Цитата(vldmr @ 11.9.2009, 10:50)

судя по IP адресам - у Вас туннель между Cisco - проверяйте настройки туннеля - где то он непрозрачный
Tyumen2801-Nissan#sh run
Building configuration...
Current configuration : 9374 bytes
!
version 12.4
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
!
hostname Tyumen2801-Nissan
!
boot-start-marker
boot system flash c2801-advipservicesk9-mz.124-9.T4.bin
boot-end-marker
!
logging buffered 51200 warnings
!
aaa new-model
!
!
aaa authentication login perm local
aaa authentication ppp default local
aaa authorization network default local
!
aaa session-id common
!
resource policy
!
clock timezone Ektb 5
ip cef
!
!
no ip dhcp use vrf connected
no ip dhcp conflict logging
ip dhcp excluded-address 192.168.3.1 192.168.3.99
!
ip dhcp pool 0
network 192.168.3.0 255.255.255.0
dns-server 212.220.126.2 212.120.160.130
default-router 192.168.3.4
!
!
ip domain name vmv.ru
vpdn enable
!
vpdn-group 1
! Default PPTP VPDN group
accept-dialin
protocol pptp
virtual-template 2
!
!
!
!
voice-card 0
!
!
!!
!
crypto pki trustpoint TP-self-signed-2329436677
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2329436677
revocation-check none
rsakeypair TP-self-signed-2329436677
!
!
!
class-map match-all VoIP-class
match access-group name VoIP-ACL
!
!
policy-map VoIP-pol
class VoIP-class
priority 320
!
!
!
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key VerraMotors address 0.0.0.0 0.0.0.0
crypto isakmp invalid-spi-recovery
!
!
crypto ipsec transform-set l2tp esp-des esp-md5-hmac
crypto ipsec transform-set ESE esp-3des esp-sha-hmac
mode transport
!
crypto ipsec profile VPN-DMVPN
set transform-set ESE
!
!
crypto map Nissan 10 ipsec-isakmp
set peer 10.100.0.13
set transform-set ESE
match address 103
crypto map Nissan 20 ipsec-isakmp
set peer yyy.yyy.yyy.yyy (адрес Курган)
set transform-set ESE
match address 106
!
crypto map hsa 10 ipsec-isakmp
! Incomplete
description Hasana
set transform-set l2tp
crypto map hsa 20 ipsec-isakmp
! Incomplete
set transform-set ESE
crypto map hsa 40 ipsec-isakmp
! Incomplete
set transform-set ESE
!
!
!
!
!
interface Tunnel0
bandwidth 1000
ip address 192.168.0.13 255.255.255.252
ip mtu 1400
delay 1000
shutdown
tunnel source FastEthernet0/1.15
tunnel destination 10.100.0.13
!
interface Tunnel3
bandwidth 1000
ip address 192.168.0.26 255.255.255.252
ip mtu 1400
delay 1000
tunnel source FastEthernet0/1.166
tunnel destination yyy.yyy.yyy.yyy (адрес Курган)
!
interface FastEthernet0/0
description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-FE 0$
ip address 10.100.15.4 255.255.255.0 secondary
ip address 10.100.12.4 255.255.255.0
ip access-group Nissan in
duplex auto
speed auto
!
interface FastEthernet0/0.17
description Users
encapsulation dot1Q 17
ip address 192.168.3.4 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
service-policy output VoIP-pol
!
!
interface FastEthernet0/1.15
description USI-VPN
encapsulation dot1Q 159
ip address 10.100.0.9 255.255.255.252
traffic-shape rate 1024000 25600 25600 1000
crypto map Nissan
!
interface FastEthernet0/1.166
description USI-Internet
encapsulation dot1Q 166
ip address ххх.ххх.ххх.ххх 255.255.255.248 адрес Тюмень
ip nat outside
ip virtual-reassembly
crypto map Nissan
!
interface Virtual-Template2
ip unnumbered FastEthernet0/1.166
peer default ip address pool vpn-test1
no keepalive
ppp authentication pap chap ms-chap
!
ip local pool vpn-test1 10.100.1.10 10.100.1.50
ip route 0.0.0.0 0.0.0.0 ххх.ххх.ххх.ххх шлюз Тюмень
ip route 10.100.0.12 255.255.255.252 10.100.0.10
ip route 10.100.9.0 255.255.255.0 Tunnel0
ip route 10.100.10.0 255.255.254.0 Tunnel0
ip route 10.100.14.0 255.255.255.0 Tunnel2
ip route 10.100.20.0 255.255.255.0 Tunnel3
ip route 10.100.30.0 255.255.254.0 Tunnel0
ip route 10.100.60.0 255.255.252.0 Tunnel0
ip route 192.168.50.0 255.255.255.252 10.100.0.10
!
!
ip http server
ip http access-class 23
ip http authentication local
no ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source route-map SDM_RMAP_1 interface FastEthernet0/1.166 overload
!
ip access-list extended AlienACL
permit ip 192.168.3.0 0.0.0.255 any
ip access-list extended Honda-QoS
permit ip any 10.100.30.0 0.0.1.255
ip access-list extended Nissan
permit ip 10.100.12.0 0.0.0.255 10.100.0.0 0.0.255.255
permit ip host 10.100.12.251 any
ip access-list extended Verra
permit ip 10.100.60.0 0.0.3.255 any
permit ip 192.168.20.0 0.0.1.255 any
permit ip 10.100.10.0 0.0.1.255 any
permit ip 10.100.1.0 0.0.0.255 any
ip access-list extended VoIP-ACL
permit ip host 10.100.12.16 any
!
access-list 100 remark NAT
access-list 100 permit ip 192.168.3.0 0.0.0.255 any
access-list 101 permit ip 10.100.12.0 0.0.0.255 10.100.60.0 0.0.3.255
access-list 101 permit ip 10.100.12.0 0.0.0.255 192.168.20.0 0.0.0.255
access-list 101 permit ip 10.100.12.0 0.0.0.255 10.100.1.0 0.0.0.255
access-list 101 permit ip 10.100.12.0 0.0.0.255 10.100.30.0 0.0.1.255
access-list 101 permit ip 10.100.12.0 0.0.0.255 10.100.14.0 0.0.0.255
access-list 103 permit gre host 10.100.0.9 host 10.100.0.13
access-list 105 permit gre host 10.100.0.9 host 192.168.50.2
access-list 106 permit gre host 85.15.149.36 host yyy.yyy.yyy.yyy (адрес Курган)
snmp-server community verracom RO
!
!
!
!
route-map SDM_RMAP_1 permit 1
match ip address 100
!
!
!
!
control-plane
!
!
!
!
!
!
!
!
!
banner login ^CCAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!
^C
!
line con 0
line aux 0
scheduler allocate 20000 1000
end