OK I'm a bit of a Cisco n00b so I'm sure this is really obvious
I've got a Fortigate firewall at our main site and several Cisco 877 ADSL routers at remote sites set up with VPNs to the fortigate. All works fine, although I want to be able to route between 2 of the remote sites. This is the config I'm working with:
So I've added a route to both sites (ip route 192.168.11.0 255.255.255.0 172.16.254.255 and the equivalent at the other end - 254.255 is the firewall's internal address) but it still seems to try routing traffic destined for the other site over the net. What am I missing?
I've got a Fortigate firewall at our main site and several Cisco 877 ADSL routers at remote sites set up with VPNs to the fortigate. All works fine, although I want to be able to route between 2 of the remote sites. This is the config I'm working with:
show run
Building configuration...
Current configuration : 2634 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ****
!
boot-start-marker
boot-end-marker
!
enable secret ****
!
no aaa new-model
!
resource policy
!
ip subnet-zero
ip cef
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.13.1 192.168.13.20
ip dhcp excluded-address 192.168.13.200 192.168.13.254
!
ip dhcp pool DHCP
network 192.168.13.0 255.255.255.0
dns-server 172.16.0.1 172.16.0.7
default-router 192.168.13.254
option 150 ip 172.17.10.1
!
!
no ip domain lookup
!
!
!
!
!
!
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key ****
!
!
crypto ipsec transform-set strong esp-3des esp-md5-hmac
!
crypto map vpn 10 ipsec-isakmp
set peer ****
set transform-set strong
match address 102
crypto map vpn 20 ipsec-isakmp
set peer ****
set transform-set strong
match address 103
!
!
!
interface ATM0
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
pvc 0/38
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface FastEthernet0
no cdp enable
!
interface FastEthernet1
no cdp enable
!
interface FastEthernet2
no cdp enable
!
interface FastEthernet3
no cdp enable
!
interface Vlan1
ip address 192.168.13.254 255.255.255.0
ip access-group 100 in
ip nat inside
ip virtual-reassembly
ip route-cache flow
ip tcp adjust-mss 1452
!
interface Dialer0
ip address negotiated
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer pool 1
ppp authentication chap callin
ppp chap hostname ****
ppp chap password 7 ****
crypto map vpn
!
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer0
!
no ip http server
no ip http secure-server
ip nat inside source list 105 interface Dialer0 overload
!
access-list 102 permit ip 192.168.13.0 0.0.0.255 172.16.0.0 0.0.255.255
access-list 103 permit ip 192.168.13.0 0.0.0.255 172.17.0.0 0.0.255.255
access-list 105 deny ip 192.168.13.0 0.0.0.255 172.16.0.0 0.0.255.255
access-list 105 deny ip 192.168.13.0 0.0.0.255 172.17.0.0 0.0.255.255
access-list 105 permit ip 192.168.13.0 0.0.0.255 any
snmp-server community public RO
snmp-server community private RW
snmp-server enable traps tty
!
control-plane
!
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
no modem enable
line aux 0
line vty 0 4
password 7 106358150900425B08
login
!
scheduler max-task-time 5000
end
So I've added a route to both sites (ip route 192.168.11.0 255.255.255.0 172.16.254.255 and the equivalent at the other end - 254.255 is the firewall's internal address) but it still seems to try routing traffic destined for the other site over the net. What am I missing?