ā11-15-2018 10:21 PM - edited ā11-15-2018 10:32 PM
Hello Expert,
I have a hub router an three spoke connct together using ppoe connections.
I am to [ping all the wan interfaces of my remote (spokes) from the hub , but i am unable to establlish a tunnel between
the hub and repte site.
I went thru the configuration of both hub and spoke compraing key and access list etc.
I include the hub and spoke for your guidance.
Regards
Solved! Go to Solution.
ā11-19-2018 10:08 AM - edited ā11-19-2018 10:13 AM
ā11-19-2018 12:37 PM - edited ā11-19-2018 12:40 PM
Hello Rick,
I configure another spoke router (production) to same hub as mention in my first post and the eigrp tunnel was establish and passing traffic.
I tried comparing the two spokes to see why one was working and the other was not working but the only different was access rule 106 that was applied to dialer interface.
I would be grateful if you can compare the two spoke configuration what is missing.
I am very puzzle with one.
Regards
ā11-20-2018 11:10 AM
The output of sh crypto isakmp dia error is interesting. I note that there are error messages involving negotiation with both .55 and .32. I am not sure what the precise cause of the error messages was. But I do not think that they represent any permanent or fatal errors, mostly because we have output that shows that the negotiation was ultimately successful and that the tunnel did come up.
I do note the number of traceback messages that are shown in that output. A traceback is always a sign of a software error. So there is something going on in that software that is problematic. I can not say for sure whether the software problem is related to the problem with this tunnel, but my opinion is that the software problem is not causing the issue with this tunnel. But you might consider upgrading the version of code to eliminate these errors.
HTH
Rick
ā11-20-2018 11:45 AM
Of the two configurations that you posted for spokes, can you clarify which is the one that works and which is the one that does not work?
I have analyzed both of the spoke configs that you posted. There is another difference between them other than acl 106 on the dialer. On the config for Kitty-2 there is access list 101 on the vlan interface. That access list permits traffic only from 2 hosts in the subnet of vlan 1. And it permits that traffic only to destination 172.24.10.0. I am not sure where that network is but it does not appear to be on the hub. I believe that this access list may be the source of your problem.
HTH
Rick
ā11-21-2018 06:34 AM
ā11-21-2018 06:47 AM
ā11-21-2018 06:52 AM
Thanks for the update telling us that the problem is, in fact, having the crypto map configured on the tunnel interface. I know that in old versions of IOS that Cisco required the crypto map on both the tunnel interface and the physical interface. Then Cisco made a change and required the crypto map only on the physical interface. At that point it allowed the crypto map on the tunnel interface but did not require it. And it appears that in some more recent versions of code putting the crypto map on the tunnel is a problem.
I am guessing that for this tunnel at least one of the routers is running code more recent that what is running on other routers in your network and that would explain why it is ok on some but is a problem on others. I would certainly suggest that going forward as you configure GRE tunnels with encryption that you put the crypto map only on the physical interface. As far as what to do with existing configurations that have the crypto map on both interfaces, there is one viewpoint that says if it is not broken then do not fix it. This would suggest leaving the crypto map on the tunnels on routers where it is not a problem. But my suggestion would be to go through your configs removing the crypto map from the tunnel interfaces. Otherwise there may be a time when you do a code upgrade on a router and suddenly its tunnel will stop working. It is your choice whether to change the existing tunnels or to leave them alone.
HTH
Rick
ā11-17-2018 11:59 AM - edited ā11-17-2018 12:07 PM
Hello Georg,
This is live network .
Regards
ā11-17-2018 02:14 PM
Hello.
remove the crypto maps from the tunnel interfaces...
ā11-18-2018 12:39 AM
Hello,
I saw that Richard already suggested removing the crypto maps from the tunnels...
Either way, if this is a live network, what are you trying to accomplish ? Without NAT, you have no Internet connectivity. You can either use NAT only at the hub, or you can split tunnel the traffic and have site to site traffic traverse the VPN, while Internet traffic goes out through the dialer interfaces...
ā11-18-2018 04:04 AM
ā11-18-2018 04:09 AM
If you only need site to site traffic and no Internet connectivity for your LAN clients, then you don't need NAT.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide