Hello. After I do traceroute from host 192.168.11.0/24 to the server 10.0.0.0/24, which is website B. When the packets get into the general public space it present Request timed out
(as proven on this determine). I am utilizing IPSec protocol btw. thanks…
KCP 1 (SITE A) Conf
Present configuration : 1284 bytes
!
model 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname KCP1
!
!
!
!
!
!
!
!
ip cef
no ipv6 cef
!
!
!
!
license udi pid CISCO2911/K9 sn FTX1524EEWL-
license boot module c2900 technology-package securityk9
!
!
!
crypto isakmp coverage 1
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp key bjj tackle 209.165.100.1
!
!
!
crypto ipsec transform-set TS esp-3des esp-md5-hmac
!
crypto map bjjtunnel 1 ipsec-isakmp
set peer 209.165.100.1
set transform-set TS
match tackle vpn-ke-bjjpusat
!
!
!
!
!
!
spanning-tree mode pvst
!
!
!
!
!
!
interface GigabitEthernet0/0
ip tackle 209.165.101.1 255.255.255.248
duplex auto
velocity auto
crypto map bjjtunnel
!
interface GigabitEthernet0/1
ip tackle 192.168.11.1 255.255.255.0
duplex auto
velocity auto
!
interface GigabitEthernet0/2
no ip tackle
duplex auto
velocity auto
shutdown
!
interface Vlan1
no ip tackle
shutdown
!
ip classless
ip route 0.0.0.0 0.0.0.0 209.165.101.2
!
ip flow-export model 9
!
!
ip access-list prolonged vpn-ke-bjjpusat
allow ip 192.168.11.0 0.0.0.255 192.168.10.0 0.0.0.255
allow ip 192.168.11.0 0.0.0.255 10.0.0.0 0.0.0.255
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
!
!
finish
BJJPUSAT (SITE B) Conf
Present configuration : 1290 bytes
!
model 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname BJJPUSAT
!
!
!
!
!
!
!
!
ip cef
no ipv6 cef
!
!
!
!
license udi pid CISCO2911/K9 sn FTX1524I08N-
license boot module c2900 technology-package securityk9
!
!
!
crypto isakmp coverage 1
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp key bjj tackle 209.165.101.1
!
!
!
crypto ipsec transform-set TS esp-3des esp-md5-hmac
!
crypto map bjjtunnel 1 ipsec-isakmp
set peer 209.165.101.1
set transform-set TS
match tackle vpn-ke-kcp1
!
!
!
!
!
!
spanning-tree mode pvst
!
!
!
!
!
!
interface GigabitEthernet0/0
ip tackle 209.165.100.1 255.255.255.248
duplex auto
velocity auto
crypto map bjjtunnel
!
interface GigabitEthernet0/1
ip tackle 192.168.10.1 255.255.255.0
duplex auto
velocity auto
!
interface GigabitEthernet0/2
ip tackle 10.0.0.1 255.255.255.0
duplex auto
velocity auto
!
interface Vlan1
no ip tackle
shutdown
!
ip classless
ip route 0.0.0.0 0.0.0.0 209.165.100.2
!
ip flow-export model 9
!
!
ip access-list prolonged vpn-ke-kcp1
allow ip 192.168.10.0 0.0.0.255 192.168.11.0 0.0.0.255
allow ip 10.0.0.0 0.0.0.255 192.168.11.0 0.0.0.255
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
!
!
finish