cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
529
Views
5
Helpful
2
Replies

Flexvpn Spoke to Spoke

Lehrling
Level 1
Level 1

Hi, everybody

I have a simple Hub and Spoke Topology (one hub and three spokes). I changed the config to accommodate a direct spoke to spoke connection with a virtual template config on each spoke and NHRP shortcut. NHRP redirect on the hub. I have spoke to spoke reachability but all the traffic still goes through the hub. No virtual Access Interface on the spokes neither. What am I missing ?

Any Help appreciated. Thanks.

Lehrling

1 Accepted Solution

Accepted Solutions

Lehrling
Level 1
Level 1

Hi Everybody,

It has been a misconfiguration of my spoke tunnel interface going to the Hub. I checked a posting of MHM on the subject (edited 12-18-2020 01:47 PM) and saw that the

ip nhrp shorcut  

command was missing in the spoke tunnel configuration going to the Hub (was not needed in Hub and Spoke configuration). After I inserted the command in the tunnel config, everything works fine. It seems to me that the command must be placed in both the tunnel interface config and the virtual template config. The spokes can communicate directly bypassing the Hub. I found out checking posts of MHM on the subject.

@ MHM : Thanks a ton again. Your contributions are GOLDEN !!!


 

 

View solution in original post

2 Replies 2

pman
Spotlight
Spotlight

Hi,

attached config examples:

HUB

hostname hub
!
crypto ikev2 authorization policy default
 pool flex-pool
 def-domain cisco.com
 route set interface
 route set access-list flex-route
!
crypto ikev2 profile default
 match identity remote fqdn domain cisco.com
 identity local fqdn hub.cisco.com
 authentication local rsa-sig
 authentication remote rsa-sig
 pki trustpoint CA
 aaa authorization group cert list default default
 virtual-template 1
!
crypto ipsec profile default
 set ikev2-profile default
!
interface Loopback0
 ip address 172.16.1.1 255.255.255.255
!
interface Ethernet0/0
 ip address 10.0.0.100 255.255.255.0
!
interface Virtual-Template1 type tunnel
 ip unnumbered Loopback0
 ip nhrp network-id 1
 ip nhrp redirect
 tunnel protection ipsec profile default
!
ip local pool flex-pool 172.16.0.1 172.16.0.254
!
ip access-list standard flex-route
 permit any

The following is the configuration on the first FlexVPN client:

hostname spoke1
!
crypto ikev2 authorization policy default
 route set interface
 route set access-list flex-route
!
crypto ikev2 profile default
 match identity remote fqdn domain cisco.com
 identity local fqdn spoke1.cisco.com
 authentication local rsa-sig
 authentication remote rsa-sig
 pki trustpoint CA
 aaa authorization group cert list default default
 virtual-template 1
!
crypto ipsec profile default
 set ikev2-profile default
!
interface Tunnel0
 ip address negotiated
 ip nhrp network-id 1
 ip nhrp shortcut virtual-template 1
 ip nhrp redirect
 tunnel source Ethernet0/0
 tunnel destination 10.0.0.100
 tunnel protection ipsec profile default
!
interface Ethernet0/0
 ip address 10.0.0.110 255.255.255.0
!
interface Ethernet1/0
 ip address 192.168.110.1 255.255.255.0
!
interface Virtual-Template1 type tunnel
 ip unnumbered Tunnel0
 ip nhrp network-id 1
 ip nhrp shortcut virtual-template 1
 ip nhrp redirect
 tunnel protection ipsec profile default
!
ip access-list standard flex-route
 permit 192.168.110.0 0.0.0.255

The following is the configuration on the second FlexVPN client:

hostname spoke2
!
crypto ikev2 authorization policy default
 route set interface
 route set access-list flex-route
!
crypto ikev2 profile default
 match identity remote fqdn domain cisco.com
 identity local fqdn spoke2.cisco.com
 authentication local rsa-sig
 authentication remote rsa-sig
 pki trustpoint CA
 aaa authorization group cert list default default
 virtual-template 1
!
crypto ipsec profile default
 set ikev2-profile default
!
interface Tunnel0
 ip address negotiated
 ip nhrp network-id 1
 ip nhrp shortcut virtual-template 1
 ip nhrp redirect
 tunnel source Ethernet0/0
 tunnel destination 10.0.0.100
 tunnel protection ipsec profile default
!
interface Ethernet0/0
 ip address 10.0.0.120 255.255.255.0
!
interface Ethernet1/0
 ip address 192.168.120.1 255.255.255.0
!
interface Virtual-Template1 type tunnel
 ip unnumbered Tunnel0
 ip nhrp network-id 1
 ip nhrp shortcut virtual-template 1
 ip nhrp redirect
 tunnel protection ipsec profile default
!
ip access-list standard flex-route
 permit 192.168.120.0 0.0.0.255

https://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-flex-spoke.html#GUID-C52DFA6D-CF76-484E-B348-51CA0792C1AB

 

Lehrling
Level 1
Level 1

Hi Everybody,

It has been a misconfiguration of my spoke tunnel interface going to the Hub. I checked a posting of MHM on the subject (edited 12-18-2020 01:47 PM) and saw that the

ip nhrp shorcut  

command was missing in the spoke tunnel configuration going to the Hub (was not needed in Hub and Spoke configuration). After I inserted the command in the tunnel config, everything works fine. It seems to me that the command must be placed in both the tunnel interface config and the virtual template config. The spokes can communicate directly bypassing the Hub. I found out checking posts of MHM on the subject.

@ MHM : Thanks a ton again. Your contributions are GOLDEN !!!


 

 

Review Cisco Networking products for a $25 gift card