08-12-2022 12:33 AM
Hi, everybody
I have a simple Hub and Spoke Topology (one hub and three spokes). I changed the config to accommodate a direct spoke to spoke connection with a virtual template config on each spoke and NHRP shortcut. NHRP redirect on the hub. I have spoke to spoke reachability but all the traffic still goes through the hub. No virtual Access Interface on the spokes neither. What am I missing ?
Any Help appreciated. Thanks.
Lehrling
Solved! Go to Solution.
08-12-2022
02:15 AM
- last edited on
08-17-2022
03:29 AM
by
Translator
Hi Everybody,
It has been a misconfiguration of my spoke tunnel interface going to the Hub. I checked a posting of MHM on the subject (edited 12-18-2020 01:47 PM) and saw that the
ip nhrp shorcut
command was missing in the spoke tunnel configuration going to the Hub (was not needed in Hub and Spoke configuration). After I inserted the command in the tunnel config, everything works fine. It seems to me that the command must be placed in both the tunnel interface config and the virtual template config. The spokes can communicate directly bypassing the Hub. I found out checking posts of MHM on the subject.
@ MHM : Thanks a ton again. Your contributions are GOLDEN !!!
08-12-2022 02:06 AM
Hi,
attached config examples:
HUB
hostname hub ! crypto ikev2 authorization policy default pool flex-pool def-domain cisco.com route set interface route set access-list flex-route ! crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn hub.cisco.com authentication local rsa-sig authentication remote rsa-sig pki trustpoint CA aaa authorization group cert list default default virtual-template 1 ! crypto ipsec profile default set ikev2-profile default ! interface Loopback0 ip address 172.16.1.1 255.255.255.255 ! interface Ethernet0/0 ip address 10.0.0.100 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Loopback0 ip nhrp network-id 1 ip nhrp redirect tunnel protection ipsec profile default ! ip local pool flex-pool 172.16.0.1 172.16.0.254 ! ip access-list standard flex-route permit any
The following is the configuration on the first FlexVPN client:
hostname spoke1 ! crypto ikev2 authorization policy default route set interface route set access-list flex-route ! crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn spoke1.cisco.com authentication local rsa-sig authentication remote rsa-sig pki trustpoint CA aaa authorization group cert list default default virtual-template 1 ! crypto ipsec profile default set ikev2-profile default ! interface Tunnel0 ip address negotiated ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 ip nhrp redirect tunnel source Ethernet0/0 tunnel destination 10.0.0.100 tunnel protection ipsec profile default ! interface Ethernet0/0 ip address 10.0.0.110 255.255.255.0 ! interface Ethernet1/0 ip address 192.168.110.1 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Tunnel0 ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 ip nhrp redirect tunnel protection ipsec profile default ! ip access-list standard flex-route permit 192.168.110.0 0.0.0.255
The following is the configuration on the second FlexVPN client:
hostname spoke2 ! crypto ikev2 authorization policy default route set interface route set access-list flex-route ! crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn spoke2.cisco.com authentication local rsa-sig authentication remote rsa-sig pki trustpoint CA aaa authorization group cert list default default virtual-template 1 ! crypto ipsec profile default set ikev2-profile default ! interface Tunnel0 ip address negotiated ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 ip nhrp redirect tunnel source Ethernet0/0 tunnel destination 10.0.0.100 tunnel protection ipsec profile default ! interface Ethernet0/0 ip address 10.0.0.120 255.255.255.0 ! interface Ethernet1/0 ip address 192.168.120.1 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Tunnel0 ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 ip nhrp redirect tunnel protection ipsec profile default ! ip access-list standard flex-route permit 192.168.120.0 0.0.0.255
08-12-2022
02:15 AM
- last edited on
08-17-2022
03:29 AM
by
Translator
Hi Everybody,
It has been a misconfiguration of my spoke tunnel interface going to the Hub. I checked a posting of MHM on the subject (edited 12-18-2020 01:47 PM) and saw that the
ip nhrp shorcut
command was missing in the spoke tunnel configuration going to the Hub (was not needed in Hub and Spoke configuration). After I inserted the command in the tunnel config, everything works fine. It seems to me that the command must be placed in both the tunnel interface config and the virtual template config. The spokes can communicate directly bypassing the Hub. I found out checking posts of MHM on the subject.
@ MHM : Thanks a ton again. Your contributions are GOLDEN !!!
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: