Routing OSPF on a VRF with Tunnel GRE ISAKMP

Hello

I'm trying to implement a routing OSPF on a VRF using GRE Tunnel with ISAKMP encryption.

Almost everything works fine:

1 OSPF routing incl. VRF - perfect

2. distribution of routing OSPF using the GRE Tunnel and VRF - perfect

3 ISAKMP encryption - I think I've done one or several mistackes.

On the attaced file, you might find the Excel sheet, which includes router configurations and a scetch of netzwork.

I would be very happy if someone could solve my problem or give me a hint.

Thank you very much.

Hi Kai,

your key ring is not in the good vrf - note that there is a difference between the FVRF and the IVRF, see

In case you, ISAKMP traffic is sent on / arriving on the interface F0/1.10 so the FVRF is the global vrf, and therefore the set of keys should be in global vrf.

In other words replace this:

VRF crypto keyring Customer_10_Keyring Customer_10

with:

door-key crypto Customer_10_Keyring

BTW, the above document also has an example on how to use 'tunnel of protection', so you no longer have to use a card encryption. Actually I'm not 100% if it is supported to the GRE/IPsec with VRF without using protection tunnel, so maybe try that if you still have problems.

HTH

Herbert

Tags: Cisco Security

Similar Questions

  • VPN site to Site with tunnel GRE on SAA

    Hi all

    I have a firewall of series ASA5500 and built a vpn site-to site on it with my counterpart. Now that my side wishes to receive messages of multicast on the other side through the tunnel WILL on the VPN Site to Site built.

    I know that the ASA5500 series cannot act as a GRE tunnel endpoint. Do we need to add a cisco firewall the router to receive multicast messages? Or can we just do the free WILL pass through the firewall on a computer or server?

    Thank you

    You are right that the ASA cannot put an end to the GRE Tunnel. You need a second device behind the ASA to complete that. Usually a router is used for this. But it doesn't matter what type of device, it's that the GRE tunnel long is supported. So it could be also a Linux-box or something like that. Personally, I'd use a router IOS for this.

    Sent by Cisco Support technique iPad App

  • OSPF in VRF with the same area ID.

    Hi all

    On a PE MPLS/VPN router, I configured OSPF as the routing PE Protocol / THIS.

    I configured several OSPF (one for each VRF) process.

    But if I have several customers who use the same ID in OSPF area on the side, can I set up the same area ID for multiple OSPF processes on the side of PE? Of course, all these areas are independent and I don't want to see customer1 routes into the OSPF customer2!

    In the following example, I have 2 clients. Each client has 2 sites and has a backbone OSPF area which spreads across 2 sites. For each customer, I want to interconnect its 2 sites and extend the dorsal area OSPF MPLS.

    Customer1 OSPF backbone area is different from that of customer2, although the ID is the same...

    Here is an example of configuration of the EP:

    G0/1 interface

    IP vrf forwarding customer1

    10.1.1.1 IP address 255.255.255.0

    !

    G0/2 interface

    IP vrf forwarding customer2

    10.1.2.1 IP address 255.255.255.0

    !

    !

    router ospf 1 vrf customer1

    Network 10.1.1.0 0.0.0.255 area 0

    !

    router ospf 2 vrf customer2

    Network 10.1.2.0 0.0.0.255 area 0

    Will not have problems if I use the same area ID here?

    Thanks for your help!

    Hello Sam,.

    You will not face any problem because you have configured cust1 and cust2 under vrf instance in ospf. There will be no

    mix with cust1 cust2 roads.

    In addition to this, also set up the id of the field (a 32 unique ip address) under process ospf for each customer. The reason why if you configure the ospf process

    ID 1 for cust1 at the end and if configure you the process id 2 for the same client on the spread of roads from start to finish B will be considered

    inter-area at the B end

    router ospf 1 vrf customer1

    field id 1.1.1.1 OSPF > keep this even to this vrf on each site

    Network 10.1.1.0 0.0.0.255 area 0

    Hope this is useful

    Concerning

    Mahesh

  • Problem with IPSec GRE tunnel

    Hello, I have a radio link with a branch, but the link to the provider is not approved to set up a Tunnel GRE + IPSec, but I get that this log in my router.

    % CRYPTO-4-PKT_REPLAY_ERR: decrypt: re-read the verification failed

    The topology is:

    Router 1 C3825 IOS 12.4 (25f) Fa0/2/2 - link radio - router 2 C3825 IOS 15.1 (4) M4 Gi0/1

    I get the logs into the Router 1 only.

    Configurations are:

    Router 1:

    crypto ISAKMP policy 1

    BA aes

    md5 hash

    preshared authentication

    Group 2

    ISAKMP crypto key Andina12 address 172.20.127.114

    invalid-spi-recovery crypto ISAKMP

    !

    !

    Crypto ipsec transform-set TS aes - esp esp-md5-hmac

    !

    Profile of crypto ipsec protected-gre

    86400 seconds, life of security association set

    game of transformation-TS

    interface Tunnel0

    Description IPSec Tunnel of GRE a Víbora

    bandwidth 2000

    IP 172.20.127.117 255.255.255.252

    IP 1400 MTU

    IP tcp adjust-mss 1360

    tunnel source 172.20.127.113

    tunnel destination 172.20.127.114

    protection ipsec profile protected-gre tunnel

    interface FastEthernet0/2/2

    Description RadioEnlace a Víbora

    switchport access vlan 74

    bandwidth 2000

    No cdp enable

    interface Vlan74

    bandwidth 2000

    IP 172.20.127.113 255.255.255.252

    Router eigrp 1

    network 172.20.127.116 0.0.0.3

    Router 2:

    crypto ISAKMP policy 1

    BA aes

    md5 hash

    preshared authentication

    Group 2

    ISAKMP crypto key Andina12 address 172.20.127.113

    !

    !

    Crypto ipsec transform-set TS aes - esp esp-md5-hmac

    !

    Profile of crypto ipsec protected-gre

    86400 seconds, life of security association set

    game of transformation-TS

    interface Tunnel0

    Description IPSec Tunnel of GRE a CSZ

    bandwidth 2000

    IP 172.20.127.118 255.255.255.252

    IP 1400 MTU

    IP tcp adjust-mss 1360

    tunnel source 172.20.127.114

    tunnel destination 172.20.127.113

    protection ipsec profile protected-gre tunnel

    interface GigabitEthernet0/1

    Description Radio Enlace a CSZ

    bandwidth 2000

    IP 172.20.127.114 255.255.255.252

    automatic duplex

    automatic speed

    media type rj45

    No cdp enable

    Router eigrp 1

    network 172.20.127.116 0.0.0.3

    Thanks for the help.

    Yes, you can have just as configured:

    Crypto ipsec transform-set esp - aes TS

    transport mode

    Be sure to change it on both routers.

  • SA520w routing through site-to-site VPN tunnels

    I have several offices that are connected using site-to-site VPN tunnels and all will use the SA520W (firmware 2.1.18). I currently have 3 routers in place, router tunnels created for the router B and c of router. I need assistance with the configuration to allow the guests to router site B get to the router site C. I have attempted to add a static route, but get a destination unreachable host trying to ping. Also, if I connect to the router site has via the Cisco VPN client, I'm not able to get resources on each site, B, or C.

    A - the site 10.10.0.0/24

    Site B - 10.0.0.0/24

    Site of the C - 10.25.0.0/24

    Any help is greatly appreciated.

    So, that's what you have configured correctly?

    RTR_A

    ||

    _____________ || ___________

    ||                                            ||

    RTR_B                                RTR_C

    Since there is no tunnel between B and C there is no way for us past that traffic through RTR_A for two reasons. The most important reason is that subnet 10.25.0.0/24 (rtr_c) is not allowed to pass through the IPSec tunnel (it's okay to IPSec?) of rtr_a ==> rtr_b. You can't just add a statement of road because your addresses are not routable which is the reason why it fails.

    Your only option is to create another tunnel between rtr_b and rtr_c. This may not be the ONLY option, but you should get what you need.

    I hope this helps.

  • No access to Internet with Tunneling active split

    Hi all

    We are facing a problem with tunneling split. Our VPN profile has split the tunnel enabled with only networks allowed to enter the tunnel and the internet traffic is going on locally. Now it works fine almost 90% of users, but some users are unable to access internet when they connected to the VPN. Intranet works very well. Here are some observations from the affected user's machine:

    1. when trying to ping any public FQDN (for example google.com), it is resolved, but when I try to ping with the IP address that it works.

    2. most users access internet VPN has the House, wireless networks usually network 192.168.1.0/24.

    3. this question is only met by some users, other users who also connect to VPN via WiFi at home can successfully both internet & intranet access.

    4 road print machine users watch WiFi router default gateway (192.168.1.1 or private IP). DNS is also the same.

    5A took a capture of packets of users on both adapter AnyConnect & WiFi adapter machine. After analysing captures what we have seen that the public DNS requests are not considered in making that ran on WiFi adapter.

    All guess what might be the problem?

    Any help will be appreciated.

    Thank you.

    Kind regards

    Gerard

    Gaurav,

    Have you tried to disable the IPv6 option under the physical card?

  • CP1525nw: new router: cp1525nw wifi install fails with the vague error message

    Product: HP Laserjet Pro cp1525nw

    OS: WIndows 8.1

    Hardware: Computer Asus laptop

    Recently received new router from Verizon (FIOS), model FQG1100 BHR4 router

    Purchase printer in 2012.

    Printer has worked with the old router; It will not communicate with the new router.

    For four days I deleted the printer from the laptop several times and tried to reinstall using the wifi. Installation instructions say to run the CD, select wifi, connect the USB cable when prompted, configure, remove the cable when prompted.

    When I attach the USB cable, Setup starts, but it expires ("taking too long") or fails with the vague message about not finding the product. I'm never invited to an SSID.

    I tried a USB installation and it worked; If the USB cable is good.

    Share print files & Windows is activated.

    I tried to re - adjust the printer by default and insured menu wifi said 'ON' for the wifi.

    I run a wireless network test report:

    SWITCH for wireless, wireless and security.

    Failure of network name (SSID found).

    DO NOT RUN for: printer settings consistent with the settings of the wireless router, no filtering, connected, the signal strength, other networks detected.

    Wireless netwrorks detected: 9

    I note the router label does not say "SSID", but said "ESSID".

    I have ideas for what to try.

    Please post here or send message to [personal information deleted]

    Last night I finally got to work.  I removed the printer entirely from the PC and rebooted. I turned off the printer. I ran a cable to the router (cable modem). I have reset the router, which then assigned an IP address to the printer. I changed the security settings on the router to use WEP instead of WPA. I ran the HP printer, Setup - and he finally presented me with the screen to "provide the SSID.  The program is run properly. I printed a test page. I changed the router security to WPA2. I printed a test page.     I tried to restart it and reprinted.  I also tried to remove the cable and then print again - printing failed.

    In short, I needed to do two things: connect a cable and change the router temporarily WEP for installation.

    In my case, my printer is close enough to the router with the cable.  A bit disappointing that the true wireless will not work, but I can print wireless from my laptop.

    I saw how many people have had the same problem, I had, and how much of HP is of any help to solve this problem.  I am convinced that the printer has a defect.  I hope that my posts will be useful to a few people having the same problem.

  • How to associate policies crypto with tunnel-group?

    Hi, when I review the configuration of the VPN from point to point, I have a question. The ASA has three peer-to-peer VPN configuration. So, there are also three groups of tunnel in there. My question is how each VPN to ensure encryption policy tunnel-group? In the anther Word, what encryption policy associated with tunnel-group? Thank you.

    This is the phase 1, they work from top to bottom.  When you try to negotiate the tunnel between two counterparts, in the background, they send all of your policies and according to which is first (from top to bottom) is used.

    For example.

    If your counterpart device uses (3des, md5, pre-shared key and group 2), it will not match the policy 1 and the rest of the policy will not be considered.

    Kind regards

    Sandra

  • Client VPN with tunneling IPSEC over TCP transport does not

    Hello world

    Client VPN works well with tunneling IPSEC over UDP transport.

    I test to see if it works when I chose the VPN client with ipsec over tcp.

    Under the group policy, I disabled the IPSEC over UDP and home port 10000

    But the VPN connection has failed.

    What should I do to work VPN using IPSEC over TCP

    Concerning

    MAhesh

    Mahesh,

    You must use "ikev1 crypto ipsec-over-tcp port 10000.

    As crypto isakmp ipsec-over-tcp work on image below 8.3

    HTH

  • 1841 can route between tunnel GRE and IPSEC tunnel?

    Hello everyone!

    See the image below.

    Main office (10.0.1.0/24 LAN) and branch (10.0.2.0/24 LAN) are connected through the GRE tunnel.

    The third office (10.0.3.0/24) is attached to the second branch via IPSEC.

    Is there the way to establish the connection between the third and the main office through cisco 1841?

    Is it possible to perform routing, perhaps with NAT?

    In fact we need connection with a single server in the main office.

    Thank you

    Hello

    It is possible to build this configuration.

    the IPSEC connection between 10.0.3.x and 10.0.2.x should also encapsulate the traffic to main office.

    Steps to follow:

    Central office, to shift traffic to 10.0.3.x above the GRE tunnel.

    The second part, add the 10.0.3.x - 10.0.1.x selection of traffic to the ACL IPSEC with the third

    The third part, add the 10.0.3.x - 10.0.1.x selection of traffic to the ACL IPSEC with the second pane.

    Please rate if this helped.

    Kind regards

    Daniel

  • Tunnel GRE / IP Sec VPN firewall between the router Cisco and Fortigate

    Hello

    Can I do GRE Tunnel / VPN IP Sec between Cisco router and Fortigate Firewall?

    Thank you

    Hi zine,.

    As long as the Fortigate device support GRE over IPSEC, you will be able to create the tunnel between these 2 devices.

    Here is the config for the Cisco Site:

    https://supportforums.Cisco.com/document/16066/how-configure-GRE-over-IPSec-tunnel-routers

    Happy holidays!

    -Randy-

  • Consciousness VRF IPSEC tunnel

    Hi all

    I have a router with internet I need to run vrf aware ipsec. I have primary and secondary tunnels at the remote end. I'm using public ip addresses on the internal movement of the source. They'll be BGP peering over the tunnels. Please advise on attached configs. I don't have the ability to run VTI currently with the remote client.

    Thanks in advance

    You use pre-shared keys based on IP addresses, in order to get rid of:

    crypto isakmp identity hostname
    You need not use of hindsight. You can make the tunnel source external IP address (in the 'internet' vrf). Then just add a "tunnel key x" on each tunnel, where 'x' uniquely identifies the tunnel.
  • Router (IPSec)-> INTERNET-> Router (IPsec) where to put the TUNNEL IP POOL?

    Hello

    I'm still learning the VPN (IPsec), I was able to create a tunnel between my PC and my router, but now I want to connect two routers:

    F0/1=192.168.0.1 ROUTER A-> INTERNET-> ROUTER B F0/1=192.168.10.1

    Both routers receive an IP address from my ISP, I can't do a ping to a site at the other site, I mean, I am able to PING ROUTER A from ROUTER B with the ISP addresses and otherwise.

    Two ROUTERS have the same configuration, except for the IP addresses and the ACL, they are opposite.

    I think I know what I did wrong, but I don't know how to solve: the TUNNEL need also an IP from a POOL where should I put up, the ROUTER A or ROUTER B?

    ROUTER

    version 12.4

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    router host name

    !

    boot-start-marker

    boot-end-marker

    !

    No aaa new-model

    IP cef

    !

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    Group 2

    ISAKMP crypto key cisco address 81.83.201.BB

    !

    !

    Crypto ipsec transform-set esp-3des RIGHT

    !

    router_A_to_router_B 1000 ipsec-isakmp crypto map

    set of peer 81.83.201.BB

    transformation-RIGHT game

    match address 101

    !

    interface FastEthernet0/0

    DHCP IP address

    automatic speed

    full-duplex

    router_A_to_router_B card crypto

    !

    interface FastEthernet0/1

    the IP 192.168.0.1 255.255.255.0

    automatic speed

    full-duplex

    !

    !

    no ip address of the http server

    no ip http secure server

    !

    access-list 101 permit ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255

    !

    !

    control plan

    !

    Line con 0

    Speed 115200

    line to 0

    line vty 0 4

    !

    !

    end

    ROUTER B

    version 12.4

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    router host name

    !

    boot-start-marker

    boot-end-marker

    !

    No aaa new-model

    IP cef

    !

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    Group 2

    ISAKMP crypto key cisco address 81.83.201.AA

    !

    !

    Crypto ipsec transform-set esp-3des RIGHT

    !

    router_B_to_router_A 1000 ipsec-isakmp crypto map

    set of peer 81.83.201.AA

    transformation-RIGHT game

    match address 101

    !

    interface FastEthernet0/0

    DHCP IP address

    automatic speed

    full-duplex

    router_B_to_router_A card crypto

    !

    interface FastEthernet0/1

    IP 192.168.10.1 255.255.255.0

    automatic speed

    full-duplex

    !

    !

    no ip address of the http server

    no ip http secure server

    !

    access-list 101 permit ip 192.168.10.0 0.0.0.255 192.168.0.0 0.0.0.255

    !

    !

    control plan

    !

    Line con 0

    Speed 115200

    line to 0

    line vty 0 4

    !

    !

    end

    !

    !

    !

    !

    !

    !

    Best regards

    Didier

    Didier, there are a number of things missing in your config file to make it work, what I can say fa0/1 is inside and the fa0/0 are outdoors. There is no NAT translation to activate the computers inside the network, allowing access to the Internet. You will also need to exclude the EIGRP NAT roads in order to reach the remote network. Each router must have a default gateway to the Internet, this should be done with the following command:

    IP route 0.0.0.0 0.0.0.0 fa0/0 dhcp

    This will use the default gateway of the DHCP server that assigns IP address on fa0/0. Once that each router has a path to another and the tunnel connects EIGRP will handle the rest given the information to the router 90, this is the spectacle of one of my spoke routers route:

    NTR-2620XM #show ip route
    Code: C - connected, S - static, mobile R - RIP, M-, B - BGP
    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone
    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2
    E1 - OSPF external type 1, E2 - external OSPF of type 2
    i - IS - Su - summary IS, L1 - IS - IS level 1, L2 - IS level - 2
    -IS inter area, * - candidate failure, U - static route by user
    o - ODR, P - periodic downloaded route static

    Gateway of last resort is to network 0.0.0.0 0.0.0.0

    65.0.0.0/32 is divided into subnets, subnets 1
    C 65.14.24.190 is directly connected, Dialer0
    172.16.0.0/32 is divided into subnets, subnets 1
    D EX 172.16.50.31 [170/3074560] via 172.19.8.1, 20:04:58, Tunnel0
    172.19.0.0/24 is divided into subnets, subnets 1
    C 172.19.8.0 is directly connected, Tunnel0
    10.0.0.0/8 is variably divided into subnets, subnets 14, 6 masks
    D EX 10.13.13.8/29 [170/2818560] via 172.19.8.1, 20:04:58, Tunnel0
    D EX 10.11.7.0/28 [170/2818560] via 172.19.8.1, 20:04:58, Tunnel0
    D 10.13.13.0/29 [90/2818560] via 172.19.8.1, 20:04:58, Tunnel0
    C 10.19.9.0/27 is directly connected, Vlan200
    C 10.19.8.0/24 is directly connected, Vlan100
    C 10.19.10.0/28 is directly connected, Vlan900
    D EX 10.20.7.0/24 [170/2818560] via 172.19.8.1, 20:04:58, Tunnel0
    D [90/3097600] 10.22.7.0/24 through 172.19.8.1, 17:34:52, Tunnel0
    D 10.37.4.0/24 [90/3074560] via 172.19.8.1, 20:04:59, Tunnel0
    D 10.15.50.0/24 [90/3074560] via 172.19.8.1, 20:04:59, Tunnel0
    D EX 10.24.40.0/24 [170/2818560] via 172.19.8.1, 20:04:59, Tunnel0
    D 10.12.85.0/24 [90/3074560] via 172.19.8.1, 20:04:59, Tunnel0
    C 10.19.9.192/26 is directly connected, Vlan500
    D EX 10.244.0.0/22 [170/2818560] via 172.19.8.1, 20:04:59, Tunnel0
    74.0.0.0/32 is divided into subnets, subnets 1
    C 74.23.201.24 is directly connected, Dialer0
    S * 0.0.0.0/0 is directly connected, Dialer0

    All designated routes D are dynamic routes drawn other routers on the DMVPN EIGRP. It will propagate the routing table and they point to the appropriate star. If you follow the example that I gave you, you will have a functional DMVPN.

    See you soon,.

    Sam

  • Network local tunnels GRE

    We have several of our network devices which are spread over several buildings. These devices are unmanaged to the extent of the patch and antivirus levels. I thought I'd be able to install a second VLAN on each switch these devices are connected to the, then have a GRE tunnel to pass traffic to a pair of 6500's, which are protected by an IPS.

    The installation would be a 2950 with two VLANS of shared resources for a pair of distribution layer 6500's. These 6500's connect in the core of the network. Off the kernel would be this pair of 6500 protected IPS.

    In our laboratory I'be put in place, but there are problems to traffic, I want to isolate to travel through the tunnel. This type of configuration is possible? all I see examples of remote sites, connection to the main network.

    Thank you

    John

    I think Martin is asking a very good question on the routing logic. In the original post John did not indicate nothing about how it has been implemented for routing.

    It seems to me that if John wants the traffic of a VLAN specific through the GRE tunnel and traffic not to go this way, that it's a fairly obvious situation for Policy Based Routing. ACB could specify that traffic from a VLAN individual should have a section on the other end of the tunnel. This would leave all other traffic to use the normal routing table and would relieve the need to run a dynamic routing through the tunnel (which would eliminate the possibility of other traffic is routed through the tunnel).

    HTH

    Rick

  • How to troubleshoot an IPSec tunnel GRE?

    Hello

    My topology includes two firewalls connected through the Internet "" (router) and behind each firewall, there is a router.

    The routers I configured a GRE tunnel that is successful, then I configured an IPsec tunnel on the firewall.

    I does not change the mode to transport mode in the transform-set configuration.

    Everything works; If I connect a PC to the router, it can ping another PC on the other router. However if I change mode of transport mode that they cannot.

    I was wondering how can I ensure that the IPSec tunnel WILL really works? How can I fix it or package tracking?

    Thank you.

    I was wondering how can I ensure that the IPSec tunnel WILL really works? How can I fix it or package tracking?

    To verify that the VPN tunnel works well, check the output of
    ISAKMP crypto to show his
    Crypto ipsec to show his

    Here are the commands of debug
    Debug condition crypto x.x.x.x, where x.x.x.x IP = peer peer
    Debug crypto isakmp 200
    Debug crypto ipsec 200

    You will see ACTIVE int the first output and program non-zero and decaps on the output of the latter.

    For the GRE tunnel.
    check the condition of the tunnel via "int ip see the brief.

    In addition, you can configure keepalive via the command:

    Router # configure terminal
    Router (config) #interface tunnel0
    Router(Config-if) 5 4 #keepalive

    and then run "debug keepalive tunnel" to see packets hello tunnel going and coming from the router.

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

Maybe you are looking for