Configuring Ipsec With Eigrp and Ipx Using Gre Tunneling: Document Id: 14136
Configuring Ipsec With Eigrp and Ipx Using Gre Tunneling: Document Id: 14136
Tunneling
Document ID: 14136
Introduction
Prerequisites
Requirements
Components Used
Conventions
Configure
Network Diagram
Configurations
Verify
show Command Output With Tunnels Up
Troubleshoot
Troubleshooting Commands
Related Information
Introduction
Normal IPSec configurations cannot transfer routing protocols such as Enhanced Interior Gateway Routing
Protocol (EIGRP) and Open Shortest Path First (OSPF) or non−IP traffic such as Internetwork Packet
Exchange (IPX), AppleTalk, and so forth. This document illustrates how to route between different networks
using a routing protocol and non−IP traffic with IPSec. This technique uses generic routing encapsulation
(GRE) as the method to accomplish this.
Prerequisites
Requirements
Before you attempt this configuration, ensure that you meet these requirements:
• Make sure the tunnel works before you apply the crypto maps.
• Crypto access list need to have GRE as the protocol to permit: access−list 101 permit gre host x.x.x.x
host y.y.y.y x.x.x.x = <tunnel_source> y.y.y.y = <tunnel_destination>
• Use loopback IP addresses to identify Internet Key Exchange (IKE) peers and tunnel source and
tunnel destination to improve availability.
• For a discussion of possible Maximum Transmission Unit (MTU) issues, refer to Adjusting IP MTU,
TCP MSS, and PMTUD on Windows and Sun Systems.
Components Used
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the
devices used in this document started with a cleared (default) configuration. If your network is live, make sure
that you understand the potential impact of any command.
Conventions
For more information on document conventions, refer to the Cisco Technical Tips Conventions .
Configure
In this section, you are presented with the information to configure the features described in this document.
Note: To find additional information on the commands used in this document, use the Command Lookup
Tool ( registered customers only) .
IOS Configuration Note: With Cisco IOS Software Release 12.2(13)T and later codes (higher numbered
T−train codes, Cisco IOS Software Release 12.3 and later codes) the configured IPSec "crypto map" only
needs to be applied to the physical interface. It is no longer required to be applied on the GRE tunnel
interface. Having the "crypto map" on the physical and tunnel interface when you use the Cisco IOS Software
Release 12.2.(13)T and later codes still works. However, it is highly recommended to apply it only on the
physical interface.
Network Diagram
This document uses the network setup shown in this diagram.
Configurations
• Light
• House
Light
Current configuration:
!
version 12.2
no service single−slot−reload−enable
service timestamps debug uptime
service timestamps log uptime
no service password−encryption
!
hostname Light
!
logging rate−limit console 10 except errors
!
ip subnet−zero
!
!
no ip finger
!
no ip dhcp−client network−discovery
ipx routing 00e0.b06a.40fc
!
Light#!
House
Current configuration:
version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password−encryption
!
hostname House
!
ip subnet−zero
!
ipx routing 00e0.b06a.4114
!
House#
Verify
This section provides information you can use to confirm your configuration works properly.
Certain show commands are supported by the Output Interpreter Tool ( registered customers only) , which allows
you to view an analysis of show command output.
• show crypto engine connections activeShows encrypted and decrypted packets between IPSec
peers.
• show crypto isakmp saShows Phase 1 security associations.
• show crypto ipsec saShows Phase 2 security associations.
• show ipx route [network] [default] [detailed]Shows the contents of the IPX routing table.
show Command Output With Tunnels Up
Light#show ip route
Codes: C − connected, S − static, I − IGRP, R − RIP, M − mobile, B − BGP
D − EIGRP, EX − EIGRP external, O − OSPF, IA − OSPF inter area
N1 − OSPF NSSA external type 1, N2 − OSPF NSSA external type 2
E1 − OSPF external type 1, E2 − OSPF external type 2, E − EGP
i − IS−IS, L1 − IS−IS level−1, L2 − IS−IS level−2, ia − IS−IS inter area
* − candidate default, U − per−user static route, o − ODR
P − periodic downloaded static route
House#show ip route
Codes: C − connected, S − static, I − IGRP, R − RIP, M − mobile, B − BGP
D − EIGRP, EX − EIGRP external, O − OSPF, IA − OSPF inter area
N1 − OSPF NSSA external type 1, N2 − OSPF NSSA external type 2
E1 − OSPF external type 1, E2 − OSPF external type 2, E − EGP
i − IS−IS, L1 − IS−IS level−1, L2 − IS−IS level−2, ia − IS−IS inter area
* − candidate default, U − per−user static route, o − ODR
P − periodic downloaded static route
C AA (NOVELL−ETHER), Fa0/1
C CC (TUNNEL), Tu0
R BB [151/01] via CC.00e0.b06a.4114, 17s, Tu0
C BB (NOVELL−ETHER), Fa0/1
C CC (TUNNEL), Tu0
R AA [151/01] via CC.00e0.b06a.40fc, 59s, Tu0
interface: Tunnel0
Crypto map tag: GRE, local addr. 192.168.2.1
inbound ah sas:
outbound ah sas:
inbound ah sas:
interface: FastEthernet0/0
Crypto map tag: GRE, local addr. 192.168.2.1
inbound ah sas:
outbound ah sas:
inbound ah sas:
outbound ah sas:
Troubleshoot
This section provides information you can use to troubleshoot your configuration.
Troubleshooting Commands
Certain show commands are supported by the Output Interpreter Tool ( registered customers only) , which allows
you to view an analysis of show command output.
Note: Before you issue debug commands, refer to Important Information on Debug Commands.
Related Information
• IPSec Support Page
• An Introduction to IP Security (IPSec) Encryption
• Configuring IPSec Network Security
• Configuring Internet Key Exchange Security Protocol
• Command Lookup Tool ( registered customers only)
• Technical Support − Cisco Systems