<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Understanding IPSEC tunnel architecture that must pass through an Hub and Spoke transport provider in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3817062#M6563</link>
    <description>&lt;P&gt;Great info!&lt;/P&gt;
&lt;P&gt;So below I see one main tunnel I guess then a bunch of child SAs underneath (just as it shows in the GUI/ASDM). To my understanding, all the child SAs are different remote sites that go through the transport provider. I am basically trying to interpret the below because to my understanding, we have VPN tunnels that go through one transport location that handles the connections to the remote sites. Is my main tunnel is the "1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER". Does this sound about right? How is this configured?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Session-id:2758, Status:UP-ACTIVE, IKE count:1, CHILD count:14&lt;/P&gt;
&lt;P&gt;Tunnel-id Local Remote Status Role&lt;BR /&gt;1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER&lt;BR /&gt;Encr: AES-CBC, keysize: 256, Hash: SHA384, DH Grp:21, Auth sign: PSK, Auth verify: PSK&lt;/P&gt;
&lt;P&gt;Life/Active Time: 86400/18416 sec&lt;/P&gt;
&lt;P&gt;Child sa: local selector X.X.X..0/0 - 1X.X.X..255/65535&lt;BR /&gt;remote selector X.X.X..160/0 - X.X.X.1/65535&lt;BR /&gt;ESP spi in/out: 0x6d1f4027/0xbbe517cf&lt;BR /&gt;Child sa: local selector X.X.X.28/0 - X.X.X.255/65535&lt;BR /&gt;remote selector X.X.X.60/0 - X.X.X.91/65535&lt;BR /&gt;ESP spi in/out: 0xbb935ee4/0xa7642a72&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 19:59:55 GMT</pubDate>
    <dc:creator>CiscoBrownBelt</dc:creator>
    <dc:date>2019-03-10T19:59:55Z</dc:date>
    <item>
      <title>Understanding IPSEC tunnel architecture that must pass through an Hub and Spoke transport provider</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3816827#M6559</link>
      <description>&lt;P&gt;I attached a pic to help - don't have Visio.&lt;/P&gt;
&lt;P&gt;Let's say HQ router is head end router with all IPSEC configs for remote sites.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The circuit goes to another location (Provider in diagram) who handles the physical connections to the remote sites.&lt;/P&gt;
&lt;P&gt;So remote end configs for the tunnels are still built on devices at the remote site router or ASA, etc. correct?&lt;/P&gt;
&lt;P&gt;So does the Transport provider just need our public ip addresses since they are not supposed to know about the tunnels?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3816827#M6559</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T16:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPSEC tunnel architecture that must pass through an Hub and Spoke transport provider</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3816838#M6560</link>
      <description>Hi,&lt;BR /&gt;I assume the provider will just route the traffic?......therefore you just need IP reachability between the HQ and Remote sites, using there external/public IP addresses. &lt;BR /&gt;&lt;BR /&gt;The VPN tunnels will be built between the HQ router and the Remote site devices. The provider wouldn't know about your internal networks, they'd be routed via the tunnel, encrypted and therefore transparent to the provider.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 09 Mar 2019 18:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3816838#M6560</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-09T18:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPSEC tunnel architecture that must pass through an Hub and Spoke transport provider</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3816899#M6561</link>
      <description>&lt;P&gt;you are spot on blue belt. your tunnels are established between (public) peer IP addresses. as far as your provider is concerned it only sees isakmp and ESp traffic, it does not see what is encrypted inside it. so as long as your provider routes the peer addresses, you are fine. as soon as the physical circuit drops, the remote end will continue to bring up the tunnel, until it can, i.e. the circuit is recovered.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 06:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3816899#M6561</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2019-03-10T06:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPSEC tunnel architecture that must pass through an Hub and Spoke transport provider</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3817061#M6562</link>
      <description>Great info!&lt;BR /&gt;So below I see one main tunnel I guess then a bunch of child SAs underneath (just as it shows in the GUI/ASDM). To my understanding, all the child SAs are different remote sites that go through the transport provider. My main tunnel is the "1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER". Does this sound about right?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Session-id:2758, Status:UP-ACTIVE, IKE count:1, CHILD count:14&lt;BR /&gt;&lt;BR /&gt;Tunnel-id Local Remote Status Role&lt;BR /&gt;1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER&lt;BR /&gt;Encr: AES-CBC, keysize: 256, Hash: SHA384, DH Grp:21, Auth sign: PSK, Auth verify: PSK&lt;BR /&gt;&lt;BR /&gt;Life/Active Time: 86400/18416 sec&lt;BR /&gt;&lt;BR /&gt;Child sa: local selector X.X.X..0/0 - 1X.X.X..255/65535&lt;BR /&gt;remote selector X.X.X..160/0 - X.X.X.1/65535&lt;BR /&gt;ESP spi in/out: 0x6d1f4027/0xbbe517cf&lt;BR /&gt;Child sa: local selector X.X.X.28/0 - X.X.X.255/65535&lt;BR /&gt;remote selector X.X.X.60/0 - X.X.X.91/65535&lt;BR /&gt;ESP spi in/out: 0xbb935ee4/0xa7642a72</description>
      <pubDate>Sun, 10 Mar 2019 19:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3817061#M6562</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-10T19:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding IPSEC tunnel architecture that must pass through an Hub and Spoke transport provider</title>
      <link>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3817062#M6563</link>
      <description>&lt;P&gt;Great info!&lt;/P&gt;
&lt;P&gt;So below I see one main tunnel I guess then a bunch of child SAs underneath (just as it shows in the GUI/ASDM). To my understanding, all the child SAs are different remote sites that go through the transport provider. I am basically trying to interpret the below because to my understanding, we have VPN tunnels that go through one transport location that handles the connections to the remote sites. Is my main tunnel is the "1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER". Does this sound about right? How is this configured?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Session-id:2758, Status:UP-ACTIVE, IKE count:1, CHILD count:14&lt;/P&gt;
&lt;P&gt;Tunnel-id Local Remote Status Role&lt;BR /&gt;1682665127 X.X.X.6/500 X.X.X.0/500 READY RESPONDER&lt;BR /&gt;Encr: AES-CBC, keysize: 256, Hash: SHA384, DH Grp:21, Auth sign: PSK, Auth verify: PSK&lt;/P&gt;
&lt;P&gt;Life/Active Time: 86400/18416 sec&lt;/P&gt;
&lt;P&gt;Child sa: local selector X.X.X..0/0 - 1X.X.X..255/65535&lt;BR /&gt;remote selector X.X.X..160/0 - X.X.X.1/65535&lt;BR /&gt;ESP spi in/out: 0x6d1f4027/0xbbe517cf&lt;BR /&gt;Child sa: local selector X.X.X.28/0 - X.X.X.255/65535&lt;BR /&gt;remote selector X.X.X.60/0 - X.X.X.91/65535&lt;BR /&gt;ESP spi in/out: 0xbb935ee4/0xa7642a72&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 19:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-ipsec-tunnel-architecture-that-must-pass-through/m-p/3817062#M6563</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-10T19:59:55Z</dc:date>
    </item>
  </channel>
</rss>

