<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec problem in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883360#M461</link>
    <description>&lt;P&gt;Oops, sorry, I meant acl should be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;acl 3030&lt;/P&gt;&lt;P&gt;rule 0 permit ip source 10.10.11.0 0.0.0.255 dest &lt;STRONG&gt;&amp;lt;your_remote_network&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;rule 10 permit ip source 10.10.12.0 0.0.0.255 dest &amp;lt;&lt;STRONG&gt;your_remote_network&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mirror it on the other side.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jul 2016 08:07:51 GMT</pubDate>
    <dc:creator>user115</dc:creator>
    <dc:date>2016-07-29T08:07:51Z</dc:date>
    <item>
      <title>IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6882998#M453</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I've set up an IPsec tunnel between two sites&amp;nbsp;&lt;/P&gt;&lt;P&gt;site A two vlans: 10.10.11.0/24 and 10.10.12.0.24&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ospf switch A: network vlan 100 ip, network 10.10.11.0/24, network 10.10.12.0/24, stub&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;site B acts as a gateway for users on switch A.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ospf switch B: network vlan 100 ip,&amp;nbsp;stub no-summary default-route-advertise-always&lt;/P&gt;&lt;P&gt;switch a -------vlan 100 ospf p2p ---------- switch b&lt;/P&gt;&lt;P&gt;ACL on switch A that I've used for IPsec policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;acl 3030&lt;/P&gt;&lt;P&gt;rule 0 permit ip source 10.10.11.0 0.0.0.255 dest any&lt;/P&gt;&lt;P&gt;rule 5 permit ip source any dest&amp;nbsp;&lt;SPAN&gt;10.10.11.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;rule 10 permit ip source 10.10.12.0 0.0.0.255 dest any&lt;/P&gt;&lt;P&gt;rule 15 permit ip source any dest 10.10.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;switch B&lt;/P&gt;&lt;P&gt;rule 0 permit ip source any dest 10.10.11.0 0.0.0.255&lt;/P&gt;&lt;P&gt;rule 5 permit ip source 10.10.11.0 0.0.0.255 dest any&lt;/P&gt;&lt;P&gt;rule 10 permit ip source any dest 10.10.12.0 .0.0.0.255&lt;/P&gt;&lt;P&gt;rule 15 permit ip source 10.10.12.0 0.0.0.255 dest any&lt;/P&gt;&lt;P&gt;Now the issue is that none of the ACL is hit by traffic coming from two local VLANS on switch A. If I source traffic from one switch to another I can see ike sa and ipsec sa being created but again traffic from those two lans won't be encrypted, what am I missing here?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2016 11:49:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6882998#M453</guid>
      <dc:creator>pattap</dc:creator>
      <dc:date>2016-07-28T11:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883358#M460</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;Your description is a bit confusing, so, I'll try to answer according to what I believe you have meant.&lt;/P&gt;&lt;P&gt;Do you have those networks you want to encrypt added to ospf process? If yes, you should set up the GRE over IPSEC tunnel and just encrypt traffic between two peers using acl that just encrypts GRE protocol between peer 1 and peer 2. Then apply OSPF to tunnel interfaces, so traffic would be routed by OSPF and encrypted when flowing out the GRE interface.&lt;/P&gt;&lt;P&gt;If those networks are not added to OSPF process then... Then what did you set up OSPF for? IPSEC will automatically inject routes to kernel after the IPSEC SA will be set up, adding remote site networks directly to the routing table (though they might not be visible, it's ok). So you can just set up the connection between two sites (static route, L2, BGP, whatever you use just for peers to be able to access each other) and create IPSEC tunnel with needed params and traffic will flow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S. You don't need to specify the response traffic in your encyption ACL.&lt;/P&gt;&lt;P&gt;acl 3030&lt;/P&gt;&lt;P&gt;rule 0 permit ip source 10.10.11.0 0.0.0.255 dest any&lt;/P&gt;&lt;P&gt;rule 10 permit ip source 10.10.12.0 0.0.0.255 dest any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it would be enough for site A to encrypt the traffic you need.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2016 08:04:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883358#M460</guid>
      <dc:creator>user115</dc:creator>
      <dc:date>2016-07-29T08:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883360#M461</link>
      <description>&lt;P&gt;Oops, sorry, I meant acl should be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;acl 3030&lt;/P&gt;&lt;P&gt;rule 0 permit ip source 10.10.11.0 0.0.0.255 dest &lt;STRONG&gt;&amp;lt;your_remote_network&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;rule 10 permit ip source 10.10.12.0 0.0.0.255 dest &amp;lt;&lt;STRONG&gt;your_remote_network&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mirror it on the other side.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2016 08:07:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883360#M461</guid>
      <dc:creator>user115</dc:creator>
      <dc:date>2016-07-29T08:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883466#M463</link>
      <description>&lt;P&gt;sorry for not being clear enough, ok some more details:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;core(5800):&lt;/STRONG&gt; g1/0/26 &amp;nbsp;&amp;lt;--- vlan 4000 ospf area 0 p2p ---&amp;gt; g1/0/25 &lt;STRONG&gt;HP3600A&lt;/STRONG&gt; g1/0/25 &amp;lt;---vlan 4036 ospf area 15 p2p ---&amp;gt; g1/0/25 &lt;STRONG&gt;HP3600B&lt;/STRONG&gt; ----&amp;gt;local &lt;STRONG&gt;VLAN 10&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;vlan 10 - 10.10.10.0/24&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;now I want all the traffic coming out of HP3600B to be encrypted hence I was using permit ip source 10.10.10.0/24 dest any and at HP3600A end permit ip source any dest 10.10.10.0 /24 &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;all the interface vlans between devices are participating in ospf&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;ospf config on HP3600A&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;ospf 1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;area 0&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;net vlan 4000&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;area 15&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;net vlan 4036&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;stub no-summary default-route-advertise-always&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;ospf config on HP3600B&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;ospf 1&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;silent int vlan 10&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;area 15&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;net vlan 4036&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;net vlan 10&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;stub&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;my IPsec policy is applied on interfaces vlan 4036 on HP3600A and B&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;and like I mentioned before ACL is not being hit by traffic going out of the vlan 10 or coming into it&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2016 14:40:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883466#M463</guid>
      <dc:creator>pattap</dc:creator>
      <dc:date>2016-07-29T14:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883471#M464</link>
      <description>&lt;P&gt;and as you mentioned GRE over ipsec I've set up a lab with the below, still no joy, if that worked I would just import static route into ospf area 0, the option below has been tried with g1/0/25 in route mode and then that was used as a source for both tunnels, still no joy&lt;/P&gt;&lt;P&gt;SWITCH A&lt;BR /&gt;&lt;BR /&gt;#&lt;BR /&gt;service-loopback group 1 type tunnel&lt;BR /&gt;#&lt;BR /&gt;vlan 40&lt;BR /&gt;desc LINK FROM A TO B&lt;BR /&gt;#&lt;BR /&gt;vlan 10&lt;BR /&gt;description LAN_A&lt;BR /&gt;#&lt;BR /&gt;int vlan 10&lt;BR /&gt;ip add 10.10.10.1 24&lt;BR /&gt;desc LAN_A&lt;BR /&gt;#&lt;BR /&gt;int vlan 40&lt;BR /&gt;ip add 10.40.40.1 24&lt;BR /&gt;desc LINK FROM A TO B&lt;BR /&gt;ipsec policy test&lt;BR /&gt;#&lt;BR /&gt;int g1/0/25&lt;BR /&gt;port link-mode bridge&lt;BR /&gt;port link-type hybrid&lt;BR /&gt;undo port hybrid vlan 1&lt;BR /&gt;port hybrid vlan 40 unt&lt;BR /&gt;port hybrid pvid vlan 40&lt;BR /&gt;#&lt;BR /&gt;int e1/0/1&lt;BR /&gt;port link-mode bridge&lt;BR /&gt;port link-type hybrid&lt;BR /&gt;undo port hybrid vlan 1&lt;BR /&gt;port hybrid vlan 10 untagged&lt;BR /&gt;port hybrid pvid vlan 10&lt;BR /&gt;#&lt;BR /&gt;int e1/0/2&lt;BR /&gt;undo stp&lt;BR /&gt;port service-loopback group 1&lt;BR /&gt;#&lt;BR /&gt;acl number 3030&lt;BR /&gt;rule 0 permit ip source 10.40.40.1 0 dest 10.40.40.2 0&lt;BR /&gt;#&lt;BR /&gt;ike peer test&lt;BR /&gt;pre-shared-key simple Password_1&lt;BR /&gt;remote-address 10.40.40.2&lt;BR /&gt;local-address 10.40.40.1&lt;BR /&gt;#&lt;BR /&gt;ipsec policy test 1 isakmp&lt;BR /&gt;security acl 3030&lt;BR /&gt;ike-peer test&lt;BR /&gt;proposal tran1&lt;BR /&gt;#&lt;BR /&gt;ipsec proposal tran1&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm aes 256&lt;BR /&gt;#&lt;BR /&gt;int tun1&lt;BR /&gt;ip add 1.1.1.1 24&lt;BR /&gt;source vlan-interface 40&lt;BR /&gt;destination 10.40.40.2&lt;BR /&gt;service-loopback-group 1&lt;BR /&gt;#&lt;BR /&gt;ip route-static 10.20.20.0 24 Tunnel 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;###################################################&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SWITCH B&lt;BR /&gt;#&lt;BR /&gt;service-loopback group 1 type tunnel&lt;BR /&gt;#&lt;BR /&gt;vlan 40&lt;BR /&gt;desc LINK FROM A TO B&lt;BR /&gt;#&lt;BR /&gt;vlan 10&lt;BR /&gt;description LAN_A&lt;BR /&gt;#&lt;BR /&gt;int vlan 20&lt;BR /&gt;ip add 10.20.20.1 24&lt;BR /&gt;desc LAN__B&lt;BR /&gt;#&lt;BR /&gt;int vlan 40&lt;BR /&gt;ip add 10.40.40.2 24&lt;BR /&gt;desc LINK FROM B TO A&lt;BR /&gt;ipsec policy test&lt;BR /&gt;#&lt;BR /&gt;int g1/0/25&lt;BR /&gt;port link-mode bridge&lt;BR /&gt;port link-type hybrid&lt;BR /&gt;undo port hybrid vlan 1&lt;BR /&gt;port hybrid vlan 40 unt&lt;BR /&gt;port hybrid pvid vlan 40&lt;BR /&gt;#&lt;BR /&gt;int e1/0/1&lt;BR /&gt;port link-mode bridge&lt;BR /&gt;port link-type hybrid&lt;BR /&gt;undo port hybrid vlan 1&lt;BR /&gt;port hybrid vlan 20 untagged&lt;BR /&gt;port hybrid pvid vlan 20&lt;BR /&gt;#&lt;BR /&gt;int e1/0/2&lt;BR /&gt;undo stp&lt;BR /&gt;port service-loopback group 1&lt;BR /&gt;#&lt;BR /&gt;acl number 3030&lt;BR /&gt;rule 0 permit ip source 10.40.40.2 0 dest 10.40.40.1 0&lt;BR /&gt;#&lt;BR /&gt;ike peer test&lt;BR /&gt;pre-shared-key simple Password_1&lt;BR /&gt;remote-address 10.40.40.1&lt;BR /&gt;local-address 10.40.40.2&lt;BR /&gt;#&lt;BR /&gt;ipsec policy test 1 isakmp&lt;BR /&gt;security acl 3030&lt;BR /&gt;ike-peer test&lt;BR /&gt;proposal tran1&lt;BR /&gt;#&lt;BR /&gt;ipsec proposal tran1&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;esp encryption-algorithm aes 256&lt;BR /&gt;#&lt;BR /&gt;int tun1&lt;BR /&gt;ip add 1.1.1.2 24&lt;BR /&gt;source vlan-interface 40&lt;BR /&gt;destination 10.40.40.1&lt;BR /&gt;service-loopback-group 1&lt;BR /&gt;#&lt;BR /&gt;ip route-static 0.0.0.0 0 Tunnel 1&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2016 14:48:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6883471#M464</guid>
      <dc:creator>pattap</dc:creator>
      <dc:date>2016-07-29T14:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6886540#M483</link>
      <description>&lt;P&gt;Ok, now i guess i have got it - you won't the whole traffic exiting your vlan 10 to be encrypted between HP3600B and HP3600A. Configs look quite good, still I don't like the "any" in encryption ACL for the pure IPSEC case, and "rule 0 permit &lt;STRONG&gt;ip" &lt;/STRONG&gt;instead of "rule 0 permit &lt;STRONG&gt;gre&lt;/STRONG&gt;" in the second case. Sadly, I haven't got Comware 5 to test right now, but here is my gre over ipsec config for comware 7:&lt;/P&gt;&lt;P&gt;acl advanced 3300&lt;BR /&gt;&amp;nbsp;rule 10 permit gre source 1.1.1.1 0 destination 2.2.2.2 0&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ipsec transform-set TR-DEFAULT&lt;BR /&gt;&amp;nbsp;esp encryption-algorithm aes-cbc-128&lt;BR /&gt;&amp;nbsp;esp authentication-algorithm sha1&lt;BR /&gt;#&lt;BR /&gt;ipsec policy map 10 isakmp&lt;BR /&gt;&amp;nbsp;transform-set TR-DEFAULT&lt;BR /&gt;&amp;nbsp;security acl 3300&lt;BR /&gt;&amp;nbsp;local-address 1.1.1.1&lt;BR /&gt;&amp;nbsp;remote-address 2.2.2.2&lt;BR /&gt;&amp;nbsp;ike-profile IPSecProf&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike proposal 10&lt;BR /&gt;&amp;nbsp;encryption-algorithm aes-cbc-128&lt;BR /&gt;&amp;nbsp;dh group2&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike profile IPSecProf&lt;BR /&gt;&amp;nbsp;keychain 10&lt;BR /&gt;&amp;nbsp;match remote identity address 2.2.2.2 255.255.255.255&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;ike keychain 10&lt;BR /&gt;&amp;nbsp;pre-shared-key address 2.2.2.2 255.255.255.255 key cipher &amp;lt;key&amp;gt;&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;interface Tunnel0 mode gre&lt;BR /&gt;&amp;nbsp;ip address 192.168.255.1 255.255.255.252&lt;BR /&gt;&amp;nbsp;tcp mss 1340&lt;BR /&gt;&amp;nbsp;ip mtu 1380&lt;BR /&gt;&amp;nbsp;source 1.1.1.1&lt;BR /&gt;&amp;nbsp;destination 2.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then you just enable your ospf for your tunnel network and disable for the vlan. So the traffic which is routed through the switch would be encrypted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, look if the IKE SA and IPSEC SA are established. Try performing debug if no, I guess you might not get you IPSEC SA up with such proposals.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2016 14:26:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6886540#M483</guid>
      <dc:creator>user115</dc:creator>
      <dc:date>2016-08-08T14:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6887834#M489</link>
      <description>&lt;P&gt;how about your ACL:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;acl advanced 3300&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;rule 10 permit gre source 1.1.1.1 0 destination 2.2.2.2 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I udnerstand that you have used ip addresses of the int vlan that you've used for sourece/destination of&amp;nbsp;your tunnel.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I thought that acl should be allowing tunnel ip addresses, so in your case that would be rule 10 permit gre source&amp;nbsp;192.168.255.1 0 dest&amp;nbsp;192.168.255.2 0 and of course mirrored acl at the other end?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And bear in mind that I'm trying to set up GRE over IPsec not other way around&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2016 10:47:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6887834#M489</guid>
      <dc:creator>pattap</dc:creator>
      <dc:date>2016-08-12T10:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6889167#M497</link>
      <description>&lt;P&gt;Yes, you've understood correctly. That's the way it should be because you need to encrypt GRE traffic between two endpoints. It means that you encrypt the gre traffic between 1.1.1.1 and 2.2.2.2 (so, once again - encrypt GRE tunnel itself) and the traffic inside the gre tunnel will flow encrypted. Practically, the GRE tunnel itself gets encrypted.&lt;/P&gt;&lt;P&gt;If you set up your acl as you have written, you'll get IPSEC over GRE, because the tunnel itself will set up between 1.1.1.1 and 2.2.2.2, tunnel IPs would be visible in cleartext, only data between tunnel IPs would be encrypted. Also if you do it this way another problem would be introduced - that you won't be able to write the correct ACL - what do I mean - when you encrypt traffic between tunnel addresses you should state ACL once again which traffic should be encrypted (e.g. your two subnets) - but you need all of your traffic encrypted - and it won't be so easy. Your ACL would encrypt only traffic with source 192.168.255.1 and destination 192.168.255.2. Traffic from your subnet (don't remember it) e.g. 10.10.10.0/24 to 10.20.20.0/24 will still need an ACL to get encrypted inside GRE and not to flow unencrypted over it.&lt;/P&gt;&lt;P&gt;If you do GRE over IPSEC (as in my case) tunnel becomes encrypted and can easily forward simple routed traffic as well as OSPF Hellos and so on - so all traffic whch would flow through the tunnel (it's ospf's work to do so) will get encrypted as you need.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2016 13:06:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6889167#M497</guid>
      <dc:creator>user115</dc:creator>
      <dc:date>2016-08-16T13:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6895317#M564</link>
      <description>&lt;P&gt;regardless of what we try I don't think this can be done on 3600 switches.&lt;/P&gt;&lt;P&gt;I found the below in security guide for 3600:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;“ACL-based IPsec can protect only traffic that is generated by the device and traffic that is destined for the&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;device. You cannot use an ACL-based IPsec tunnel to protect user traffic.”&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A href="http://h10032.www1.hp.com/ctg/Manual/c04074911" target="_blank"&gt;http://h10032.www1.hp.com/ctg/Manual/c04074911&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ref: page 268&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I am&amp;nbsp;now wondering why to even bother with making IPSEC available if it can only be used for traffic generated by the switch&lt;EM&gt; - &lt;/EM&gt;to encrypt your logs and/or protocol talk between the two?!&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2016 08:31:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6895317#M564</guid>
      <dc:creator>pattap</dc:creator>
      <dc:date>2016-09-02T08:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6896450#M570</link>
      <description>&lt;P&gt;Well, in fact the GRE traffic will be generated by the switch itself - so you could try. User data will be just packed in the GRE packets genereated by the switch.&lt;/P&gt;&lt;P&gt;But, yes, it's better to use routers for VPN, imho.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Sep 2016 08:18:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6896450#M570</guid>
      <dc:creator>user115</dc:creator>
      <dc:date>2016-09-07T08:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6897771#M584</link>
      <description>&lt;P&gt;I've tried it. I have strange feeling that with GRE it might be the same as with ipsec - only for traffic generated by the switches.&lt;/P&gt;&lt;P&gt;Now why I think that. When pinging and RDPing&amp;nbsp;from machine on LANA to machine on LANB, so user traffic, I can't see statistics on tunnel interface being populated at all...but when pinging from switchA to switchB statistics on the tunnel increase.&lt;/P&gt;&lt;P&gt;I haven't found anything on that in guides for 3600 so far&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2016 07:52:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6897771#M584</guid>
      <dc:creator>pattap</dc:creator>
      <dc:date>2016-09-12T07:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6901151#M631</link>
      <description>&lt;P&gt;So, did i get you right - host form LAN-A can ping host in LAN-B, but the statistics on the tunnel doesn't increase? Do you have the route pointing on switch A to LAN B on your tunnel interface or physical one?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Sep 2016 12:47:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/6901151#M631</guid>
      <dc:creator>user115</dc:creator>
      <dc:date>2016-09-22T12:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec problem</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/7070954#M1562</link>
      <description>&lt;P&gt;Did you ever get this IPsec tunnel to come up.&lt;/P&gt;&lt;P&gt;I'm in a similar position, as I need IPsec between 2 x 5510HI switches and I'm seeing the following text in the configuraton guide:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;"ACLs for IPsec take effect only on traffic that is generated by the device and traffic that is destined for&lt;BR /&gt;the device."&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pete&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 09:50:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem/m-p/7070954#M1562</guid>
      <dc:creator>Pete W</dc:creator>
      <dc:date>2019-11-26T09:50:08Z</dc:date>
    </item>
  </channel>
</rss>

