<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help getting GRE IPsec tunnel setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-getting-gre-ipsec-tunnel-setup/m-p/2183564#M351394</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maykol - I believe you are correct on the GRE traffic is not getting back to the PIX in the main office.&amp;nbsp; I did a packet capture on the PIX and not getting anything coming in regarding any of the Loopback or Tunnels.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2821 and 2921 routers use using HRST and use a standby IP of 10.10.10.1.&amp;nbsp; The 2821 IP is 10.10.10.253 and the 2921 is 10.10.10.254.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.2.60.1 &amp;amp; 10.2.60.2 are the Loopback addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.254.10.6 &amp;amp; 10.254.60.6 are the Tunnel Addresses.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have updated the PBR on the 2821 &amp;amp; 2921 to send any traffic for the 10.60.x.x network, 10.2.60.2, and 10.254.60.6 to the PIX but I'm wondering if that is wrong.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Apr 2013 15:53:51 GMT</pubDate>
    <dc:creator>dctaylorit</dc:creator>
    <dc:date>2013-04-22T15:53:51Z</dc:date>
    <item>
      <title>Help getting GRE IPsec tunnel setup</title>
      <link>https://community.cisco.com/t5/network-security/help-getting-gre-ipsec-tunnel-setup/m-p/2183562#M351392</link>
      <description>&lt;P&gt;We are setting up an old office building as an offsite data center. The network cosists on a PIX 501 firewall and a 2811 router.&amp;nbsp; I am attempting to setup a GRE tunnel over IPsec back to the main office.&amp;nbsp; The main office consists of a PIX515, a 2821 router, and a 2921 router.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also an ASA5510 in our main office that is used as our primary connection for all of our external services and as a GRE endpoint for our other offices.&amp;nbsp; The PIX515 is used to connect our main office clients to the internet and we would like traffic between it and our offsite data center to go across it as well.&amp;nbsp;&amp;nbsp; The default route is to use the ASA.&amp;nbsp;&amp;nbsp; We used policy based routing on the 2821 and 2921 routers to direct the appropriate traffic to the PIX515.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a PDF that shows a general overview.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now I am not able to get the tunnel setup.&amp;nbsp; It appears that the offsite datacenter is sending packets but is not receiving any when I issue the “show crypto ipsec sa” commands on both firewalls.&amp;nbsp; I will show the output of that command below.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Main Office&lt;BR /&gt; The external address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.40.227.50.&lt;BR /&gt; The loopback address&amp;nbsp;&amp;nbsp; 10.254.10.6&lt;BR /&gt; The tunnel address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.60.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Offsite Datacenter&lt;BR /&gt; The external address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.40.254.178&lt;BR /&gt; The loopback address&amp;nbsp;&amp;nbsp; 10.254.60.6&lt;BR /&gt; The tunnel address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.60.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main office PIX515 Config (Edited – if I am missing something that you need please let me know).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;BR /&gt; PIX Version 7.2(2)&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Ethernet0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;mac-address 5475.d0ba.5012&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;nameif outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;ip address 198.40.227.50 255.255.255.240&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Ethernet1&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;nameif inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;ip address 10.10.10.3 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list outside_cryptomap_60 extended permit gre host 10.254.10.6 host 10.254.60.6&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list outside_cryptomap_60 extended permit ip host 10.254.10.6 host 10.254.60.6&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;global (outside) 1 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (outside) 1 10.60.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (inside) 0 access-list noNat&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;route outside 0.0.0.0 0.0.0.0 198.40.227.49 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;route inside 10.60.0.0 255.255.0.0 10.10.10.1 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;route inside 10.254.10.6 255.255.255.255 10.10.10.253 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto dynamic-map ClientVPN_dyn_map 10 set transform-set ESP-3DES-SHA&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map cr-lakeavemap 10 match address outside_cryptomap_60&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map cr-lakeavemap 10 set peer 198.40.254.178&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map cr-lakeavemap 10 set transform-set ESP-3DES-SHA&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map cr-lakeavemap 65535 ipsec-isakmp dynamic ClientVPN_dyn_map&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map cr-lakeavemap interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto isakmp identity address&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto isakmp enable outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto isakmp policy 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;authentication pre-share&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;encryption 3des&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;hash sha&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;group 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto isakmp nat-traversal&amp;nbsp; 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;isakmp keepalive threshold 10 retry 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group 198.40.254.178 type ipsec-l2l&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group 198.40.254.178 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The offsite datacenter PIX501 config (again edited)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;interface ethernet0 auto&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;interface ethernet1 100full&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list crvpn permit gre host 10.254.60.6 host 10.254.10.6&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list crvpn permit ip host 10.254.60.6 host 10.254.10.6&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;mtu outside 1500&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;mtu inside 1500&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ip address outside 198.40.254.178 255.255.255.240&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ip address inside 10.60.10.2 255.255.0.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route outside 0.0.0.0 0.0.0.0 198.40.254.177 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route inside 10.2.60.2 255.255.255.255 10.60.10.1 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route inside 10.254.60.6 255.255.255.255 10.60.10.1 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto dynamic-map ClientVPN_dyn_map 10 match address ClientVPN&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto dynamic-map ClientVPN_dyn_map 10 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto map cr-lakeavemap 10 ipsec-isakmp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto map cr-lakeavemap 10 match address crvpn&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto map cr-lakeavemap 10 set peer 198.40.227.50&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto map cr-lakeavemap 10 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto map cr-lakeavemap 65535 ipsec-isakmp dynamic ClientVPN_dyn_map&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto map cr-lakeavemap client authentication LOCAL&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;crypto map cr-lakeavemap interface outside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp enable outside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp key ******** address 198.40.227.50 netmask 255.255.255.255&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp identity address&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp keepalive 10&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp policy 10 hash sha&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output of the “show crypto ipsec sa” command&lt;BR /&gt; From the main office&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Crypto map tag: cr-lakeavemap, seq num: 10, local addr: 198.40.227.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside_cryptomap_60 permit gre host 10.254.10.6 host 10.254.60.6&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (10.254.10.6/255.255.255.255/47/0)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.254.60.6/255.255.255.255/47/0)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 198.40.254.178&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 18867, #pkts decrypt: 18867, #pkts verify: 18867&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 198.40.227.50, remote crypto endpt.: 198.40.254.178&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 58, media mtu 1500&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: D78E63C9&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x5D63434C (1566786380)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac none&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 2, crypto-map: cr-lakeavemap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4274801/7527)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xD78E63C9 (3616433097)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac none&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={L2L, Tunnel, }&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 2, crypto-map: cr-lakeavemap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (kB/sec): (4275000/7527)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;From the offsite datacenter&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (10.254.60.6/255.255.255.255/47/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.254.10.6/255.255.255.255/47/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; current_peer: 198.40.227.50:500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dynamic allocated peer ip: 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 22360, #pkts encrypt: 22360, #pkts digest 22360&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 1156, #recv errors 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 198.40.254.178, remote crypto endpt.: 198.40.227.50&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 56, media mtu 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 5d63434c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xd78e63c9(3616433097)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn id: 1, crypto map: cr-lakeavemap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4608000/6604)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound ah sas:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound pcp sas:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x5d63434c(1566786380)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn id: 2, crypto map: cr-lakeavemap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4607792/6596)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound ah sas:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure where the issue lies and have beat my head on this for awhile so any help/insight is greatly appreciated.&amp;nbsp; If there is anything else you'd like to see please let me know.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-getting-gre-ipsec-tunnel-setup/m-p/2183562#M351392</guid>
      <dc:creator>dctaylorit</dc:creator>
      <dc:date>2019-03-12T01:31:58Z</dc:date>
    </item>
    <item>
      <title>Help getting GRE IPsec tunnel setup</title>
      <link>https://community.cisco.com/t5/network-security/help-getting-gre-ipsec-tunnel-setup/m-p/2183563#M351393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Joe, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be moved to a VPN forum, however, something comes up Really quickly from the problem. Here: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats from the Pix on the Main office, so I think the GRE traffic is not either getting or being encrypted. I am assuming this is the IP address of the router behind the main office 10.254.10.6 is that correct? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, I would put a capture on the Pix to see if the GRE traffic is getting to that PIX on the inside (Unencrupted but Encapsulated on GRE) and make sure that it is not being dropped. To ensure that, you can see the logs on the PIX and see if the firewall is dropping the GRE previous being encrypted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, a packet tracer can be run to ensure that the Traffic has a VPN phase which would indicate that it is following the correct phases and it would be encrypted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 03:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-getting-gre-ipsec-tunnel-setup/m-p/2183563#M351393</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-04-22T03:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: Help getting GRE IPsec tunnel setup</title>
      <link>https://community.cisco.com/t5/network-security/help-getting-gre-ipsec-tunnel-setup/m-p/2183564#M351394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maykol - I believe you are correct on the GRE traffic is not getting back to the PIX in the main office.&amp;nbsp; I did a packet capture on the PIX and not getting anything coming in regarding any of the Loopback or Tunnels.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2821 and 2921 routers use using HRST and use a standby IP of 10.10.10.1.&amp;nbsp; The 2821 IP is 10.10.10.253 and the 2921 is 10.10.10.254.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.2.60.1 &amp;amp; 10.2.60.2 are the Loopback addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.254.10.6 &amp;amp; 10.254.60.6 are the Tunnel Addresses.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have updated the PBR on the 2821 &amp;amp; 2921 to send any traffic for the 10.60.x.x network, 10.2.60.2, and 10.254.60.6 to the PIX but I'm wondering if that is wrong.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 15:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-getting-gre-ipsec-tunnel-setup/m-p/2183564#M351394</guid>
      <dc:creator>dctaylorit</dc:creator>
      <dc:date>2013-04-22T15:53:51Z</dc:date>
    </item>
  </channel>
</rss>

