipsec-profile
set transform-set some-transport-set
interface Tunnel0
ip address 10.199.199.2 255.255.255.0
tunnel source 200.0.0.2
tunnel mode ipsec ipv4
tunnel destination 200.0.0.1
tunnel protection ipsec profile some-ipsec-profile
ip ospf 1 area 0
!ip route 10.1.1.0 255.255.255.0 Tunnel0
!ip route 192.168.122.0 255.255.255.0 Tunnel0
from R2
ping 200.0.0.2 source 10.1.1.1
from R1
show ip route ping 200.0.0.2
from the host system (NAT1)
ping 200.0.0.2
from the host system (NAT1)
ping 10.3.3.254 ping 10.3.3.1 ping 10.4.4.254 ping 10.4.4.1
and you should see ESP datagrams on the wire in the center.
https://cisco.goffinet.org/ccna/ospf/lab-ospf-multi-area/ –> 15. Activation de la connexion Internet IPv4
https://www.ciscomadesimple.be/2013/04/06/configuration-du-nat-sur-un-routeur-cisco/
https://www.practicalnetworking.net/stand-alone/cisco-nat-configurations-ios-router/
https://www.networkstraining.com/configuring-nat-on-cisco-routers/
https://community.cisco.com/t5/switching/default-route-and-routing-protcols/td-p/1237502