09-25-2021 12:22 AM - edited 09-25-2021 01:22 AM
09-25-2021 12:33 AM - edited 09-25-2021 12:40 AM
The Tunnel interface is a Route Based VPN which uses the traffic selector of 0.0.0.0/0.0.0.0 to establish the IPSec SA, static/dynamic routing routes traffic over the tunnel.
The crypto map is a Policy Based VPN which uses the traffic selector as defined in the crypto ACL, in your example whatever networks defined in "D-RC-MH-ACL".
The peer devices need to either mirror the traffic selectors as defined in the ACL if using Policy Based VPN or both use Route Based VPN.
If you only changed one side to use a tunnel interface and the peer is using a crypto map, then the traffic selectors will be mismatched and that might explain why the tunnel fails to establish.
09-25-2021 01:18 AM
Thanks I did just notice when using the Tunnel mode I had this and wondered if that is why phase 2 failed.
I saw a:
I had:
ip route 192.168.1.0 255.255.255.0 Tunnel20
ip route 192.168.2.0 255.255.255.0 Tunnel20
ip route 192.168.3.0 255.255.255.0 Tunnel20
ip route 192.168.4.0 255.255.255.0 Tunnel20
ip route 192.168.5.0 255.255.255.0 Tunnel20
ip route 192.168.6.0 255.255.255.0 Tunnel20
ip route 192.168.7.0 255.255.255.0 Tunnel20
ip route 10.253.8.0 255.255.255.0 Tunnel20
ip route 10.253.9.0 255.255.255.0 Tunnel20
Should of been:
ip route vrf VR-D_RCC 192.168.1.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 192.168.2.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 192.168.3.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 192.168.4.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 192.168.5.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 192.168.6.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 192.168.7.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 10.253.8.0 255.255.255.0 Tunnel20
ip route vrf VR-D_RCC 10.253.9.0 255.255.255.0 Tunnel20
09-25-2021 02:55 AM - edited 09-25-2021 02:56 AM
@Andrew White incorrect static routes would explain if no traffic was encrypted and sent over a tunnel, not why Phase 2 failed to establish in the first place.
09-25-2021 03:04 AM - edited 09-25-2021 03:06 AM
Thanks so it comes down to a mismatch in SAs where they might of had 5 subnets configured and we had say 6 if mode were using tunnel mode?
09-25-2021 03:24 AM - edited 09-25-2021 12:59 PM
@Andrew White Yes it's a problem with SAs, if using a tunnel you are sending 0.0.0.0/0.0.0.0 and the peer is sending and expecting what is defined in their ACL. You need to reconfigure the peer device to use Route Based VPN with a tunnel interface or carry on using the policy based VPN.
In you example the first 5 SAs would be established, but because one of the peers hasn't configured the 6th network, no SA pair will be established for that. For each line in the crypto ACL there will be a pair of SAs (inbound and outbound) assuming traffic is sent to bring up the tunnel.
When using a tunnel interface there will only be a pair of IPSec SAs, because the SA is established using 0.0.0.0/0.0.0.0 not the more specific networks as defined in a crypto map ACL.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide