7

I need to have a site to site VPN between two sites.

Here is the following topology for each site:

  1. Site A: One Cisco 1921 WAN port (192.168.3.2) connected to ISP router (192.168.3.66), both the Cisco 1921 and the ISP's router are doing NAT Overload.

  2. Site B: One Cisco 1921 WAN port (192.168.2.2) connected to the ISP router (192.168.2.66), both the Cisco 1921 and the ISP's router are doing NAT Overload.

From the above topology it is clear that I do not have control over the ISP router to do port forwarding.

How can I successfully configure a Site-to-Site IPSec tunnel between the two routers?

I am not asking about "How to do the VPN in Cisco IOS", I know how to do it. But I am wondering, how is it possible to make a VPN tunnel over such double NATing considering that port forwarding is not possible on the ISP router?

Kevin Bowen
  • 260
  • 1
  • 4
  • 12

4 Answers4

3

If you can't forward port on any of the two sites, you cannot establish a VPN directly between the two sites.

You could establish a VPN from each site to a third one, and route accordingly (as suggested in comment by @peterh).

Personally I would try to work with the ISP to have a solution, and if the ISP cant / doesn't want to help, change the ISP.

JFL
  • 19,405
  • 1
  • 32
  • 64
2

To allow IPSEC tunnel between two sites behind NAT you should have at least one site with NATted udp/500 and udp/4500 from outside to inside.

Andrey Prokhorov
  • 2,774
  • 11
  • 27
1

Without port/protocol forwarding there's no way to connect into either site.

Get yourself an external server with a static address, connect VPNs out from both sites and tie the tunnels together on the external server.

Additonally, if your ISP routers don't support IPsec traversal you'll be better off with SSL VPN. As peterh suggested, OpenVPN might be a good choice.

Alternatively, get your ISP to route your sites with at least one static address without NAT.

Zac67
  • 81,287
  • 3
  • 67
  • 131
1

A static IP for at least one side is advised; however, DDNS will work for this,(if both sides are assigned dynamic addresses and NAT Overloaded), while both routers have fqdn's assigned for dynamic tracking of peer:

http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-architecture-implementation/118048-technote-ipsec-00.html .

If DDNS is not leveraged, one side will require to have a public static IP in order to provide a peer IP Address for the remote dynamic peer to initiate interesting traffic. I recommend strongly in getting real time support from Cisco TAC on this configuration and the requirements.

Amon Hogue
  • 11
  • 3