10-05-2024 06:59 AM
We are facing issue continues IPsec GRE tunnel flapping in case of backhaul link flapped. CPU going at the higher side and GRE Tunnels which are not enabled with crypto are stable.
10-05-2024 07:02 AM - edited 10-05-2024 11:04 AM
Check below
MHM
10-05-2024 10:07 AM
Hello everyone,
Let's not jump to unwarranted conclusions, @MHM Cisco World - we don't even know if what is flapping are interfaces themselves, or just some protocol running over them; we do not know enough about the tunnels and their configuration; we do not know if they are using any GRE tunnel keys already... in fact, GRE tunnel keys cannot cause a tunnel to flap. At most, they can cause it to never come up, but flapping as a process of coming up and down can not be traced down to GRE keys or absence of them.
Hence, let's hold back on the compulsion to post a reply at every cost, and instead, let's collect actionable hard evidence beforehand.
@sutharhemant90 , I would like to ask you to share details from the device(s) where you see the tunnel flaps. I understand if some information cannot be shared openly - but please try to share as much as possible, anonymizing any sensitive information wherever needed.
Thank you! Let's see if this information can move us further.
Best regards,
Peter
10-05-2024 10:48 AM
@Peter Paluch I have pasted some basic configuration from core router (IPs are changed*). I will check for logs and update.
Tunnel with IPsec Crypto Enabled. (Flapping tunnel when any ISP link going up\down)
interface Tunnel1001
bandwidth 4096
ip address x.x.x.x 255.255.255.252
tunnel source x.x.x.x
tunnel mode ipip
tunnel destination x.x.x.x
tunnel protection ipsec profile GRE
Tunnel without IPsec Crypto Enabled. (Stable tunnel even if any isp links going up\down)
interface Tunnel1017
bandwidth 4096
ip address x.x.x.x 255.255.255.252
tunnel source x.x.x.x
tunnel mode ipip
tunnel destination x.x.x.x
-
router eigrp 110
variance 2
network 10.0.0.0
redistribute static
redistribute ospf 10 metric 512 1 255 1 1500
redistribute bgp 64940 metric 22528 1 255 1 1500
router bgp 64940
bgp log-neighbor-changes
neighbor 172.16.2.1 remote-as 9729
neighbor 172.16.2.1 description # BGP for ISP 1 #
neighbor 172.29.41.218 remote-as 55411
neighbor 172.29.41.218 description # BGP for ISP 1 #
!
address-family ipv4
redistribute static
redistribute eigrp 110
neighbor 172.16.2.1 activate
neighbor 172.16.2.1 weight 40000
neighbor 172.16.2.1 soft-reconfiguration inbound
neighbor 172.16.2.1 distribute-list ISP-1 in
neighbor 172.16.2.1 filter-list 70 out
neighbor 172.29.41.218 activate
neighbor 172.29.41.218 weight 40000
neighbor 172.29.41.218 soft-reconfiguration inbound
neighbor 172.29.41.218 distribute-list ISP-2 in
neighbor 172.29.41.218 filter-list 70 out
default-information originate
exit-address-family
Cisco Version 17.10.1a
Cisco - ISR4461/K9
10-05-2024 10:53 AM
10-05-2024 11:22 AM
Hello Hemant,
Thank you for the information shared so far.
From what I can tell so far, your configuration is not GRE. Rather, you are using IP-in-IP tunnels, optionally with IPsec protection. It is not a problem in itself, but I wanted to point that out so that we share the common understanding of the details of your configuration.
From the notes above, you wrote that the IPsec-protected tunnels flap whenever any ISP link goes up or down. This is important - is the ISP link going up or down the only trigger for that tunnel flap?
I'll still wait for the logs.
Best regards,
Peter
10-05-2024 11:04 AM - edited 10-05-2024 11:26 AM
Tunnel without IPSec profile dont use any kind of tunnel health check so that it always UP whenever destiantion is reachable (there is defualt route in rib)
Tunnel with IPsec profile use isakmp keepalive and when keepalive is failed the tunnel is down even if destination is reachable.
So your issue in your ISP not your device.
To be sure add ip sla to your defualt route and check the health of it.
MHM
10-06-2024 08:02 AM
There are rare incidents when a tunnel starts flapping automatically without any connected link flapping issue. If there is flapping or if a down link comes up at the data center during this time, my tunnel will start flapping, leading to high CPU utilization. To address this, I have created a script to bring all GRE tunnels down and then start a few tunnels step by step.
For testing purposes, I have applied the following CLI to one branch where the tunnel is stable. However, I am still unsure about the potential unknown impacts and whether it is recommended to use this approach
crypto isakmp keepalive 3600 60 periodic
Tunnel are not stable wherever keep alive timer is 20 10 Periodic
10-07-2024 12:21 AM - edited 10-07-2024 02:31 AM
you mention GRE in your original post
and I think you typo use (please @sutharhemant90 confirm)
tunnel mode IPIP
remove it please
for mode I will suggest mode depend on case you have
which of below you have ?
Regarding ISP did you use IP sla with default route or check link flapping?
10-07-2024 12:30 AM
you mention GRE in your original post
and I think you typo use
tunnel mode IPIP
remove it please
NO! Absolutely NOT!
MHM, you cannot just blindly suggest that people change their existing working configurations! What is far more likely is that Hemant believes his tunnels are GRE-based but what has been configured and working in his network is in reality IP-in-IP style of tunnels.
Unless we have this clarified, no configuration shall be changed, and you, MHM, please stop and think before posting. This is already the second time I am asking you in this thread to avoid jumping into conclusions and stop replying compulsively without making sure you are, FIRST, factually correct, SECOND, that you are joining the discussion rather than hijacking it, THIRD, that you are cooperating instead of playing solo.
Peter
10-07-2024 01:00 PM
Hello Hemant,
A humble reminder for the logs - if it is possible to share them.
Thank you!
Best regards,
Peter
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide