|

IPsec Site to Site VPN with Dynamic Public IP

Site to Site VPN with Dynamic Public IP
Summary Insights:
  • Today we will cover IPsec site to site VPN with dynamic IP on one side. As you know to establish IPsec site to site VPN one side must be static public ip address. In some cases, branches site has ADSL ( Asymmetric Digital Subscriber Line) assigning Dynamic IP connection but on main Data Center side static public ip address.
  • Dynamic public IP configuration will be done on cisco routers

If you want to learn IPsec site to Site VPN with both side static ip address & HUB to spoke  click here –> IPsec site to site

IPsec Site-to-Site VPN With Dynamic IP

Below are the topology that one side Data center static public ip address & branch side has dynamic ip address ,Now we need to configure IPsec site to site VPN.

IPsec site to site VPN with Dynamic IP

The Same IPsec configuration will do that we covered in our last IPsec Configuration post only below change required on Data Center (DC) router.

  • No Access-List (ACL) Required on DC site
  • Create Dynamic Crypto MAP
  • No spcific peer IP on DC just mentioned 0.0.0.0
  • Initiate traffic from branch site

EVE-NG Topology:

Below topology will be used , LAN side subnet configured on loopback interface

Branch site has dynamic ip but just to verify in lab i have configured 200.0.0.1

ipsec site to site VPN through Dynamic IP Address

Configuration on DC site:

Interface IP Address

physical & loopback ip address

Crypto Policy & Key Configuration,peer ip is 0.0.0.0

There is no ACL on DC site

crypto isamkm

Configure Dynamic MAP & Call Dynamic map in normal MAP as below

Crypto Dynamic map

Default static route toward ISP & Call crypto map under interface

!
ip route 0.0.0.0 0.0.0.0 100.0.0.2
!

interface FastEthernet0/0
ip address 100.0.0.1 255.255.255.0
duplex half
crypto map mymap
!

Configuration on Branch-Office

Physical & loopback interface IP address

interface ip address

Crypto Policy Configuration on Branch-office

crypto isakmp policy

Access list Configuration

access-list in cisco router cli

Crypto MAP configuration

crypto map

Default static route & Physical interface configuration

!
ip route 0.0.0.0 0.0.0.0 200.0.0.2
!

!
interface FastEthernet0/0
ip address 200.0.0.1 255.255.255.0
duplex half
crypto map mymap
!

Verification

DC LAN IP address is pingable from Branch-Office

ping

Verify IPsec Tunnel is up

ipsec phase-1 status

ipsec crypto engine connection

Download Configuration Files

Leave a Reply

Your email address will not be published. Required fields are marked *