draft – OSPF + NAT + BGP + AREA 0 over IPSEC
OSPF + NAT + BGP
We are NOT distributing the default route from R1 here, as we’ve done on the OSPF and BGP PoCs. We here rather assume the R2 and R3 routers are the default route for their respective network.
R2 (c7200)
interface FastEthernet0/0 ip address 10.1.1.1 255.255.255.0 ip nat inside ip ospf 1 area 1 no shut interface FastEthernet0/1 ip address 200.0.0.1 255.255.255.252 ip nat outside no shut router ospf 1 redistribute connected passive-interface FastEthernet0/1 router bgp 65000 neighbor 200.0.0.2 remote-as 65002 ip nat inside source list 1 interface fa0/1 overload ip nat inside source list 2 interface fa0/1 overload access-list 1 permit 10.1.1.0 0.0.0.255 access-list 2 permit 192.168.122.0 0.0.0.255
R3 (c7200)
interface FastEthernet0/0 ip address 200.0.0.2 255.255.255.252 ip nat outside no shut interface FastEthernet0/1 ip address 10.3.3.254 255.255.255.0 ip nat inside ip ospf 1 area 2 no shut router ospf 1 redistribute connected passive-interface FastEthernet0/0 router bgp 65002 neighbor 200.0.0.1 remote-as 65000 ip nat inside source list 1 interface fa0/0 overload ip nat inside source list 2 interface fa0/0 overload access-list 1 permit 10.3.3.0 0.0.0.255 access-list 2 permit 10.4.4.0 0.0.0.255
R1 (c3725) and its default route against the next hop
interface FastEthernet0/0 ip address 192.168.122.196 255.255.255.0 ip ospf 1 area 1 no shut interface FastEthernet0/1 ip address 10.1.1.254 255.255.255.0 ip ospf 1 area 1 no shut router ospf 1 redistribute connected ip route 0.0.0.0 0.0.0.0 10.1.1.1
R4 (c3725) and its default route against the next hop
interface FastEthernet0/0 ip address 10.3.3.1 255.255.255.0 ip ospf 1 area 2 no shut interface FastEthernet0/1 ip address 10.4.4.254 255.255.255.0 ip ospf 1 area 2 no shut router ospf 1 redistribute connected ip route 0.0.0.0 0.0.0.0 10.3.3.254
PC1
ip address 10.4.4.1/24 10.4.4.254 save
NAT1
route add -net 10.1.1.0/24 gw 192.168.122.196 route add -net 10.2.2.0/24 gw 192.168.122.196 route add -net 10.3.3.0/24 gw 192.168.122.196 route add -net 10.4.4.0/24 gw 192.168.122.196 route add -net 200.0.0.0/30 gw 192.168.122.196
The big news here is that OSPF AREA 0 works over the secured pipe. Hence no need for the static routes against the other network location.
R2
crypto isakmp policy 1 encr aes authentication pre-share group 2 crypto isakmp key beep-beep address 200.0.0.2 crypto ipsec transform-set some-transport-set esp-aes esp-sha-hmac crypto ipsec profile some-ipsec-profile set transform-set some-transport-set interface Tunnel0 ip address 10.199.199.1 255.255.255.0 tunnel source 200.0.0.1 tunnel mode ipsec ipv4 tunnel destination 200.0.0.2 tunnel protection ipsec profile some-ipsec-profile ip ospf 1 area 0 !ip route 10.3.3.0 255.255.255.0 Tunnel0 !ip route 10.4.4.0 255.255.255.0 Tunnel0
R3
crypto isakmp policy 1 encr aes authentication pre-share group 2 crypto isakmp key beep-beep address 200.0.0.1 crypto ipsec transform-set some-transport-set esp-aes esp-sha-hmac crypto ipsec profile some-ipsec-profile set transform-set some-transport-set interface Tunnel0 ip address 10.199.199.2 255.255.255.0 tunnel source 200.0.0.2 tunnel mode ipsec ipv4 tunnel destination 200.0.0.1 tunnel protection ipsec profile some-ipsec-profile ip ospf 1 area 0 !ip route 10.1.1.0 255.255.255.0 Tunnel0 !ip route 192.168.122.0 255.255.255.0 Tunnel0
from R2
ping 200.0.0.2 source 10.1.1.1
from R1
show ip route ping 200.0.0.2
from the host system (NAT1)
ping 200.0.0.2
from the host system (NAT1)
ping 10.3.3.254 ping 10.3.3.1 ping 10.4.4.254 ping 10.4.4.1
and you should see ESP datagrams on the wire in the center.
https://cisco.goffinet.org/ccna/ospf/lab-ospf-multi-area/ –> 15. Activation de la connexion Internet IPv4
https://www.ciscomadesimple.be/2013/04/06/configuration-du-nat-sur-un-routeur-cisco/
https://www.practicalnetworking.net/stand-alone/cisco-nat-configurations-ios-router/
https://www.networkstraining.com/configuring-nat-on-cisco-routers/
https://community.cisco.com/t5/switching/default-route-and-routing-protcols/td-p/1237502