11-04-2008 11:29 AM - edited 03-04-2019 12:11 AM
I have two routers connected via leased line and site-to-site VPN is implemented on this link ,also I configure EIGRP between the two routers and it is working fine...
my question is that is it possible to configure EIGRP over IPsec applied on this leased line???because what I knew is that for routing protocols GRE must be used??!!!
11-04-2008 02:17 PM
Thanx for your reply....
no I'm not using GRE over IPSEC ,,only IPsec vpn
but if I want to use GRE over IPsec could you please answer to my questions above
11-04-2008 02:18 PM
Can you post your complete config? It would be SO much easier.
--John
11-04-2008 02:16 PM
You only need to apply the crypto map on the outside interface.
In your acl, you would permit gre, esp, and udp eq isakmp (500) into your public interface.
You don't need to include your internal network in the acl that's applied on the outside interface. You WILL need to, of course, apply it to the acl to match the traffic in your crypto map though.
--John
11-04-2008 02:15 PM
No because EIGRP will advertise all networks it is aware of to a neighbor. The key thing i am saying is that EIGRP will not run across a VPN tunnel without GRE but i don't believe EIGRP is running across the VPN tunnel.
Because this is a leased line you can run private addressing across it. So i suspect that the serial interfaces are just forming an EIGRP neighborship - nothing to do with the VPN tunnel. And the routing updates exchanged between these 2 routers do not go down the VPN tunnel at all. You could remove the VPN configuration and you would still get an EIGRP peering.
Of course this is partly guesswork because we still don't know what the serial interfaces addressing is.
Jon
11-04-2008 02:14 PM
R1:
internal network 10.10.0.0/24
s0/0 192.168.10.1/30
R2:
internal network 10.20.0.0/24
s0/0 192.168.10.2/30
11-04-2008 02:19 PM
This makes sense now .. Jon was right about the leased line and the private IP's I'm no longer confused...
Thanks Jon.
11-04-2008 02:22 PM
then will this configuration cause any problem ???
11-04-2008 02:28 PM
Brent
At the risk of confusing the issue what i explained only makes sense if the serial interfaces addressing has a network statement under the EIGRP config.
The partial config supplied by Mohammed only has
router eigrp 1
network 10.0.0.0
so EIGRP should not be running on the serial interfaces.
Mohammed can you confirm whether you have a network statement for 192.168.x.x addressing under your EIGRP config.
Also, why are you running a VPN across a leased line - is it for security reasons.
Jon
11-04-2008 02:31 PM
Can you show us your routing table? Remove any public addresses. I'd be interested in seeing it.
11-04-2008 02:33 PM
I totally agree Jon, my confusion stems from thinking that EIGRP was working over an IPSEC VPN L2L tunnel.
I have the clear vision now.
11-04-2008 02:43 PM
sorry the IP address of the serial interface is included under eigrp
router eigrp 1
network 10.0.0.0
network 192.168.10.1 0.0.0.0
the vpn is required for security reasons
please John can you answer my question regarding the configuations of GRE over IPsec:
- where shall I apply crypto map?
- access list required??
11-04-2008 02:47 PM
That would explain why your routes are showing up :-)
You only need to apply the crypto map on the outside interface.
In your acl, you would permit gre, esp, and udp eq isakmp (500) into your public interface.
Since you're on a leased line, you don't need an ACL, but I would think you would want one.
Have you done a sh crypt session to see if you have an SA established with the other side? Your tunnels may not even be up. You could also do a sh crypt isakmp sa to check.
You don't need to include your internal network in the acl that's applied on the outside interface. You WILL need to, of course, apply it to the acl to match the traffic in your crypto map though.
--John
11-04-2008 02:58 PM
**so the routing protocol works over the leased line without vpn and the traffic that I'm interested to be encrypted will be send over the ipsec vpn....
**j.blakley the vpn is up and working I verified that using the different commands....
** for gre over ipsec I see some example on cisco site that apply crypto on the tunnel & physical interface???
11-04-2008 03:02 PM
"**so the routing protocol works over the leased line without vpn and the traffic that I'm interested to be encrypted will be send over the ipsec vpn...."
Yes, exactly. But then if you are securing the data with a VPN tunnel for security reasons do you need to secure EIGRP updates as well ?
If so run GRE as suggested by John. If not you can either
1) run EIGRP as it is now
2) Don't run EIGRP at all ie. remove the 192.168.x.x network statement from under the router eigrp config.
Note that you don't need a route for the interesting traffic of your VPN so if this is all that is going down the leased line you may not need a dynamic routing protocol.
Jon
11-05-2008 06:42 AM
You need to apply the crypto map on your serial interface. The tunnel interfaces are virtual.
--John
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide