01-28-2003 05:53 AM - edited 02-21-2020 10:05 AM
I want so setup a hub and spoke ipsec tunnel topology with a redundant hub (hsrp based). I wonder how to implement certificate based authentication in this case as both router share the same ip address?
Do they need to have the same keys and certificate or what is the best practise in this situation?
Cheers,
Thomas
02-03-2003 08:15 AM
I am unable to see as to how use of HSRP will poses a problem. Even thought the hosts on your hub are configured to forward their traffic to the HSRP virtual address which all the routers in the group will hear on, the routers by themselves do not share the same interface address. Note that the virtual address is an address that the HSRP routers hear but are not actually configured on their interfaces. The interfaces over which they are forwarding traffic are addressed independantly. For more information on HSRP, please visit the HSRP support page at http://www.cisco.com/pcgi-bin/Support/PSP/psp_view.pl?p=Internetworking:HSRP. In fact, you could deploy HSRP for load sharing as shown in the document Load Sharing with HSRP at http://www.cisco.com/en/US/tech/tk648/tk365/technologies_configuration_example09186a0080094e90.shtml.
02-03-2003 10:03 AM
The point is that certificates are bound to ip addresses or names. As there is no way to transfer private keys from one router to another, both router will have different certificates. From the remote site's point of view there is only one ip address and therefore only one certificate. So authentication will be a problem as I would have to configure two certificates on the remote site router for one single identifier (ip address).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide