cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1961
Views
9
Helpful
9
Replies

IPSec with Dynamic routing- Explanation

nwekechampion
Level 3
Level 3

Hi Guys,

 

Need some clarification on this.

 

Some cisco docs say IPSec cannot work with dynamic routing as it only supports unicast traffic.

Some documents say that it can using VTI's can anyone elaborate this, please?

 

Thanks 

1 Accepted Solution

Accepted Solutions

@nwekechampion

Policy Based VPNs have been around longer and have wider support on the hardware/software. Route Based VPNs (static VTIs) have only been supported on Cisco ASA since version 9.7 and FTD since 6.7 and only last year in version ASA 9.19 and FTD 7.3 did Cisco introduce Dynamic VTI functionality. Cisco routers have the widest support for VPNs, although crypto maps are depreciated from 17.6.6. Route Based VPNs are the preferred type of VPN to deploy.

Policy Based and Route Based VPN are standards of VPN supported by vendors, not just Cisco.

Policy Based VPNs might be preferred in smaller environments or less complex environments which do not use a routing protocol. Personal preference of the network administrator configuring the VPN might influence the design.

View solution in original post

9 Replies 9

@nwekechampion a Policy Based VPN does not support multicast and will not allow you to run a routing protocol, however a Route Based VPN using a VTI/DVTI/GRE over IPSec VPN supports multicast and allows you to run a dynamic routing protocol over an IPSec VPN tunnel.

Cisco Routers and ASA/FTD firewalls support both Policy and Route Based VPNs.

Thanks  @Rob Ingram ,

So why does anyone even bother to use Policy based VPN if it has this obvious limitation?

What are the use cases for Policy-based VPN?

Why did Cisco use/support  policy based vpns in the first place?

What is it about policy based vpn that makes it incompatible with Dynamic routing (multicast)?

@nwekechampion

Policy Based VPNs have been around longer and have wider support on the hardware/software. Route Based VPNs (static VTIs) have only been supported on Cisco ASA since version 9.7 and FTD since 6.7 and only last year in version ASA 9.19 and FTD 7.3 did Cisco introduce Dynamic VTI functionality. Cisco routers have the widest support for VPNs, although crypto maps are depreciated from 17.6.6. Route Based VPNs are the preferred type of VPN to deploy.

Policy Based and Route Based VPN are standards of VPN supported by vendors, not just Cisco.

Policy Based VPNs might be preferred in smaller environments or less complex environments which do not use a routing protocol. Personal preference of the network administrator configuring the VPN might influence the design.

the timeline 
IPSec support only unicast not multicast so it can not support Dynamic routing 
GRE/IPSec solve the problem of multicast so now we can run dynamic routing with GRE/IPsec but this give more overhead to packet 
VTI which build on pure IPsec support both unicast and multicast and hence it can use for dynamic routing 

you have these three option select one of them depend on your platform
 

@Thankds @MHM Cisco World ,

Why did Cisco use/support  policy based vpns in the first place?

Would there be an obvious use case for policy-based VPN?

Regards

IPSec is old and wide used by all vendor, 
which one  is simple in config ? IPsec for P2P sure simple than VTI 

M02@rt37
VIP
VIP

Hzllo @nwekechampion 

Traditionally, IPSec VPNs have been configured using point-to-point tunnels, where each tunnel is manually configured between two endpoints. In this scenario, dynamic routing protocols cannot be used because the routing updates are broadcast or multicast traffic, and IPSec only supports unicast traffic.

However, with the introduction of Virtual Tunnel Interfaces [VTI], IPSec can be used with dynamic routing protocols. VTI allows IPSec to be configured as a virtual interface that supports dynamic routing, effectively eliminating the need for point-to-point tunnels.

With VTI, IPSec can be configured to encrypt traffic between two endpoints, while still allowing the use of dynamic routing protocols to exchange routing information between the endpoints. VTI works by creating a virtual interface that can be assigned an IP address and configured with routing information, just like a physical interface.

 

Best regards
.ı|ı.ı|ı. If This Helps, Please Rate .ı|ı.ı|ı.

nwekechampion
Level 3
Level 3

Thanks for clarifying guys. 
you have all been very helpful. 
Really appreciate it. 
Does anyone have any documentation that fully explains how VTI works under the hood?

Also do Vendors like Palo use VTIs for ipsec under the hood, as Plao altos seem to ipsec seem to be able to support dynamic routing. If they dont, how does it work on their platform?