07-04-2006 05:13 AM - edited 02-21-2020 02:30 PM
Hi everyone,
I'm trying to establish a GRE IPsec tunnel between two cisco routers ( 2620XM and a 836).
I've created a the tunnel interfaces on both routers as follows,
2620XM
interface Tunnel0
ip address 10.1.5.2 255.255.255.252
tunnel source x.x.x.x
tunnel destination y.y.y.y
end
836
interface Tunnel0
ip address 10.1.5.1 255.255.255.252
tunnel source y.y.y.y
tunnel destination x.x.x.x
end
and the isakmp/ipsec configuration as follows,
2620XM
crypto isakmp policy 10
hash md5
authentication pre-share
crypto isakmp key {key} address y.y.y.y no-xauth
!
!
crypto ipsec transform-set to_melissia esp-des esp-md5-hmac
!
crypto map myvpn 9 ipsec-isakmp
set peer y.y.y.y
set transform-set to_melissia
match address 101
2620XM-Router#sh ip access-lists 101
Extended IP access list 101
10 permit gre host x.x.x.x host y.y.y.y
836
crypto isakmp policy 10
hash md5
authentication pre-share
crypto isakmp key {key} address x.x.x.x no-xauth
!
!
crypto ipsec transform-set to_metamorfosi esp-des esp-md5-hmac
!
crypto map myvpn 10 ipsec-isakmp
set peer x.x.x.x
set transform-set to_metamorfosi
match address 101
836-Router#sh access-lists 101
Extended IP access list 101
10 permit gre host y.y.y.y host x.x.x.x
unfortunately i got no isakmp security associations at all and when in debugging i get this output.
CRYPTO: IPSEC(crypto_map_check_encrypt_core): CRYPTO: Packet dropped because cryptomap is currently being created -.
Any ideas why i get this result? Any assistance will be of great help
ThanKs!!!
Solved! Go to Solution.
07-17-2006 12:41 AM
Hello Rick,
You are absolutely right!! It is all right now.
Thanks a lot!!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide