<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MPLS security and encryption in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216054#M1117020</link>
    <description>&lt;P&gt;I have a main headoffice and some branches conncted with each other over MPLS conncetion provided by a third party vendor.&lt;/P&gt;&lt;P&gt;i want to enable encryption or some security over my MPLS interface so that my data should not compromise. I have&lt;BR /&gt;Branch end: cisco router 1921&lt;BR /&gt;Hub (Main) cisco 3750 Switch and cisco router 1111&lt;BR /&gt;Due to huge amount of traffice i have used switch as it has gigaports for traffice movements.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mpls.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232535iF871D6D2BCCEB4B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="mpls.JPG" alt="mpls.JPG" /&gt;&lt;/span&gt;&lt;BR /&gt;i am finding difficulty in implementing security over my mpls traffic&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Oct 2024 09:28:13 GMT</pubDate>
    <dc:creator>lakhwaraa</dc:creator>
    <dc:date>2024-10-28T09:28:13Z</dc:date>
    <item>
      <title>MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216054#M1117020</link>
      <description>&lt;P&gt;I have a main headoffice and some branches conncted with each other over MPLS conncetion provided by a third party vendor.&lt;/P&gt;&lt;P&gt;i want to enable encryption or some security over my MPLS interface so that my data should not compromise. I have&lt;BR /&gt;Branch end: cisco router 1921&lt;BR /&gt;Hub (Main) cisco 3750 Switch and cisco router 1111&lt;BR /&gt;Due to huge amount of traffice i have used switch as it has gigaports for traffice movements.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mpls.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232535iF871D6D2BCCEB4B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="mpls.JPG" alt="mpls.JPG" /&gt;&lt;/span&gt;&lt;BR /&gt;i am finding difficulty in implementing security over my mpls traffic&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 09:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216054#M1117020</guid>
      <dc:creator>lakhwaraa</dc:creator>
      <dc:date>2024-10-28T09:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216056#M1117022</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1356308"&gt;@lakhwaraa&lt;/a&gt; GEVPN would be a solution to encrypt traffic over the MPLS, Cisco routers support GETVPN. The 3750 switch would not support any encryption, so I would recommend replacing it with another Cisco router.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe-3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 09:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216056#M1117022</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-10-28T09:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216068#M1117025</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; Do your branches communicate directly through MPLS cloud or inter-branch traffic is route via HUB? Questions is, is your trafic flow hub &amp;amp; spoke or full-mesh?&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; Ultimately, you have two options that scale, based on the device models you have (IOS upgrade may be necessary though): GETVPN or DMVPN Phase3 With IPsec; have you ever worked before with any of these technologies? do you have multicast traffic of only unicast traffic?&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 09:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216068#M1117025</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-28T09:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216070#M1117026</link>
      <description>&lt;P&gt;i am using 2 interfaces on my router (1 interface has mpls and other interface has isp). i have established DMVPN with ipsec to be used by tunnel connection when MPLS is down. My traffic has encryption when going through tunnel but no encryption through mpls as all routes are provided by vendor from hub to spoke.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 09:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216070#M1117026</guid>
      <dc:creator>lakhwaraa</dc:creator>
      <dc:date>2024-10-28T09:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216088#M1117029</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;In this case, the easiest solution is to add another DMVPN cloud / topology over MPLS (use Phase 3 and obviously add IPsec on top of it); you would additionally need to change routing over MPLS, you will only advertise your DMVPN tunnel endpoints to MPLS cloud via BGP and add your own overlay routing over DMVPN.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 10:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216088#M1117029</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-28T10:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216090#M1117030</link>
      <description>&lt;P&gt;Could you provide me some guide for this solution. i have never worked with MPLS&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 10:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216090#M1117030</guid>
      <dc:creator>lakhwaraa</dc:creator>
      <dc:date>2024-10-28T10:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216095#M1117031</link>
      <description>&lt;P&gt;I have done following configuration just as i have done for my dmvpn&lt;BR /&gt;ON HUB&lt;/P&gt;&lt;P&gt;Hub&lt;BR /&gt;interface Tunnel0&lt;BR /&gt;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;ip mtu 1400&lt;BR /&gt;ip nhrp authentication your-auth-key&lt;BR /&gt;ip nhrp map multicast dynamic&lt;BR /&gt;ip nhrp network-id 1&lt;BR /&gt;ip nhrp shortcut&lt;BR /&gt;tunnel source GigabitEthernet0/1&lt;BR /&gt;tunnel mode gre multipoint&lt;BR /&gt;tunnel key 1234&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;router bgp 65001&lt;BR /&gt;neighbor 10.0.0.2 remote-as 65002 # Spoke IP&lt;BR /&gt;network 10.0.0.0 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 2&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp key your-secret-key address 192.0.2.2&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac&lt;BR /&gt;mode transport&lt;BR /&gt;!&lt;BR /&gt;crypto map dmvpn 10 ipsec-isakmp&lt;BR /&gt;set peer 192.0.2.2&lt;BR /&gt;set transform-set ESP-AES-SHA&lt;BR /&gt;match address 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;crypto map dmvpn&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ON Spoke&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;BR /&gt;ip address 10.0.0.2 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;ip mtu 1400&lt;BR /&gt;ip nhrp authentication your-auth-key&lt;BR /&gt;ip nhrp map 10.0.0.1 192.0.2.1 # Public IP of the hub&lt;BR /&gt;ip nhrp map multicast 192.0.2.1&lt;BR /&gt;ip nhrp network-id 1&lt;BR /&gt;tunnel source GigabitEthernet0/1&lt;BR /&gt;tunnel mode gre multipoint&lt;BR /&gt;tunnel key 1234&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;router bgp 65002&lt;BR /&gt;neighbor 10.0.0.1 remote-as 65001 # Hub IP&lt;BR /&gt;network 10.0.0.0 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 2&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp key your-secret-key address 192.0.2.1&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac&lt;BR /&gt;mode transport&lt;BR /&gt;!&lt;BR /&gt;crypto map dmvpn 10 ipsec-isakmp&lt;BR /&gt;set peer 192.0.2.1&lt;BR /&gt;set transform-set ESP-AES-SHA&lt;BR /&gt;match address 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;crypto map dmvpn&lt;BR /&gt;&lt;BR /&gt;But i am still unable to understand that this hub spoke model works on routers. i have cisco switch which is advertising routes to my router at hub. How to deal with this.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 10:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216095#M1117031</guid>
      <dc:creator>lakhwaraa</dc:creator>
      <dc:date>2024-10-28T10:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216108#M1117032</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;From your perspective, WAN transport being Internet or MPLS (both are MPLS in the backend) it doesn't matter; routers that are under your management do not run MPLS; so you'll end up performing a similar DMVPN config like the presented one, on the routers under your management.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 11:12:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216108#M1117032</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-28T11:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216413#M1117051</link>
      <description>&lt;P&gt;Sorry I dont get it'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You use DMVPN over MPLS ?&lt;/P&gt;
&lt;P&gt;If yes why you use public IP of Hub?&lt;/P&gt;
&lt;P&gt;The IP is private in underlying mpls&amp;nbsp; not public&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 19:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216413#M1117051</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-28T19:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS security and encryption</title>
      <link>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216442#M1117053</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Even though on the hub side, the switch is in front of the router/ DMVPN hub, it's not a problem; you would need to ensure that HUB's IP used to terminate the DMVPN tunnel is routable over MPLS (switch makes routing happen between HUB router and distant sites via MPLS).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Assuming one spoke IP facing MPLS is 192.168.20.6 and HUB's IP facing switch/MPLS is 192.168.10.6, and you want to run BGP over DMVPN, here's your config (move away from crypto-map and use tunnel protection, NHRP authentication is removed as it's pointless when using IPsec, GRE tunnel key is only required if you source two GRE multipoint tunnels off the same source interface so it was removed):&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Hub
interface Tunnel0
 ip address 10.0.0.1 255.255.255.0
 no ip redirects
 ip mtu 1400
 ip nhrp map multicast dynamic
 ip nhrp network-id 1
 ip nhrp redirect
 tunnel source GigabitEthernet0/1
 tunnel mode gre multipoint
 tunnel protection ipsec profile DMVPN
!
router bgp 65001
 neighbor 10.0.0.2 remote-as 65002
 network 10.0.0.0 mask 255.255.255.0
!
crypto isakmp policy 10
 encryption aes
 hash sha
 authentication pre-share
 group 2
!
crypto isakmp key your-secret-key address 192.168.20.6
!
crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac
 mode transport
!
crypto ipsec profile DMVPN
 set transform-set ESP-AES-SHA


Spoke
interface Tunnel0
 ip address 10.0.0.2 255.255.255.0
 no ip redirects
 ip mtu 1400
 ip nhrp nhs 10.0.0.1 nbma 192.168.10.6 multicast
 ip nhrp network-id 1
 ip nhrp shortcut
 tunnel source GigabitEthernet0/1
 tunnel mode gre multipoint
 tunnel protection ipsec profile DMVPN
!
router bgp 65002
 neighbor 10.0.0.1 remote-as 65001 # Hub IP
 network 10.0.0.0 mask 255.255.255.0
!
crypto isakmp policy 10
 encryption aes
 hash sha
 authentication pre-share
 group 2
!
crypto isakmp key your-secret-key address 192.168.10.6
!
crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac
 mode transport
!
crypto ipsec profile DMVPN
 set transform-set ESP-AES-SHA&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 20:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mpls-security-and-encryption/m-p/5216442#M1117053</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-28T20:18:33Z</dc:date>
    </item>
  </channel>
</rss>

