<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Different IPSEC tunnel source within the same CryptoMap in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935536#M1104859</link>
    <description>&lt;P&gt;Yes, you can have one router with multi-SA VTI and the other one with a standard crypto map. In the migration guide this is explained in chapter "2.3 Migrate only router A to VTI – IKEv1"&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-ipsec/white-paper-c11-744879.html#23MigrateonlyrouterAtoVTIIKEv1" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-ipsec/white-paper-c11-744879.html#23MigrateonlyrouterAtoVTIIKEv1&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Oct 2023 15:05:59 GMT</pubDate>
    <dc:creator>gajownik</dc:creator>
    <dc:date>2023-10-06T15:05:59Z</dc:date>
    <item>
      <title>Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4934622#M1104834</link>
      <description>&lt;P&gt;Hello.&lt;BR /&gt;I have an IOS Router with a single outbound link, terminating more than one IPSEC tunnel.&lt;BR /&gt;I'd want some of the tunnels to be terminated on a loopback interface, and some other on the outside interface itself&lt;/P&gt;&lt;P&gt;Currently, I have a single crypto map applied to the outboud interface (eth 0/0.2 in the diagram below)&lt;BR /&gt;All the tunnels having 2.2.2.2 as a peer work, but the others terminating on the loopback interface do not.&lt;BR /&gt;If I use&amp;nbsp;"local-address Loopback 2" command, all the tunnels terminating on the loopback 2 interface will work, but all the other tunnels terminating on the outside interface will stop working, of course.&lt;BR /&gt;&lt;BR /&gt;Is there a way to have both the tunnels working, let's say, configuring a different local-address for each entry of the crypto map?&lt;BR /&gt;I put below a snippet of the config ed a brief diagram.&lt;BR /&gt;&lt;BR /&gt;Thank you very much for your help&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto isakmp profile PF_TEST_10&lt;BR /&gt;keyring KR-TEST&lt;BR /&gt;match identity address 3.3.3.3 255.255.255.255&lt;/P&gt;&lt;P&gt;crypto isakmp profile PF_TEST_20&lt;BR /&gt;keyring KR-TEST&lt;BR /&gt;match identity address 4.4.4.4 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto map TEST local-address Loopback 2&lt;BR /&gt;crypto map TEST 10 ipsec-isakmp&lt;BR /&gt;set peer 3.3.3.3&lt;BR /&gt;set security-association lifetime seconds 86400&lt;BR /&gt;set transform-set TEST_TS&lt;BR /&gt;set pfs group2&lt;BR /&gt;set isakmp-profile PF_TEST_10&lt;BR /&gt;match address ACL_TEST_10&lt;BR /&gt;qos pre-classify&lt;BR /&gt;crypto map TEST 20 ipsec-isakmp&lt;BR /&gt;set peer 4.4.4.4&lt;BR /&gt;set security-association lifetime seconds 86400&lt;BR /&gt;set transform-set TEST_TS&lt;BR /&gt;set pfs group2&lt;BR /&gt;set isakmp-profile PF_TEST_20&lt;BR /&gt;match address ACL_TEST_20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GiovanniRinaldi_1-1696506907004.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198866i41B2AF2A9B562092/image-size/medium?v=v2&amp;amp;px=400" role="button" title="GiovanniRinaldi_1-1696506907004.png" alt="GiovanniRinaldi_1-1696506907004.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Oct 2023 12:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4934622#M1104834</guid>
      <dc:creator>Netnux</dc:creator>
      <dc:date>2023-10-05T12:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4934707#M1104835</link>
      <description>&lt;P&gt;The LO can use as VPN' but issue here is forwarding traffic to LO to encrypt and decrypt.&lt;/P&gt;
&lt;P&gt;You need to config PBR in outisde and Inside to forward traffic to/from via LO.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Oct 2023 14:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4934707#M1104835</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-05T14:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4934723#M1104836</link>
      <description>&lt;P&gt;You can use Multi-SA SVTI feature, i.e. replace crypto maps with tunnel interfaces and configure "tunnel protection ipsec policy ipv4 &amp;lt;ACL&amp;gt;" to negotiate specific subnets you need. The "reverse-route" CLI in the IPsec profile will add routes automatically via tunnel interfaces and you can source each tunnel from a different IP address. And you need to do this only on the headend device. Peers can continue using crypto maps.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-16-12/sec-sec-for-vpns-w-ipsec-xe-16-12-book/sec-ipsec-virt-tunnl.html?dtid=osscdc000283#reference_njl_4z3_k3b" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-16-12/sec-sec-for-vpns-w-ipsec-xe-16-12-book/sec-ipsec-virt-tunnl.html?dtid=osscdc000283#reference_njl_4z3_k3b&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Oct 2023 15:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4934723#M1104836</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-10-05T15:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935274#M1104849</link>
      <description>&lt;P&gt;Thank you for your kind reply.&lt;BR /&gt;I'm not sure to understand your solution with a PBR.&lt;/P&gt;&lt;P&gt;However, my problem is that because of the command "crypto map TEST local-address Loopback 2", when I apply the crypto map to the interface the address of the peer will be updated and will always be 2.2.2.2, no matter what.&lt;BR /&gt;So, the rightmost router that will set a peer to 2.2.2.2 will work.&lt;BR /&gt;The router that wants to set an IPSEC tunnel with the peer 1.1.1.1 will never work.&lt;/P&gt;&lt;P&gt;Moreover, I cannot touch the rightmost routers.&lt;BR /&gt;I can manage only the router on the left&lt;/P&gt;&lt;P&gt;Could you please post a sample config snippet?&lt;/P&gt;&lt;P&gt;Thank you very much!&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 08:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935274#M1104849</guid>
      <dc:creator>Netnux</dc:creator>
      <dc:date>2023-10-06T08:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935276#M1104850</link>
      <description>&lt;P&gt;I would also recommend multi-SA VTI solution as crypto maps are much harder to troubleshoot, manage (it's quite easy to break other existing crypto map tunnels) and are not supported past IOS-XE 17.6:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-xe-17/bulletin-c25-744830.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-xe-17/bulletin-c25-744830.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Here are additional examples how to configure multi-SA VTI:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/214728-configure-multi-sa-virtual-tunnel-interf.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/214728-configure-multi-sa-virtual-tunnel-interf.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-ipsec/white-paper-c11-744879.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-ipsec/white-paper-c11-744879.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 08:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935276#M1104850</guid>
      <dc:creator>gajownik</dc:creator>
      <dc:date>2023-10-06T08:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935508#M1104858</link>
      <description>&lt;P&gt;Thank you gajownik and tvotna&lt;BR /&gt;I know VTI is a solution, however I'm not building from scratch.&lt;BR /&gt;I cannot touch the rightmost routers, so I have to deal with crypto maps&lt;BR /&gt;Not so sure if I can have a VTI on one side (left)&amp;nbsp; and a crypto map on the other side (right)&lt;BR /&gt;&lt;BR /&gt;Thank you for your kind help&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 14:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935508#M1104858</guid>
      <dc:creator>Netnux</dc:creator>
      <dc:date>2023-10-06T14:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935536#M1104859</link>
      <description>&lt;P&gt;Yes, you can have one router with multi-SA VTI and the other one with a standard crypto map. In the migration guide this is explained in chapter "2.3 Migrate only router A to VTI – IKEv1"&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-ipsec/white-paper-c11-744879.html#23MigrateonlyrouterAtoVTIIKEv1" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-ipsec/white-paper-c11-744879.html#23MigrateonlyrouterAtoVTIIKEv1&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 15:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935536#M1104859</guid>
      <dc:creator>gajownik</dc:creator>
      <dc:date>2023-10-06T15:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: Different IPSEC tunnel source within the same CryptoMap</title>
      <link>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935902#M1104865</link>
      <description>&lt;P&gt;Sincerely, the production environment is far more complicated than what I represented here, with IPSEC tunnels and GRE tunnels going through different VRFs over an MPLS and so on... I don't know if it will be feasible to apply this "halfaway" config as a permanent solution, adding more complication, without being not disruptive for all the different services.&lt;BR /&gt;Surely it is a way I can evaluate.&lt;BR /&gt;&lt;BR /&gt;THANK YOU for your precious help&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Oct 2023 08:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/different-ipsec-tunnel-source-within-the-same-cryptomap/m-p/4935902#M1104865</guid>
      <dc:creator>Netnux</dc:creator>
      <dc:date>2023-10-07T08:41:23Z</dc:date>
    </item>
  </channel>
</rss>

