10-24-2017 09:12 AM - edited 03-01-2019 08:38 AM
Hi guys,
I'm using "Cisco Cloud Services Router (CSR) 1000V - Security Pkg. Max Performance" in aws market place, and we need to build IPsec GRE tunnel with remote peer
My CSR instance has 2 network interface, 1 facing public, has private IP and associated with elastic IP, 1 facing private subnet.
My question is in the tunnel configuration, my local address should put the elastic public IP or internal IP?
When I put public elastic IP, even the phase 1 is not up.
When I put internal IP, phase 1 seems up, but phase 2 does not work, because the proxyId does not match, when remote peer is using our elastic public IP to configure the tunnel destination.
crypto keyring PASPE1
local-address [public elastic IP]
pre-shared-key address [remote GW public IP] key xxxx
crypto isakmp profile PASPE1
keyring PASPE1
match identity address [remote GW public IP] 255.255.255.255
keepalive 10 retry 3
local-address [public elastic IP]
interface Tunnel56
description TESTING PASPE1 @ 81.52.187.77
ip address 81.52.187.76 255.255.255.254
no ip redirects
no ip proxy-arp
ip mtu 1420
load-interval 30
carrier-delay msec 0
shutdown
tunnel source [elastic public IP]
tunnel destination [remote GW public IP]
tunnel protection ipsec profile PASPE1
Any advise is appreciated!
11-17-2017 11:53 AM
You may have already found this answer but I'm posting here in case anyone else is looking.
Your local address should actually be your interface name instead of an IP.
Assuming GigabitEthernet 1 -->> Public interface with EIP
Here is what the config should look like. I've verified this works in my my environment
crypto keyring PASPE1
local-address gigabitethernet1
pre-shared-key address [remote GW public IP] key xxxx
crypto isakmp profile PASPE1
keyring PASPE1
match identity address [remote GW public IP] 255.255.255.255
keepalive 10 retry 3
local-address gigabitethernet1
interface Tunnel56
description TESTING PASPE1 @ 81.52.187.77
ip address 81.52.187.76 255.255.255.254
no ip redirects
no ip proxy-arp
ip mtu 1420
load-interval 30
carrier-delay msec 0
shutdown
tunnel source gigabitethernet1
tunnel destination [remote GW public IP]
tunnel protection ipsec profile PASPE1
11-17-2017 07:16 PM
Dear Donald,
I appreciate your reply.
I have also done some testing, and found that Tunnel mode should be "transport" instead of "tunnel",
refer to post https://supportforums.cisco.com/t5/vpn/site-to-site-vpn-through-a-nat-device/td-p/2341647
Can you please tell me your working config is using mode "transport" or not?
12-20-2018 04:06 PM - edited 12-20-2018 04:25 PM
This is correct. The IPSec profile for a GRE tunnel should be transport mode. For plain IPSec tunnels, the mode should be tunnel.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide