cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1256
Views
6
Helpful
6
Replies

Create an encrypted/IPSEC GRE tunnel over MPLS link on Cisco 3650

S Kumar
Level 1
Level 1

One of our customers wants to connect to us using a private link.Customer wants to have all the communications encrypted over this link. Customer had suggested GRE tunnel with IPSEC.

MPLS provider will deliver a RJ45 link to us as well as towards our customer. RJ45 will be connected our Cisco 3650 which is a gateway for our devices. I need to configure GRE tunnel with IPSEC on my 3650.

I have other similar MPLS links terminating on my 3650. The way I am utilizing these MPLS links are that I do BGP peering with the MPLS provider and advertise my routes and magically these routes show up on customer's side and vice versa.

I am not sure how will I achieve GRE/IPSEC over MPLS?

Do I need to involve the MPLS provider and mention my requirements for GRE/IPSEC to them and they will work with me just like they work with me for the BGP peering?

Or is it transparent to MPLS provider and I can treat this link as P2P link?

Any guidance would be much appreciated

6 Replies 6

emurray
Level 1
Level 1

If you have reachability between the two sites, I don't think you need to do anything with the MPLS. The MPLS is the provider side. You can configure a GRE tunnel with IKE V1 using IPsec profiles. Or you can use  IKE V2 without using GRE at all. 

 

You can use this tutorial for the configuration How To Configure IPSEC SITE TO SITE VPN using IKEV2 - YouTube

why you use GRE/IPSec, 
you already have reachability 
config the BGP with LO as update source 
and then config crypto map under this LO. 

Hello


@S Kumar wrote:

MPLS provider will deliver a RJ45 link to us as well as towards our customer. RJ45 will be connected our Cisco 3650 which is a gateway for our devices. I need to configure GRE tunnel with IPSEC on my 3650.


The underlay will be indeed the mpls connection between both sites if you want to build an overlay (tunnel), however Im not so sure the 3650 supports ipsec?

Anyhow if you are able to create this tunnel, you will then need to specify certain traffic to be policy routed over this tunnel to achieve the encryption required.

 

 


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

Joseph W. Doherty
Hall of Fame
Hall of Fame

"Or is it transparent to MPLS provider and I can treat this link as P2P link?"

Likely this is the case.  I.e. you just configure an GRE/IPSec tunnel, P2P, or perhaps using DMVPN (which is best depends on your IPSec needs between sites).

As other posters have mentioned, you do need to insure your 3650 supports GRE tunnels (don't know, myself; earlier Catalyst 3Ks didn't) and supports IPSec across such tunnels (dido), included whatever level of IPSec security (strength) is required.

BTW, a major gotcha of GRE/IPSec is the reduction in IP MTU often leading to fragmentation.  I.e. you want to be aware of how to mitigate fragmentation's impact, which, cannot often be totally eliminated for all traffic kinds.  (NB: if you're not doing jumbo Ethernet now, and don't plan to, but your MPLS provider supports jumbo Ethernet, that can be used to totally eliminate fragmentation across your tunnel.)

S Kumar
Level 1
Level 1

I have Cisco3650 on both sites running on IOS 16.6.7-ipservicesk9. I have the following config and both sites have the readability.

Tunnel interfaces are up, tunnel is up. Both tunnel ip addresses are able to ping each other.
Interesting traffic is able to flow via the tunnel. I know this becuase traceroute results changes as soon as the tunnel is up.
"show cry ipsec sa" shows that there is no encaps/decaps. Tunnel interface show that there is no packet in/out.

Does  anyone know for sure if GRE with IPSEC is supported on C3650?
If it is supported, anything wrong with my config?

 

SITE # 1

!
crypto isakmp policy 10
encr aes 256
hash sha256
authentication pre-share
group 5
crypto isakmp key MySecretKey address 10.200.200.2
!
crypto ipsec transform-set TSET esp-aes 256 esp-sha256-hmac
mode tunnel
!
crypto ipsec profile IPSEC-PROFILE
set transform-set TSET
!
interface Tunnel0
ip address 10.99.99.1 255.255.255.252
tunnel source Vlan100
tunnel destination 10.254.200.29
tunnel key 1
tunnel protection ipsec profile IPSEC-PROFILE
!

ip route 192.168.200.10 0.0.0.0 Tunnel0

!
interface Vlan100
description MPLS-PROVIDER
ip address 10.254.100.29 255.255.255.252
end

router bgp 64100
bgp log-neighbor-changes
network 192.168.100.0 mask 255.255.255.0
network 10.254.100.28 mask 255.255.255.252
neighbor 10.254.100.30 remote-as 1234
neighbor 10.254.100.30 description MPLS_PROVIDER

 

SITE # 2

!
crypto isakmp policy 10
encr aes 256
hash sha256
authentication pre-share
group 5
crypto isakmp key MySecretKey address 10.200.200.2
!
crypto ipsec transform-set TSET esp-aes 256 esp-sha256-hmac
mode tunnel
!
crypto ipsec profile IPSEC-PROFILE
set transform-set TSET
!
interface Tunnel0
ip address 10.99.99.2 255.255.255.252
tunnel source Vlan200
tunnel destination 10.254.100.29
tunnel key 1
tunnel protection ipsec profile IPSEC-PROFILE
!

ip route 192.168.100.10 0.0.0.0 Tunnel0

!

!
interface Vlan200
description MPLS-PROVIDER
ip address 10.254.200.29 255.255.255.252
end

router bgp 64200
bgp log-neighbor-changes
network 192.168.200.0 mask 255.255.255.0
network 10.254.200.28 mask 255.255.255.252
neighbor 10.254.200.30 remote-as 12345
neighbor 10.254.200.30 description MPLS_PROVIDER

 

Support is available only for encapsulation; support for encryption is
not available. <<- here the issue I think remove the IPsec profile from the tunnel and check the tunnel status and traffic 
• Support for this feature on Cisco Catalyst 3650 and Cisco Catalyst
3850 Series switches is available with IP Base and IP Services
licenses.

https://www.cisco.com/c/dam/en/us/td/docs/switches/lan/catalyst3850/software/release/16-1/workflows/gre-feature-guide.pdf

 

Review Cisco Networking for a $25 gift card