i tried to use the tunnel ip address on set peer, it didnt work, put the phys address again on set peer, then i tried to use now the tunnel ip address on isakmp pre-shared key, still didnt work, so i tried both set peer and isakmp preshared key to use tunnel ip address, still didnt work. im just troubleshooting, trying to find out if this will work using tunnel ip address…
here’s the summary of what i’ve done
Working
- HQ and Branch router# set peer
-HQ and Branch router#crypto isakmp key PASS address
Not working
- HQ and Branch router# set peer
-HQ and Branch router#crypto isakmp key PASS address
Not working
- HQ and Branch router# set peer
-HQ and Branch router#crypto isakmp key PASS address
Not working
- HQ and Branch router# set peer
-HQ and Branch router#crypto isakmp key PASS address
so, overall, we must use physical address on both to get it working… or am i doing something wrong? that i cant get it to work using tunnel ip address? im just tinkering.
Using the tunnel address as the peer won’t work, in this example I’m using IPsec to protect the tunnel itself. You should use any other IP address on the remote router…a physical address or a loopback will work (if you have a route for the loopback).
HQ# show crypto isakmp sa detail
Codes: C - IKE configuration mode, D - Dead Peer Detection
K - Keepalives, N - NAT-traversal
T - cTCP encapsulation, X - IKE Extended Authentication
psk - Preshared key, rsig - RSA signature
renc - RSA encryption
IPv4 Crypto ISAKMP SA
C-id Local Remote I-VRF Status Encr Hash Auth DH Lifetime Cap.
1001 192.168.12.1 192.168.23.3 ACTIVE aes sha psk 5 00:58:42
Engine-id:Conn-id = SW:1
IPv6 Crypto ISAKMP SA
I would start by disabling IPsec, make sure your GRE tunnel is working 100% first. Check if both routers are able to reach the other’s tunnel IP address. Your GRE tunnel should be up/up.
When that works, see if you can get IPsec to work.
When we use IPsec tunnel mode, we encapsulate the original IP packet and put an AH or ESP header and new IP header in front of it. IPsec only supports unicast packets.
GRE also encapsulates IP packets and it supports multicast traffic. It adds a GRE header in front of the original IP packet and then a new IP header. You can see this in this capture file:
GRE and IPsec tunnel mode both encapsulate IP packets. GRE doesn’t offer any encryption though.
When we combine GRE and IPsec, normally we use IPsec transport mode. GRE has already added a new IP header so there’s no need for IPsec to do it again. That’s why you can use transport mode.
Are you sure that you have applied the transform set? If you still have problems, please share the relevant portions of your configuration at both ends of the VPN .
Thank for your reply. I still have problem, the configuration was follow Rene just at transform-set that I changed to ah-sha to see the packet, and the project is in attachments.
Keep in mind that even if you manually set up the transport mode, it will only function as transport mode when the traffic to be encrypted is to or from the endpoints of the tunnel, such as routing updates from one router, destined to the other router.
However, traffic that is being transferred between PCs behind the routers will still end up using tunnel mode even if we configure transport mode.
More specifically:
Host A ----------------Router1----------Internet-------------Router2----------------Host B
If we have transport mode configured between Router1 and Router2, communication between Router1 and Router2 should be transport mode. However, if host A pings to host B for example, Router1 converts the packet to tunnel mode EVEN IF you have configured transport mode.
Rene,
I have an interesting dilemma. I have a router that does not support IPSEC, however it is behind an ASA. I want to encrypt GRE Tunnel with the Cisco ASA. I have the L2L working between the loopbacks and have described interesting traffic as “permit ip” between the loopbacks. They ping each other. The gre tunnel still doesn’t come up. Am I barking up the wrong tree? It’s driving me crazy.
@Sean it is possible to encrypt GRE traffic on your ASAs where the routers are sitting behind your ASAs. What kind of access-list are you using to match your GRE traffic? You should use something like this:
access-list GRE extended permit gre host x.x.x.x host y.y.y.y
Where x.x.x.x and y.y.y.y are the IP addresses of your routers that are used to establish the GRE tunnel.
@Sina the more you do it, the easier it becomes. Some stuff like L2/L3 I do often enough to keep everything fresh in my memory. Other things (like IPsec) I also have to look up sometimes. It’s best to keep something like a notebook for yourself with notes/examples so that you can quickly look up something. Evernote works well for this.