cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3197
Views
0
Helpful
5
Replies

Cisco IOS IPSec Failover | Route-Based-VPN with HSRP

Tanveer Dewan
Level 1
Level 1

I can find IPSec vpn redundancy using Policy-Based-VPN with HSRP.

Any document that provides route-based-vpn redundancy with HSRP?

1 Accepted Solution

Accepted Solutions

Ok, I understand the question now. Sorry, I don't have any document for this task. 

I can see, that in crypto ipsec profile, which you will use under Tunnel interface configuration to enable protection, you can configure redundancy:

cisco(config)#crypto ipsec profile VTI
cisco(ipsec-profile)#?
Crypto Map configuration commands:
default Set a command to its defaults
description Description of the crypto map statement policy
dialer Dialer related commands
exit Exit from crypto map configuration mode
no Negate a command or set its defaults
redundancy Configure HA for this ipsec profile
responder-only Do not initiate SAs from this device
set Set values for encryption/decryption

cisco(ipsec-profile)#redundancy ?
WORD Redundancy group name
cisco(ipsec-profile)#redundancy MRT ?
stateful enable stateful failover


I can suggest, that it is the same as crypto map redundancy. But no documentaion or examples were found...

View solution in original post

5 Replies 5

Boris Uskov
Level 4
Level 4

Not sure, what the question is about...

As far as I know, you can use IPsec redundancy for two routers, and configure Stateful Switch Over (SSO) to synchronize IPsec databases between two routers.

This document desribes the technology:

http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-ipsec/white_paper_c11_472859.html

Thanks for the response. 

The document shows how to use HSRP with 'policy based vpn' where we use crypto acl to match interesting traffic. I on the otherhand want to use hsrp redundnacy along with 'route based vpn' where the interesting traffic is identified by a static route pointing to the tunnel interface.

Ok, I understand the question now. Sorry, I don't have any document for this task. 

I can see, that in crypto ipsec profile, which you will use under Tunnel interface configuration to enable protection, you can configure redundancy:

cisco(config)#crypto ipsec profile VTI
cisco(ipsec-profile)#?
Crypto Map configuration commands:
default Set a command to its defaults
description Description of the crypto map statement policy
dialer Dialer related commands
exit Exit from crypto map configuration mode
no Negate a command or set its defaults
redundancy Configure HA for this ipsec profile
responder-only Do not initiate SAs from this device
set Set values for encryption/decryption

cisco(ipsec-profile)#redundancy ?
WORD Redundancy group name
cisco(ipsec-profile)#redundancy MRT ?
stateful enable stateful failover


I can suggest, that it is the same as crypto map redundancy. But no documentaion or examples were found...

Hey! 

I think you are right. check this out. Its referring to the 'redundancy' command and tunnel interface both. 

http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/m1/sec-m1-cr-book/sec-cr-r2.html#wp3201756504

Ok, thanks for link.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: