09-16-2018 08:22 PM - edited 02-21-2020 09:28 PM
So i have a existing and in production DMVPN provided via vpls from ISP 1 with 8 spokes. I have a new vpls circuit from ISP 2 that i and trying build tunnels for to migrate over to in the coming weeks. I am using the same transformation set from the existing tunnels. On ISP2 i can only ever get one hub to connect to the tunnel all other hubs continue to fail on phase one.
@ HUB
crypto isakmp policy 1
authentication pre-share
!
crypto isakmp policy 10
crypto isakmp key Cisco123 address 0.0.0.0 0.0.0.0
!
!
crypto ipsec transform-set DMVPN esp-aes esp-md5-hmac
mode transport
!
crypto ipsec profile DMVPN
set security-association lifetime seconds 1800
set transform-set DMVPN
set pfs group2
interface Tunnel1
bandwidth 1000
ip address 10.254.254.1 255.255.255.0
no ip redirects
ip mtu 1400
no ip next-hop-self eigrp 300
ip flow ingress
ip flow egress
ip nhrp map multicast dynamic
ip nhrp network-id 1
ip nhrp holdtime 450
ip tcp adjust-mss 1360
no ip split-horizon eigrp 300
delay 1000
tunnel source GigabitEthernet0/2
tunnel mode gre multipoint
tunnel key 677067637
tunnel protection ipsec profile DMVPN
!
!
interface Tunnel2
ip address 10.253.253.1 255.255.255.0
no ip redirects
ip mtu 1440
no ip next-hop-self eigrp 300
ip flow ingress
ip flow egress
ip nhrp map multicast dynamic
ip nhrp network-id 2
no ip split-horizon eigrp 300
tunnel source GigabitEthernet0/1
tunnel mode gre multipoint
tunnel key 568749358
tunnel protection ipsec profile DMVPN
interface GigabitEthernet0/0
description Inside
ip address 10.100.0.39 255.255.252.0
duplex auto
speed auto
!
!
interface GigabitEthernet0/1
description VPLS ISP 2
ip address 10.100.25.2 255.255.255.252
duplex auto
speed auto
!
interface GigabitEthernet0/2
description VPLS ISP1
ip address 10.100.20.2 255.255.255.252
duplex auto
speed auto
IPv4 Crypto ISAKMP SA
dst src state conn-id status
10.100.20.2 10.100.20.26 QM_IDLE 9004 ACTIVE
10.100.20.2 10.100.20.6 QM_IDLE 9006 ACTIVE
10.100.25.2 10.100.25.22 MM_SA_SETUP 0 ACTIVE
10.100.25.2 10.100.25.22 MM_NO_STATE 0 ACTIVE (deleted)
10.100.20.2 10.100.20.34 QM_IDLE 9002 ACTIVE
10.100.20.2 10.100.20.22 QM_IDLE 9009 ACTIVE
10.100.20.2 10.100.20.10 QM_IDLE 9001 ACTIVE
10.100.25.2 10.100.25.26 QM_IDLE 9005 ACTIVE
10.100.20.2 10.100.20.38 QM_IDLE 9008 ACTIVE
10.100.20.2 10.100.20.18 QM_IDLE 9007 ACTIVE
10.100.20.2 10.100.20.14 QM_IDLE 9003 ACTIVE
10.100.25.2 10.100.25.6 MM_SA_SETUP 0 ACTIVE
10.100.25.2 10.100.25.6 MM_NO_STATE 0 ACTIVE (deleted)
@ Spoke
crypto isakmp policy 1
authentication pre-share
crypto isakmp key Cisco123 address 0.0.0.0 0.0.0.0
crypto isakmp invalid-spi-recovery
!
!
crypto ipsec transform-set DMVPN esp-aes esp-md5-hmac
mode transport
!
crypto ipsec profile DMVPN
set security-association lifetime seconds 1800
set transform-set DMVPN
set pfs group2
!
!
!
!
!
!
interface Tunnel2
ip address 10.254.254.2 255.255.255.0
no ip redirects
ip hold-time eigrp 300 120
ip nhrp map multicast 10.100.20.2
ip nhrp map 10.254.254.1 10.100.20.2
ip nhrp network-id 1
ip nhrp nhs 10.254.254.1
ip nhrp server-only
tunnel source GigabitEthernet0/2
tunnel mode gre multipoint
tunnel key 677067637
tunnel protection ipsec profile DMVPN
!
!
interface Tunnel3
ip address 10.253.253.2 255.255.255.0
no ip redirects
ip hold-time eigrp 300 120
ip nhrp map 10.253.253.1 10.100.25.2
ip nhrp map multicast 10.100.25.2
ip nhrp network-id 2
ip nhrp nhs 10.253.253.1
ip nhrp server-only
tunnel source GigabitEthernet0/1
tunnel mode gre multipoint
tunnel key 568749358
tunnel protection ipsec profile DMVPN
!
!
interface GigabitEthernet0/1
description VPLS ISP 2
ip address 10.100.25.6 255.255.255.252
duplex auto
speed auto
!
!
interface GigabitEthernet0/2
description VPLS ISP1
ip address 10.100.20.6 255.255.255.252
duplex auto
speed auto
I have reloaded my hub and every time i connect to a different spoke on the second tunnel but i can't ever get more than one to connect.
Solved! Go to Solution.
09-18-2018 02:37 PM
I was able to get the tunnels up and working. As the isp was handing it off on layer 2 subnetting all of my interfaces on a /30 was giving me a lot of broadcast traffic on eigrp packets. I re schemed my outbound interfaces on single /24 and everything is up and up.
09-17-2018 07:03 AM
09-18-2018 07:07 AM
I removed the tunnel protection to see if i could at least get the gre tunnel built and i still am only ever able to get one tunnel up at a time. It is odd.
09-18-2018 07:18 AM
09-18-2018 08:32 AM
09-18-2018 02:37 PM
I was able to get the tunnels up and working. As the isp was handing it off on layer 2 subnetting all of my interfaces on a /30 was giving me a lot of broadcast traffic on eigrp packets. I re schemed my outbound interfaces on single /24 and everything is up and up.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: