<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Easy VPN GRE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003282#M434496</link>
    <description>&lt;DIV&gt;&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My routers at two&amp;nbsp; different sites are connected through GRE tunnels. I want to configure&amp;nbsp; IPSec over it, but throug easy vpn server and client setup. Is it&amp;nbsp; possible???? Apparently the most reasonable configuration for the mentioned&amp;nbsp; scenario is site-to-site vpn, but I want to configure it through easy&amp;nbsp; vpn. I would also appreciate if some one can refer to any configuration&amp;nbsp; example of such kind of setup.The GRE tunnel is up and pings are successful but the traffic which passess through is not encryted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:17:24 GMT</pubDate>
    <dc:creator>jack samuel</dc:creator>
    <dc:date>2019-03-11T23:17:24Z</dc:date>
    <item>
      <title>Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003282#M434496</link>
      <description>&lt;DIV&gt;&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My routers at two&amp;nbsp; different sites are connected through GRE tunnels. I want to configure&amp;nbsp; IPSec over it, but throug easy vpn server and client setup. Is it&amp;nbsp; possible???? Apparently the most reasonable configuration for the mentioned&amp;nbsp; scenario is site-to-site vpn, but I want to configure it through easy&amp;nbsp; vpn. I would also appreciate if some one can refer to any configuration&amp;nbsp; example of such kind of setup.The GRE tunnel is up and pings are successful but the traffic which passess through is not encryted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003282#M434496</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2019-03-11T23:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003283#M434497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Look on cisco.com for document Id 41940 which describes gre over DMVPN.  Extremely simple to setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 23:47:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003283#M434497</guid>
      <dc:creator>Jeff Van Houten</dc:creator>
      <dc:date>2012-06-09T23:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003284#M434498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the attached file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is for dynamic L2L tunnel, in your case you want to encrypt GRE traffic, therefore your crypto acl (i.e. interesting traffic for IPSec tunnel) will be your GRE tunnel's local address and destination address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 02:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003284#M434498</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-10T02:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003285#M434499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router R2 (easy vpn Server)---internet-------R4(client)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does'nt work. I really need help on this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are the configs and sh outputs for crypto ipsec sa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R4#&amp;nbsp; sh running-config&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 1539 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname R4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn R4&lt;/P&gt;&lt;P&gt; connect auto&lt;/P&gt;&lt;P&gt; group easyvpn key cisco123&lt;/P&gt;&lt;P&gt; mode network-extension&lt;/P&gt;&lt;P&gt; peer 192.168.20.1&lt;/P&gt;&lt;P&gt; acl 102&lt;/P&gt;&lt;P&gt; username cisco password cisco&lt;/P&gt;&lt;P&gt; xauth userid mode local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 4.4.4.4 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; crypto ipsec client ezvpn R4 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback1&lt;/P&gt;&lt;P&gt; ip address 40.40.40.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt; tunnel source FastEthernet0/1&lt;/P&gt;&lt;P&gt; tunnel destination 192.168.20.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 200.200.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; ip address 192.168.20.3 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto ipsec client ezvpn R4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 1&lt;/P&gt;&lt;P&gt; router-id 4.4.4.4&lt;/P&gt;&lt;P&gt; log-adjacency-changes&lt;/P&gt;&lt;P&gt; network 4.4.4.4 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 10.10.10.2 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 200.200.200.200 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 102 permit gre host 192.168.20.3 host 192.168.20.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#################################################################################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2#sh run&lt;/P&gt;&lt;P&gt;R2#sh running-config&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 1940 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname R2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login vpnauthen local&lt;/P&gt;&lt;P&gt;aaa authorization network vpnauthor local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;memory-size iomem 5&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username cisco password 0 cisco&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt; log config&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration address-pool local vpnpool&lt;/P&gt;&lt;P&gt;crypto isakmp xauth timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group easyvpn&lt;/P&gt;&lt;P&gt; key cisco123&lt;/P&gt;&lt;P&gt; domain cisco.com&lt;/P&gt;&lt;P&gt; pool vpnpool&lt;/P&gt;&lt;P&gt; save-password&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set mytransformset esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto dynamic-map mydynmap 10&lt;/P&gt;&lt;P&gt; set transform-set mytransformset&lt;/P&gt;&lt;P&gt; reverse-route&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map cisco client authentication list vpnauthen&lt;/P&gt;&lt;P&gt;crypto map cisco isakmp authorization list vpnauthor&lt;/P&gt;&lt;P&gt;crypto map cisco client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map cisco 10 ipsec-isakmp dynamic mydynmap&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 2.2.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; tunnel source 192.168.20.1&lt;/P&gt;&lt;P&gt; tunnel destination 192.168.20.3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map cisco&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 1&lt;/P&gt;&lt;P&gt; router-id 2.2.2.2&lt;/P&gt;&lt;P&gt; log-adjacency-changes&lt;/P&gt;&lt;P&gt; network 2.2.2.2 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 10.10.10.1 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 192.168.10.0 0.0.0.255 area 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 172.16.1.1 172.16.1.254&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 100.100.100.0 255.255.255.0 192.168.10.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ##########################################################################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R4#&lt;/P&gt;&lt;P&gt;R4#sh crypto ipsec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface: FastEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: FastEthernet0/1-head-0, local addr 192.168.20.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; protected vrf: (none)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (4.4.4.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; current_peer 192.168.20.1 port 500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 192.168.20.3, remote crypto endpt.: 192.168.20.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0x84B4F50E(2226451726)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xAB91C4F1(2878457073)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 33, flow_id: SW:33, crypto map: FastEthernet0/1-head-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4572034/3535)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x84B4F50E(2226451726)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 34, flow_id: SW:34, crypto map: FastEthernet0/1-head-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4572034/3535)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; protected vrf: (none)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (4.4.4.4/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (2.2.2.2/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; current_peer 192.168.20.1 port 500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 5, #pkts decrypt: 5, #pkts verify: 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 192.168.20.3, remote crypto endpt.: 192.168.20.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0x256A913C(627740988)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xAA76D1B1(2859913649)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 35, flow_id: SW:35, crypto map: FastEthernet0/1-head-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4592324/3536)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x256A913C(627740988)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={Tunnel, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn id: 36, flow_id: SW:36, crypto map: FastEthernet0/1-head-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (k/sec): (4592325/3536)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; #################################################################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R4#ping 2.2.2.2 source 4.4.4.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 2.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;Packet sent with a source address of 4.4.4.4&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 4/54/84 ms&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 22:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003285#M434499</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-14T22:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003286#M434500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anybody can put some shade on this thread.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 14:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003286#M434500</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-15T14:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003287#M434501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please delete all vpn config from R1 and R4 spoke routers and follow the config below.&lt;/P&gt;&lt;P&gt;As you have mixed up with remote-vpn-client config on the routers with dynamic L2L tunnel for routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, please delete them and start from scratch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This goes on R1 Hub router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 99&lt;/P&gt;&lt;P&gt; encr aes&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set &lt;STRONG&gt;Jack-ESP-AES-128-SHA&lt;/STRONG&gt; esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto keyring &lt;STRONG&gt;Jacks-spoker-routers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; pre−shared−key address 0.0.0.0 0.0.0.0 key &lt;STRONG&gt;jack-the-king-of-the-hill&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp profile &lt;STRONG&gt;Jacks-L2L-routers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; description LAN−to−LAN for spoke router(s) connection&lt;/P&gt;&lt;P&gt; keyring &lt;STRONG&gt;Jacks-spoker-routers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; match identity address 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic−map &lt;STRONG&gt;Jacks-dyna-map&lt;/STRONG&gt; 100&lt;/P&gt;&lt;P&gt; set transform−set &lt;STRONG&gt;Jacks-ESP-AES-128-SHA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; set isakmp−profile &lt;STRONG&gt;Jacks-L2L-routers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map &lt;STRONG&gt;Jacks-Crypto&lt;/STRONG&gt; 1 ipsec−isakmp dynamic &lt;STRONG&gt;Jacks-dyna-map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt; crypto map &lt;STRONG&gt;Jacks-Crypto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On spoke router R4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 99&lt;/P&gt;&lt;P&gt; encr aes&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp key &lt;STRONG&gt;jack-the-king-of-the-hill&lt;/STRONG&gt; address 192.168.20.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set &lt;STRONG&gt;Jack-ESP-AES-128-SHA&lt;/STRONG&gt; esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access−list 100 permit ip host 192.168.20.3 host 192.168.20.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map &lt;STRONG&gt;Jacks-Crypto&lt;/STRONG&gt; 10 ipsec−isakmp&lt;/P&gt;&lt;P&gt;set peer 192.168.20.1&lt;/P&gt;&lt;P&gt;set transform−set &lt;STRONG&gt;Jack-ESP-AES-128-SHA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;match address 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt; crypto map &lt;STRONG&gt;Jacks-Crypto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know, how this coming along.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Rizwan Mohamed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 16:24:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003287#M434501</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-15T16:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003288#M434502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply and explanation , I appreciate ur replies.but my needs are something different which are&amp;nbsp; tied with easy vpn server and client setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will explore more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Current setup is Easy VPN SERVER - and Clients in Network Extension Mode.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 4 No's branch router's with ADSL link connecting to Internet&amp;nbsp; and also to HO (Cisco 3825) acting as Easy VPN Server. Now i am planing&amp;nbsp; for the backup of the ADSL i.e the async port on the branch router,&amp;nbsp; whenever the ADSL link fails the async should dial up and connectivity&amp;nbsp; to HO remains up,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;Back link failover successful:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whenever&amp;nbsp; the ADSL fails the async interface dials up and the async link between the HO&amp;nbsp; and branch comes up, point-to-point pings are successful between the async interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;Problem&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The problem is No pings are successful from&amp;nbsp; branch&amp;nbsp; LAN to the HO LAN because the return traffic from HO is not&amp;nbsp; hitting to async interface of HO for the particular (ADSL failed) branch&amp;nbsp; ,it is choosing a default route which is pointing to Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;Now help me to achieve the goal.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to achieve the failover to async interface for a particular failed branch on the Easy VPN Server (HO) end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanjks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 19:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003288#M434502</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-15T19:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003289#M434503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"the return traffic from HO is not&amp;nbsp; hitting to async interface of HO for&amp;nbsp; the particular (ADSL failed) branch&amp;nbsp; ,it is choosing a default route&amp;nbsp; which is pointing to Internet."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use IP-SLA to failover a particular static-route for particular branch office distination using IP-SLA, please read the thread below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/message/3649158#3649158"&gt;https://supportforums.cisco.com/message/3649158#3649158&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 20:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003289#M434503</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-15T20:34:04Z</dc:date>
    </item>
    <item>
      <title>Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003290#M434504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Rizwan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i can't put a static route on the Easy VPN Server to the branch router becz it will always use the async interface, and it will not use the default route which is the lease line with fixed public IP on which easy vpn server is negotiating an ipsec tunnel to branch routers . i need to use the async interface only at the time of branch ADSL links goes down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 21:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003290#M434504</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-15T21:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003291#M434505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"it will always use the async interface, and it will not use the default&amp;nbsp; route which is the lease line with fixed public IP on which easy vpn&amp;nbsp; server is negotiating an ipsec tunnel to branch routers ."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP-SLA enable static-route is like floating route, in the event "lease line" goes down, only then second route will be used by the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please read this above thread I sent you before and likewise one below and it will work like charm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2034251"&gt;https://supportforums.cisco.com/thread/2034251&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Beside, your remote-spoke router can use dual-peering address, one as a primary and second as failover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 00:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003291#M434505</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-16T00:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003292#M434506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate ur response,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the attached topology diagram.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont have only 1 branch , I have many branches, If you say track a default route with an IP SLA to the remote branch IP and&amp;nbsp; when pings fails it will remove the default route and the traffic will flow to the async but what about other branches ??? their link is still up on their ADSL and they are communicating to HO through the HO primary interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If still i am missing from ur expierience please write a config for HO if 2 No's of branch routers failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 11:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003292#M434506</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-16T11:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003293#M434507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"when pings fails it will remove the default route and the traffic will flow to the async but what about other branches ??? their link is still up on their ADSL and they are communicating to HO through the HO primary interface."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand you point now.&amp;nbsp; You do not need IP-SLA on HO router but maybe appliable on remote-branch office router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me understand your "dials up and the async link"&amp;nbsp; please show me your "&lt;STRONG&gt;dials up and the async link&lt;/STRONG&gt;" config method, they maybe parameter within "&lt;STRONG&gt;dials up and the async link&lt;/STRONG&gt;" interface as such "backup interface async" &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 12:58:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003293#M434507</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-16T12:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003294#M434508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me understand your "dials up and the async link"&amp;nbsp; please show me your "&lt;STRONG&gt;dials up and the async link&lt;/STRONG&gt;" config method, they maybe parameter within "&lt;STRONG&gt;dials up and the async link&lt;/STRONG&gt;" interface as such "backup interface async"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the branch routers perfectly without any issues whenever the ADSL fails the dialer initiates and the async interface comes up and point -to point links of async interface ping are successful but what about the internal LAN in HO that i&amp;nbsp; m not able to ping,because the return traffic doen't come back to the async interface it goes according to the default route.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is good that that now we are in sync and in proper understanding that what is our goal. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it rizwan can we will be able to do by the attached file.???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2012 13:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003294#M434508</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-16T13:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003295#M434509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"ADSL fails the dialer initiates and the async interface comes up and&amp;nbsp; point -to point links of async interface ping are successful"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can introduce routing protocol on the remote-branch router and make each branch-routers as stub-zone and advertise local internal network, you must create GRE tunnel interface on branch router and hub-router, make your "async interface" as your tunnel's source address at branch office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also need to keep IP-SLA on branch router to push traffic via ADSL (as primary) and in the event ADSL goes down your GRE tunnel will kick in and will establish GRE-over-IPSec (i.e. IP-SLA will start to using dial-out async interface), when GRE tunnel is establish your hub-router will learn available routes via each respective GRE tunnel to push traffic accordingly, however your default-route at hub-router remain the same, it does not change, but hub-router will learn the routes via GRE tunnel and will be able to route to each branch offices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that make sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Rizwan Mohamed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 04:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003295#M434509</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-17T04:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003296#M434510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will apply live and i will update the thread but i have some doubt below please clear them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;solution looks to be perfect, but 1 thing i notice is that why i need to confiure gre tunnel with source and destination Ip of the async interface i can run directly routing protocols on the async interface.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;can i send the traffic on async interface without encryption ????&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;or i have to configure the async interface as a backup easy vpn client ,, I mean to say,,&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ&lt;/P&gt;&lt;P&gt;connect auto&lt;/P&gt;&lt;P&gt;backup EZ_Backup track 20&lt;/P&gt;&lt;P&gt;group X.X key cisco&lt;/P&gt;&lt;P&gt;mode network-extension&lt;/P&gt;&lt;P&gt;peer X.X.X.X default&lt;/P&gt;&lt;P&gt;xauth userid mode interactive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ_Backup&lt;/P&gt;&lt;P&gt;connect auto&lt;/P&gt;&lt;P&gt;group X.X key cisco&lt;/P&gt;&lt;P&gt;mode network-extension&lt;/P&gt;&lt;P&gt;peer (async interface ) default&lt;/P&gt;&lt;P&gt;xauth userid mode interactive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int e0&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ_Backup inside&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Int dialer0&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int async 1&lt;/P&gt;&lt;P&gt;crypto ipsec client ezvpn EZ_Backup outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ON HO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int serial0 ( primary with fixed IP)&lt;/P&gt;&lt;P&gt;crypto map easyvpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int group-async 0 (On which all branch async interface will hit)&lt;/P&gt;&lt;P&gt;crypto map easyvpn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 20:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003296#M434510</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-17T20:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003297#M434511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"i can run directly routing protocols on the async interface." Sure, if it works, go for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"can i send the traffic on async interface without encryption" Sure, if you are fine with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"or i have to configure the async interface as a backup easy vpn client ,, I mean to say,," &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN will burden your dialup connection, therefore none-encrypted traffic will suit with dialup and you may want to check your company policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2012 23:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003297#M434511</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-17T23:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003298#M434512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I facing strange issues i have configured eigrp on&amp;nbsp; branch and HO router,,&amp;nbsp; from branch router i advertise my LAN and from HO i m advertising his internal LAN, Both EIGRP Neighbors are up but when i do sh ip route eigrp on HO router there are no routes for eigrp, And on branch i m receiving the&amp;nbsp; routes of HO LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;when i do sh ip route on HO it shows me static route in the table for the branch router with a next hop of public IP which it learned automatically when a easy vpn client tried to create a tunnel with server,on ADSL connection this is the reason EIGRP routes are not included in the route table, How the static routes from HO router will be disappear when the branch ADSL fails.?????&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;I more strange issue i m facing is when i specifically put static route pointing to async interface on HO still i m not able to ping the branch LAN,,,the branch router has a eigrp route to HO router for HO LAN.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2012 10:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003298#M434512</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-18T10:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003299#M434513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your branch router and HO router have you disabled auto-summary?&amp;nbsp; as (no auto-summary) If you have not, please do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have put branch router on stub-zone, please make you have "eigrp stub connected" is being advertised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that did not help, please post your config from both ends, as an attachedment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2012 13:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003299#M434513</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-18T13:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003300#M434514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for being kind and for ur replies,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I found the problem ,it is with RRI, But i dont know why the route is not deleted when a SA is been deleted, It is taking too long time approximately 4 hrs to delete the static route from the routing table. Is it safe to execute command &lt;STRONG&gt;set reverse-route distance or from your exp any other hint.&lt;/STRONG&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On your branch router and HO router have you disabled auto-summary? as (no auto-summary) If you have not, please do so&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;YES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If you have put branch router on stub-zone, please make you have "eigrp stub connected" is being advertised&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;YES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 1 question on Eigrp routing protocol,the neighbor relation will be always up and the async interface will be always up though we have made the branch router stub, if i m not wrong the stub router advertises the connected route only and any other router does"nt queries the stub router for any active route but the neighbor hello will keep the link active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2012 13:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003300#M434514</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-06-18T13:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN GRE</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003301#M434515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"any other router does"nt queries the stub router for any active route but the neighbor hello will keep the link active."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, your understanding is correct but remember you have to copy IP-SLA on the branch-router, which is one of the reason why you will be better off using plain text GRE tunnel, due to a reason, GRE needs tunnel source and destination, so this tunnel source and destination can be manipulated by IP-SLA default-route failover which will solve your problem the neighbor hello will keep the link active. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When GRE tunnel's source and destination address cannot be reache via active connection, your GRE tunnel will stay down which result keeping "async interface" in idle state and when IP-SLA fails over to "async interface" then GRE tunnel's destination address will be reachable as dialout kick in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that make sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 13:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-gre/m-p/2003301#M434515</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-06-19T13:45:58Z</dc:date>
    </item>
  </channel>
</rss>

