06-25-2024 08:31 PM - edited 06-25-2024 08:31 PM
Hello, please refer my image, and my questions are these:
1.
The solution for crypto map, is it working 2 nodes only?
In my environment, packets from R1 to R2 are crypto, but I need R1 to R3 crypto also. So I want to understand this setting crypto map is working 2 nodes only? Or what can I adjust config?
2.
In crypto map solution, packets from R1 to R2 that needs crypto, from R1 to R4 that not needs crypto.
Can it do it? Or crypto map is not correct solution in this environment?
06-25-2024 10:00 PM
You need to configure Hub and Spoke model
check below example configuration :
If you looking spoke to spoke - then you need to look DMVPN or GetVPN solution (you can google it you get N number of examples)
06-25-2024 11:49 PM
Hi BB,
Thank your info, but I'm learning your external link, still failed.
And my 「show crypto isakmp sa」seems working.
Maybe I will try DMVPN solution.
06-25-2024 11:52 PM
but I'm learning your external link, still failed.
Not sure i get this - can you give more clarity ?
Maybe I will try DMVPN solution.
sure that will be way move forward hub and spoke and spoke to spoke.
06-26-2024 12:54 AM
Hello @Chin Chang
06-27-2024 01:31 AM
Hi M02@rt37,
Thank your support, but I still failed. I have refer Cisco doc, and same config.
In my test, the router dr_whoovie have crypto session with sam-I-am, but not crypto session with thidwick.
And then, sam-I-am interface shutdown / no shutdown, dr_whoovie have session with thidwick, not crypto session with sam-I-am.
So in my test environment, the crypto session seems working on first 2 nodes, not work in third node. And point to point only, not multipoint.
06-26-2024 01:25 AM
Notes
1-You use hub not SW connect four routers
2- you test by ping router itself and this not way to tesr ipsec
3- there is no config of acl use in ipsec?
MHM
06-28-2024 02:55 AM
Hi MHM,
1-You use hub not SW connect four routers
>>thank your remind, I have replace it by c2960 switch, and other config, environment are same. still failed.
2- you test by ping router itself and this not way to tesr ipsec
>>my ping is from R1 interface to R2 interface, should I add PC nodes behind the router? and ping from PC1 to PC2? maybe I will try it.
3- there is no config of acl use in ipsec?
>>my ipsec has ACL config, but it is permit ip any any.
the reason is require ACL command, can not empty.
06-28-2024 03:11 AM
do below
note:-
1-LO is meaning Loopback
2- ping from LO to LO (use source in ping) to test IPsec
3- Spoke have default route toward R4
4- Hub have static route for each LO connect to Spoke
MHM
06-29-2024 11:49 AM
Thank your help, still failed.
Currently, we will plan DMVPN, give up crypto map.
06-29-2024 11:54 AM
To be honest I prefer using dmvpn for hub and spoke' even if I am sure the crypto map I share it work.
But using legacy crypto map in present of dmvpn is bad idea
MHM
06-29-2024 12:07 PM
If I have time I will share lab maybe tomorrow
MHM
06-29-2024 01:23 PM
Hi MHM,
thank you so much for support.
i'm familiar DMVPN, if i met trouble, i will post in community, tks!
06-29-2024 01:49 PM
You are so welcome
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide