0

We have a Cisco IOS router with two DSL connections. One of them is intended for general traffic (ADSL), the other for VPN links (BDSL) and various other traffic.

So the default route is the ADSL link, and we have a combination of static routes for the VPN traffic, and policy routes for other traffic types that should go out the BDSL link.

For site to site traffic, this is fine, we just static route the public IPs and remote networks out of the BDSL line.

The policy based routing works fine for any internal traffic that matches an ACL.

The problem is now that there are remote VPN sites originating from dynamic addresses, so we cannot use static routes. The replies to incoming ISAKMP requests are following the default route out of the ADSL (despite there being no crypto map on that interface).

I want to route the outgoing VPN traffic out of the BDSL. I have tried adding udp/500 and esp to and from the route-map acl that pushes traffic out of the BDSL line, but it doesn't match, presumably because the route-map happen earlier than the IPSec stuff.

Any ideas how I can do this?

IOS ver: 12.4.13T.

Shane Madden
  • 112,982
  • 12
  • 174
  • 248
Paul
  • 1,228
  • 12
  • 24

1 Answers1

1

Sounds like you're looking for LOCAL policy routing (a policy routing decision for traffic originated ON the router as opposed to traffic THROUGH the router)

Here's a good write up - I think you'll find it straightforward to implement:

http://packetlife.net/blog/2009/nov/30/local-policy-routing/

Jason Seemann
  • 1,120
  • 6
  • 9
  • Thanks - this is what I was looking for but for some reason, the local policy only applies to the ISAKMP packets. IPSec is not getting policy routed. – Paul Oct 22 '13 at 01:30