ā11-15-2018 10:21 PM - edited ā11-15-2018 10:32 PM
Hello Expert,
I have a hub router an three spoke connct together using ppoe connections.
I am to [ping all the wan interfaces of my remote (spokes) from the hub , but i am unable to establlish a tunnel between
the hub and repte site.
I went thru the configuration of both hub and spoke compraing key and access list etc.
I include the hub and spoke for your guidance.
Regards
Solved! Go to Solution.
ā11-21-2018 06:52 AM
Thanks for the update telling us that the problem is, in fact, having the crypto map configured on the tunnel interface. I know that in old versions of IOS that Cisco required the crypto map on both the tunnel interface and the physical interface. Then Cisco made a change and required the crypto map only on the physical interface. At that point it allowed the crypto map on the tunnel interface but did not require it. And it appears that in some more recent versions of code putting the crypto map on the tunnel is a problem.
I am guessing that for this tunnel at least one of the routers is running code more recent that what is running on other routers in your network and that would explain why it is ok on some but is a problem on others. I would certainly suggest that going forward as you configure GRE tunnels with encryption that you put the crypto map only on the physical interface. As far as what to do with existing configurations that have the crypto map on both interfaces, there is one viewpoint that says if it is not broken then do not fix it. This would suggest leaving the crypto map on the tunnels on routers where it is not a problem. But my suggestion would be to go through your configs removing the crypto map from the tunnel interfaces. Otherwise there may be a time when you do a code upgrade on a router and suddenly its tunnel will stop working. It is your choice whether to change the existing tunnels or to leave them alone.
HTH
Rick
ā11-16-2018 12:57 AM - edited ā11-16-2018 02:00 AM
Hello,
I recreated your setup in GNS3, tunnel comes up. Try and use a diffferent crypto map for each tunnel instead of the same one:
Spoke
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
!
crypto isakmp key 67B3CE5B40CB409D34230D32B561B37604B01C685B01B054 address 101.149.149.128
crypto isakmp keepalive 60 periodic
!
crypto ipsec transform-set manbosvpn esp-3des esp-sha-hmac comp-lzs
mode tunnel
!
crypto map SDM_CMAP_13 1 ipsec-isakmp
description Tunnel to101.149.149.128
set peer 101.149.149.128
set transform-set manbosvpn
match address 103
!
interface Tunnel2
ip address 192.168.19.12 255.255.255.0
ip mtu 1372
tunnel source Dialer0
tunnel destination 101.149.149.128
tunnel path-mtu-discovery
crypto map SDM_CMAP_13
------------
Hub
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
!
crypto isakmp key 67B3CE5B40CB409D34230D32B561B37604B01C685B01B054 address 101.149.149.55
!
crypto ipsec transform-set manbosvpn esp-3des esp-sha-hmac comp-lzs
mode tunnel
!
crypto map SDM_CMAP_13 1 ipsec-isakmp
description Tunnel to101.149.149.55
set peer 101.149.149.55
set transform-set manbosvpn
match address 102
!
interface Tunnel2
description Tunnel to Amazonia_Mall
ip address 192.168.19.10 255.255.255.0
ip mtu 1372
tunnel source Dialer0
tunnel destination 101.149.149.55
tunnel path-mtu-discovery
crypto map SDM_CMAP_13
!
ā11-16-2018 05:55 AM - edited ā11-16-2018 05:56 AM
Hello Georg,
Thanks for the response I will use a different crypto map for each tunnel and retry
A quick question will the same crypto map on each tunnel be responsible for the tunnels failing to establish between the hub and spoke.
Regards
ā11-16-2018 06:04 AM
I don't know if the shared crypto map causes the tunnel to fail. I used a separate crypto map for each tunnel and it worked. Give it a try...
ā11-16-2018 06:08 AM
ā11-17-2018 03:00 AM
ā11-17-2018 05:52 AM - edited ā11-17-2018 05:53 AM
what is not working. could you be more specific?
ā11-17-2018 11:58 AM
ā11-17-2018 06:49 AM
Hello,
is this a lab setup or a real, live network ?
ā11-17-2018 07:42 AM
A separate crypto map for each tunnel is an interesting suggestion. But since all tunnels use the same single dialer interface and the crypto map is specified on the dialer interface I do not see how separate crypto maps could work.
Since the crypto map is specified on the dialer interface I wonder why the crypto map is also specified on the tunnel interfaces. When I began using site to site vpn tunnels (a long time ago) we needed to specify the crypto map on both the physical and the tunnel interfaces. But IOS changed and then needed the crypto map only on the physical interface. Is there something about this router code that needs the crypto map in both places? I suggest removing the crypto map from the tunnel interfaces and see if it makes any difference.
It is not clear to me whether the issue is with the crypto or whether the issue might be with the pppoe. Could you remove the crypto map and see if the tunnels come up then?
HTH
Rick
ā11-17-2018 12:02 PM
ā11-17-2018 02:08 PM
Please do let us know what you find.
If you are basing your status that the tunnels are not working based on what you see in the routing table then I have a suggestion: use the commands show crypto isakmp sa and show crypto ipsec sa and post the output. These are much more accurate in determining the status of the tunnels.
HTH
Rick
ā11-17-2018 03:53 PM
ā11-18-2018 04:30 AM
ā11-18-2018 06:00 AM
The title of this discussion indicates that a vpn tunnel is not established. But the output that you post shows that in fact the tunnel is established.
interface: Tunnel0
Crypto map tag: SDM_CMAP_1, local addr 192.168.19.10
protected vrf: (none)
local ident (addr/mask/prot/port): (10.149.149.128/255.255.255.255/47/0)
remote ident (addr/mask/prot/port): (10.149.149.55/255.255.255.255/47/0)
The output also shows that there are no packets encapsulated and no packets dencapsulated. So there is no traffic going through the tunnel. So the problem really is not about establishing the tunnel and is about why traffic is not going through the tunnel. You are running EIGRP over the tunnels. So are you learning any routes over the tunnels? Would you post the output of show ip route and we can see if there are EIGRP learned routes. It might also be helpful to show the EIGRP interfaces and EIGRP neighbors.
You ask if you need ip nat outside on the dialer interface. That is an interesting question and the answer depends on whether you intend to do address translation. The configs that you posted show no configuration for address translation. So I would say that at present there is no need for ip nat outside. If you do intend to come back and implement address translation then you would need the command on the dialer.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide