RE: VPN between loopbacks - GRE

From: Jens Petter (jenseike@start.no)
Date: Mon Nov 27 2006 - 19:02:55 ART


Wich version IOS do you use. this should not be a problem, you should not
use the crypto map on
your loopback either.. ONLY on the tunnel interface.

 

The only thing that I notice. You should only match the endpoints of your
tunnel with the GRE protocol
and not the IP protocol. So, remove that first line in your acl. And only
use :

 

permit gre <http://103.103.103.0> 103.103.103.0 <http://0.0.0.255>
0.0.0.255 <http://106.106.106.0> 106.106.106.0 <http://0.0.0.255>
0.0.0.255

 

 

Let me know

 

 

Mvh

Jens Petter Eikeland

Mob 98247550
Hipercom AS

  _____

From: Kal Han [mailto:calikali2006@gmail.com]
Sent: 27. november 2006 20:32
To: Jens Petter
Cc: Groupstudy; Cisco certification
Subject: Re: VPN between loopbacks - GRE

 

Hi

I tried what you said and it not working for me.

If it goes on the tunnel interface what will be my interesting

traffic ?

I dont know whats the order of encryption. I mean how will

the EIGRP packet pass thru converting into a gre packet /

get encrypted packed on tunnel interface. Which is first ?

 

interface Tunnel0
 ip address 36.36.36.3 255.255.255.0
 tunnel source Loopback36
 tunnel destination 106.106.106.6
 crypto map loop

 

With this on the tunnel interface, its not working.

Its only working when I apply crypto map on the physical interface.

Its working only when I put my crypto map on the physical interface

and doesnt matter whether I have it on loopback or tunnel interfaces.

 

Here are some outputs.

 

acl: (no hit counts after applying on tunnel/loopback interface)

Extended IP access list 193
***10 permit ip 103.103.103.0 0.0.0.255 106.106.106.0 0.0.0.255 *****
    20 permit gre 103.103.103.0 0.0.0.255 106.106.106.0 0.0.0.255

 

loopback interface:

interface Loopback36
 ip address 103.103.103.3 255.255.255.0
 crypto map loop <--------- no difference with/without this

Physical Interface: (no crypto map applied)

interface Serial0/0.6 point-to-point
 ip address 195.1.136.3 255.255.255.0
 ip nat outside
 ip ospf message-digest-key 1 md5 cciesec
 ntp broadcast key 1
 frame-relay interface-dlci 306

 

R3#sh ip eig nei (eigrp is running fine)
IP-EIGRP neighbors for process 123
H Address Interface Hold Uptime SRTT RTO Q Seq
Type
                                            (sec) (ms) Cnt Num

1 195.1.123.2 Fa0/0 10 1d21h 4 200 0 26

0 195.1.123.1 Fa0/0 14 1d21h 4 200 0 26

IP-EIGRP neighbors for process 36
H Address Interface Hold Uptime SRTT RTO Q Seq
Type
                                            (sec) (ms) Cnt Num
0 36.36.36.6 Tu0 12 18:06:51 1 3000 0 5

 

**************************************

crypto related outputs.

 

R3#sh cry eng conn act

  ID Interface IP-Address State Algorithm Encrypt
Decrypt

R3#
R3#sh cry isa sa
dst src state conn-id slot

R3#sh cry ipsec sa

interface: Loopback36
    Crypto map tag: loop, local addr. 103.103.103.3

   protected vrf:
   local ident (addr/mask/prot/port): (103.103.103.0/255.255.255.0/0/0)
   remote ident (addr/mask/prot/port): ( 106.106.106.0/255.255.255.0/0/0
<http://106.106.106.0/255.255.255.0/0/0> )
   current_peer: 106.106.106.6:500
     PERMIT, flags={origin_is_acl,}
    #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0
    #pkts not decompressed: 0, #pkts decompress failed: 0
    #send errors 0, #recv errors 0

     local crypto endpt.: 103.103.103.3, remote crypto endpt.: 106.106.106.6
     path mtu 1476, media mtu 1476
     current outbound spi: 0

Thanks

Kal

On 11/26/06, Jens Petter <jenseike@start.no> wrote:

Crypto map should go directly on the tunnel interface, not physical or
loopback interface. That goes for both sides... Your "crypto map local"
command still goes
to the loopback...

Mvh
Jens Petter Eikeland
Mob 98247550
Hipercom AS

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of Kal
Han
Sent: 27. november 2006 01:35
To: Groupstudy; Cisco certification
Subject: VPN between loopbacks - GRE

Hi

Im trying to configure vpn between two loopback interfaces
for gre traffic.
I set the tunnel source as loopback interface.
and applied my crypto map on the physical interface.
I am also using "crypto map loop local-address Loopback36"

In this case, my interesting traffic for VPN is gre
traffic from loopback - to - loopback.
*So why should I apply the crypto map on physical interface ?*
*Is it possible to apply the crypto map on the loopback interface*
*and bring the tunnel up* ? It didnt work for me.

R3#sh access-li 193
Extended IP access list 193
   20 permit gre 103.103.103.0 0.0.0.255 106.106.106.0 0.0.0.255 (398
matches)

R3#sh run int t0
Building configuration...

Current configuration : 122 bytes
!
interface Tunnel0
ip address 36.36.36.3 255.255.255.0
tunnel source Loopback36
tunnel destination 106.106.106.6
end

R3#sh run int lo36
Building configuration...

Current configuration : 68 bytes
!
interface Loopback36
ip address 103.103.103.3 255.255.255.0
end

R3#sh run int s0/0.6
Building configuration...

Current configuration : 180 bytes
!
interface Serial0/0.6 point-to-point
ip address 195.1.136.3 255.255.255.0
ip ospf message-digest-key 1 md5 cciesec
ntp broadcast key 1
frame-relay interface-dlci 306
crypto map loop
end

R3#sh run
Building configuration...

Current configuration : 3953 bytes
!
! Last configuration change at 16:24:20 PST Sun Nov 26 2006
!
version 12.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R3
!
logging queue-limit 100
!
enable use-tacacs
enable last-resort succeed
memory-size iomem 15
clock timezone PST -8
ip subnet-zero
!
!
no ip domain lookup
!
ip audit notify log
ip audit po max-events 100
!
!
!
crypto isakmp policy 10
hash md5
authentication pre-share
group 2
crypto isakmp key cciesec address 106.106.106.6
!
!
crypto ipsec transform-set ts esp-des esp-md5-hmac
!
crypto map loop local-address Loopback36
crypto map loop 10 ipsec-isakmp
set peer 106.106.106.6
set transform-set ts
match address 193
!
no voice hpi capture buffer
no voice hpi capture destination
!
!
mta receive maximum-recipients 0
!
!
!
!
interface Loopback0
ip address 33.33.33.33 255.255.255.0 <http://255.255.255.0>
!
interface Loopback36
ip address 103.103.103.3 255.255.255.0
!
interface Loopback100
ip address 100.3.3.3 <http://100.3.3.3> 255.255.255.0
!
interface Tunnel0
ip address 36.36.36.3 255.255.255.0
tunnel source Loopback36
tunnel destination 106.106.106.6
!
interface FastEthernet0/0
ip address 195.1.123.3 255.255.255.0
ip ospf message-digest-key 1 md5 cciesec
duplex auto
speed auto
!
interface Serial0/0
no ip address
encapsulation frame-relay IETF
frame-relay lmi-type cisco
!
interface Serial0/0.4 point-to-point
ip address 195.1.134.3 255.255.255.0
ip ospf message-digest-key 1 md5 cciesec
frame-relay interface-dlci 304
!
interface Serial0/0.5 point-to-point
ip address 195.1.135.3 255.255.255.0
ip ospf message-digest-key 1 md5 cciesec
frame-relay interface-dlci 305
!
interface Serial0/0.6 point-to-point
ip address 195.1.136.3 255.255.255.0
ip ospf message-digest-key 1 md5 cciesec
ntp broadcast key 1
frame-relay interface-dlci 306
crypto map loop
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
router eigrp 123
network 195.1.123.0
distance eigrp 90 90
no auto-summary
!
router eigrp 36
network 36.36.36.0 0.0.0.255
network 106.106.106.0 0.0.0.255
distance eigrp 90 90
no auto-summary
!
router ospf 1
router-id 33.33.33.33
log-adjacency-changes
area 0 authentication message-digest
area 4 authentication message-digest
area 4 stub no-summary
area 56 authentication message-digest
area 56 nssa no-summary
network 33.33.33.0 0.0.0.255 area 4
network 103.103.103.0 0.0.0.255 <http://0.0.0.255> area 56
network 195.1.123.0 0.0.0.255 area 0
network 195.1.134.0 0.0.0.255 area 4
network 195.1.135.0 0.0.0.255 area 56
network 195.1.136.0 0.0.0.255 area 56
!
router bgp 3
no synchronization
bgp log-neighbor-changes
network 100.3.3.0 mask 255.255.255.0
neighbor 195.1.134.4 remote-as 4
neighbor 195.1.134.4 local-as 356
neighbor 195.1.135.5 remote-as 5
neighbor 195.1.135.5 maximum-prefix 1000 50
neighbor 195.1.136.6 remote-as 6
neighbor 195.1.136.6 route-map asprepend out
no auto-summary
!
ip http server
no ip http secure-server
ip classless
!
!
!
ip prefix-list pix-inside seq 5 deny 172.16.0.0/16 le 32
!
access-list 1 permit 100.3.3.0 0.0.0.255
access-list 193 permit gre 103.103.103.0 0.0.0.255 106.106.106.0 0.0.0.255
!



This archive was generated by hypermail 2.1.4 : Fri Dec 01 2006 - 08:05:48 ART