04-15-2024 03:01 PM
I have a DMVPN network with 4331 hub routers. Our HQ in Memphis has a hub on AT&T, and another on Lumen. Our New York hub is also a Lumen connection. All are 500Mb up/down. We have about 35 spokes around the US that peer to all 3 routers. BGP is the routing protocol, and we're using IKEv2, SHA512, AES256, DH group 16, and PSK. The hubs send only default route to the spokes, while the spokes redistribute connected with a prefix list to prevent advertising the public IP over the private network. BGP peers are weighted at the spoke end so that one path is preferred back to the Memphis hub - that would be Lumen, see more below.
The spokes are a mix of 881, 891F, 1101, and 1111 routers. The 1000 series routers are stable to all hubs, and the routing adjacencies only go down with an actual outage. The 800 series constantly lose connection to the Memphis AT&T and the NY Lumen, but the connections to the Memphis Lumen are stable, only going down with a real outage.
This would seem to have a couple of solutions: 1) Replace all of the 800 series with ISR1000 series, or 2) determine what is wrong with these carrier connections that is causing this issue for only the 800 series routers.
Note: All routers are running the latest recommended version of IOS or IOS-XE. This issue also occurs with Eigrp and OSPF, so the routing protocol is immaterial.
Solved! Go to Solution.
04-16-2024 04:13 AM
Both tunnel use same tunnel source
Then you need to use shared keyword with ipsec profile.
Note:-you need to clear crypto to make change take effect
MHM
04-15-2024 03:12 PM
Should have mentioned that there are no bandwidth issues with any of these connections. The NY connection see very little traffic, while the Memphis ATT see less than 50% utilization peak.
04-16-2024 04:06 AM
Do you see anything interesting on the 800 routers logs?
04-16-2024 10:27 AM
Logs and debugs have proven unhelpful.
04-16-2024 04:13 AM
Both tunnel use same tunnel source
Then you need to use shared keyword with ipsec profile.
Note:-you need to clear crypto to make change take effect
MHM
04-16-2024 10:29 AM
I’ve been using a unique IPSEC profile for each tunnel interface for years, and I never thought it might be causing issues, but now that you’ve brought it back to my attention, I’ve configured a few of my 800 sites for a shared IPSEC profile. I’ll update when I know if that had any impact, which shouldn't take long since these routers lose both IKE and routing adjacency constantly.
04-16-2024 10:34 AM
Take your time
Goodluck
MHM
04-16-2024 03:43 PM
MHM, that was the issue. Using shared IPSEC profile now on all sites and the flapping has stopped completely. Thank you so much for the help.
04-16-2024 10:31 AM
Also wanted to mention that changing the tunnel protection profile command cleared the tunnels. There was no need to do it manually.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide