<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC issues with existing network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051532#M1110454</link>
    <description>&lt;P&gt;Instead of using mesh and use point to multipoint the best solution is GETVPN.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Wed, 27 Mar 2024 16:13:02 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-03-27T16:13:02Z</dc:date>
    <item>
      <title>IPSEC issues with existing network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051489#M1110450</link>
      <description>&lt;P&gt;Hello I am working with a network that has currently 10 router nodes using IPSec tunneling to communicate and encrypt packets between the 10 router nodes over a wan. Using 140.0.0.0/30 (64 tunnels total) for IPSec Tunneling I have consumed almost all the allowable tunnels on my current set up. The issue i have is i need to add 7 more router nodes to this network and I don't have enough IPSec tunnels to expend too. I am restricted to the a single IP range above. What I understand is IPSec is mainly point to point. For this network in question i only need to accomplish the following:&lt;/P&gt;&lt;P&gt;1. Establish Point to Multiple Connections for the 18 nodes&lt;/P&gt;&lt;P&gt;2. Keep the connections to the nodes encrypted so the WAN cant see the data.&lt;/P&gt;&lt;P&gt;I have also attached an image of Cisco Packet Tracer of my set up i am trying to simulate items in green are using the existing IPSec Configuration that i have do away with and the others. I am attempting to simulate it first before implanting with the real thing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any guidance is appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 15:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051489#M1110450</guid>
      <dc:creator>JNCloud</dc:creator>
      <dc:date>2024-03-27T15:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC issues with existing network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051498#M1110451</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1708416"&gt;@JNCloud&lt;/a&gt; what is the limitation exactly, physical hardware in a real environment or do you mean in restriction within packet tracer?&lt;/P&gt;
&lt;P&gt;Dynamic VTI solution would be the best solution for a Hub and Spoke design, this could either be DMVPN or FlexVPN (Hub and Spoke) on Cisco routers or ASA/FTD both now support SVTI and DVTI from 9.19/7.3&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 15:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051498#M1110451</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-27T15:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC issues with existing network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051504#M1110452</link>
      <description>&lt;P&gt;The limitation is i am out of IPSec Tunnels and i can't expand to another IP address allocation. So i am trying to learn a Encrypted point to multipoint solution using the same allocation i have. I have been reading on DMVPN but having some issues understanding how that is supposed to work. Where can i find some good examples of DMVPN or FlexVPN. My goal is to remove the IPSec layout and change it to a point to multipoint with encryption&amp;nbsp; so that all 18 router notes can communicate with each other. If the DMVPN and FlexVPN are the right solutions to look into then. I think i just need some good source material to understand how to use them.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 15:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051504#M1110452</guid>
      <dc:creator>JNCloud</dc:creator>
      <dc:date>2024-03-27T15:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC issues with existing network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051507#M1110453</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1708416"&gt;@JNCloud&lt;/a&gt; but why are you out of IPSec tunnels? Why do you think another solution is not going to run into the same limitation?&lt;/P&gt;
&lt;P&gt;Regardless here is the Cisco VPN reference guides:- &lt;A href="https://www.cisco.com/c/en/us/support/docs/interfaces-modules/virtual-private-network-module/221568-vpn-technologies-documentation-reference.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/interfaces-modules/virtual-private-network-module/221568-vpn-technologies-documentation-reference.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 15:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051507#M1110453</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-27T15:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC issues with existing network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051532#M1110454</link>
      <description>&lt;P&gt;Instead of using mesh and use point to multipoint the best solution is GETVPN.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 16:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5051532#M1110454</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-27T16:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC issues with existing network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5052188#M1110473</link>
      <description>&lt;P&gt;Hello again, I am sorry if my inexperience is showing here, I am currently looking into the alternate solutions brought up in this thread. 10 of these nodes “Spokes” Already exist and we are adding 7 new nodes. If I keep the current network topology. I will have no more point-to-point tunnels I am restricted to a single Ip address using the /30 subnet so with that allocation I can only have 64 tunnels. Unless I am misunderstanding something due to my inexperience? I also have no control of the Network between my router nodes so as I am reading into DMVPN not sure this is the optimal solution right now but will continue to investigate DMVPN, FlexVPN, and GETVPN.&lt;/P&gt;&lt;P&gt;Do I need to have a Main/Host Router to assist with routing traffic, my equipment layout doesn't allow for this? Should I be able to configure as only spoke to spoke and get it to work?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 19:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-issues-with-existing-network/m-p/5052188#M1110473</guid>
      <dc:creator>JNCloud</dc:creator>
      <dc:date>2024-03-28T19:12:23Z</dc:date>
    </item>
  </channel>
</rss>

