11-08-2015 05:45 AM - edited 03-08-2019 02:37 AM
This problem has me completely baffled I have two Cisco routers running c870-advipservicesk9-mz.124-24.T5.bin and a tunnel interface on each router. One router is configied to use FIOS and a static IP and the other used optonline and a dynamic IP, but that does not explain this behavior. I am wondering if some where someone is blocking GRE between the two providors. I am basically out of ideas. Any help would be great. I also tried multiple MTU sizes but still no luck.
Router 1
interface Tunnel11
bandwidth 10000
ip address 10.10.129.1 255.255.255.252
ip mtu 1350
ip tcp adjust-mss 1360
tunnel source 1.1.1.1
tunnel destination 2.2.2.2 (Changed to protect external IPs
tunnel mode ipsec ipv4
tunnel protection ipsec profile tunnel11
Router 2
interface Tunnel12
bandwidth 10000
ip address 10.10.129.2 255.255.255.252
ip mtu 1350
ip tcp adjust-mss 1360
tunnel source Vlan4 (This is because the ISP used DHCP)
tunnel destination 1.1.1.1 (Changed to protect external IPs
tunnel mode ipsec ipv4
tunnel protection ipsec profile tunnel12
Here is the strange part I can ping the global IP of each router from each other ding a standard and extended PING. I the counters on an external ACL increment for GRE traffic and what is most confusing is the crypto tunnel comes up but the tunnel interfaces are stuck in UP/Down . I am at a complete loss. I have also tried removing the ACL from both routers but no luck. The remote router (tunnel12) is running NAT over load on 1.1.1.1 using a route map but I specifically tried to deny any tunnel traffic in the route map which did not help.
11-08-2015 12:01 PM
Hello
Just to confirm you have connectivity between scr/dest ip of each router?
Are you able to remove IPSec and just establish a static Gre tunnel. for testing purposes. This way you can be sure it's a possible a IPSec issue or not..
res
paul
11-08-2015 05:59 PM
I tried that first and it did not work but I could ping and telnet from one router to the other. It is not related to teh crypto it is something with GRE, but thank you. Any other ideas?
11-09-2015 06:41 AM
Hello
"I could ping and telnet from one router to the other."
Just to confirm you have connectivity between src/dest address on either rtr and when you try to create a gre tunnel is dosnt establish?
ping x.x.x.x(dest ip) source y.y.y.y (scr ip)
1) Can you delete tunnel
2) debug tunnel
3) create tunnel
Post out from debug
res
Paul
11-09-2015 07:43 AM
First let me offer a clarification - with this in the configuration we are not really dealing with a GRE tunnel
tunnel mode ipsec ipv4
tunnel protection ipsec profile tunnel11
This is really Virtual Tunnel Interface which is very much like GRE but does have some differences. I have done VTI a number of times. One thing I have learned is that if there is some issue with the crypto negotiation that one tunnel, or perhaps both tunnels will be in the UP/Down state. So far we do not have enough information about the configuration of crypto and the outside interfaces to be able to identify the problem. But my guess is that the problem is more about crypto than it is about tunnel.
HTH
Rick
11-09-2015 07:54 AM
Rick
I agree with you but even without the crypto the tunnel fails to come up but what is even stranger is the crypto tunnel does establish for example (sh crypto isakmp sa) states the IPSEC tunnel is up but the tunnel interface is up/down.
11-09-2015 08:33 AM
If the tunnel fails to come up even when you remove the crypto that is interesting and may deserve investigation. Seeing the configuration of the physical interfaces and the complete routing logic would be a good place to start that investigation.
With crypto applied, as is described in the original post, we need to look at both the ISAKMP and IPSec negotiation and we need to look at both ends of the tunnel.
HTH
Rick
11-09-2015 04:11 PM
tunnel fails to come up but crypto session is QA_IDLE and stable
11-09-2015 06:24 PM
no idea why but I removed the entire tunnel config form one rouer inclusive of the crypto, put it back in and now it works. very strange.
11-10-2015 01:06 AM
Hello
Glad to hear that - However strange removing the tunnel entirely and re-adding it solved the issue?
Thanks for letting the forum know for futrue referance
res
Paul
11-09-2015 03:41 PM
Hello Richard
Fyi - My suggestion was to test.a Gre tunnel without any ipsec
it seems now by simons post he left the VTI IPSec configuration applied
The main reason for me requesting this test was to exclude IPSec and if the tunnel established as we now know it did the we could proceed in TS a possible IPSec issue
res
paul
11-09-2015 04:08 PM
I did the test w/o the crypto map and the GRE tunnel worked once I removed and added the tunnel interfaces back to the router config. I was able to Ping across the tunnel.
When I add teh crypto back to the tunnel is goen into up.down, but the crypto tunnel is active
dst src state conn-id status
x.x.x.x y.y.y.y QM_IDLE 2040 ACTIVE
11-10-2015 05:45 AM
It is very interesting that when configured as just GRE with no crypto that the tunnel works and when crypto is added it goes to UP/DOWN. That pretty clearly says that there is some issue with crypto. If the ISAKMP negotiation is successful then it sounds like it is an issue with the phase 2 IPSec negotiation. Can you provide the crypto configuration? It would also help if you post the address translation that is configured.
HTH
Rick
11-09-2015 03:20 PM
got further the tunnel came up w/o the crypto config but fails with the crypto config. the Crypto tunnel is QM-IDLE
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide