Skip to ContentSkip to Footer
Start of content
- Community Home
- >
- Networking
- >
- Security e-Series
- >
- IPSEC Problem between MSR2003 Router and VSR1008 R...
Security e-Series
-
- Forums
-
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
- HPE Blog, Austria, Germany & Switzerland
- Blog HPE, France
- HPE Blog, Italy
- HPE Blog, Japan
- HPE Blog, Middle East
- HPE Blog, Latin America
- HPE Blog, Russia
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
-
Blogs
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Blog, Latin America
- HPE Blog, Middle East
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
-
Information
- Community
- Welcome
- Getting Started
- FAQ
- Ranking Overview
- Rules of Participation
- Tips and Tricks
- Resources
- Announcements
- Email us
- Feedback
- Information Libraries
- Integrated Systems
- Networking
- Servers
- Storage
- Other HPE Sites
- Support Center
- Aruba Airheads Community
- Enterprise.nxt
- HPE Dev Community
- Cloud28+ Community
- Marketplace
-
Forums
-
Blogs
-
Information
-
English
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
10-13-2016 11:43 AM
10-13-2016 11:43 AM
IPSEC Problem between MSR2003 Router and VSR1008 Router
Hello all,
im having trouble setting up ipsec tunnel between two routers, vsr router is working behind one to one nat and
when i checked the ip i can reach it, so its working correctly, but its unable to establish the ipsec session
any help would be appriciated.
Regards,
Erdem
MSR Configuration
# interface GigabitEthernet2/0/1 port link-mode route ip address 91.93.188.206 255.255.255.248 ospf timer hello 2 ospf timer dead 10 ospf network-type p2mp unicast ospf timer poll 2 ospf 2 area 0.0.0.1 ipsec apply policy msr # acl advanced 3000 match-order auto rule 0 permit ip source 172.16.101.0 0.0.0.255 destination 10.142.20.0 0.0.0.255 rule 1 permit ip source 172.16.102.0 0.0.0.255 destination 10.142.20.0 0.0.0.255 # ipsec anti-replay window 1024 ipsec sa global-duration traffic-based 86400 ipsec sa idle-time 120 # ipsec transform-set msr esp encryption-algorithm 3des-cbc esp authentication-algorithm md5 # ipsec policy-template msr 1 transform-set msr security acl 3000 remote-address 88.238.51.202 ike-profile msr reverse-route dynamic reverse-route preference 10 reverse-route tag 100 # ipsec policy msr 1 isakmp template msr # ike identity address 91.93.188.206 ike nat-keepalive 5 # ike profile msr keychain msr exchange-mode aggressive local-identity address 91.93.188.206 match remote identity address 88.238.51.202 255.255.255.255 proposal 1 # ike proposal 1 encryption-algorithm 3des-cbc dh group2 authentication-algorithm md5 # ike keychain msr pre-shared-key address 88.238.51.202 255.255.255.255 key cipher $c$3$p/GPavNSjkBGsE89MMJhRJOsKq+vhJC85xz2 # ip route-static 10.142.20.0 24 GigabitEthernet2/0/1 88.238.51.202 #
VSR Configuration
#
interface GigabitEthernet1/0
port link-mode route
ip address 10.142.20.6 255.255.255.0
ospf timer hello 2
ospf timer dead 10
ospf network-type p2mp unicast
ospf dr-priority 2
ospf timer poll 2
ospf 2 area 0.0.0.1
ipsec apply policy vsr
#
acl advanced 3000 match-order auto
rule 0 permit ip source 10.142.20.0 0.0.0.255 destination 172.16.101.0 0.0.0.255
rule 1 permit ip source 10.142.20.0 0.0.0.255 destination 172.16.102.0 0.0.0.255
#
ipsec anti-replay window 1024
ipsec sa global-duration traffic-based 86400
ipsec sa idle-time 120
#
ipsec transform-set vsr
esp encryption-algorithm 3des-cbc
esp authentication-algorithm md5
#
ipsec policy-template vsr 1
transform-set vsr
security acl 3000
remote-address 91.93.188.206
ike-profile vsr
reverse-route dynamic
reverse-route preference 10
reverse-route tag 100
#
ipsec policy vsr 1 isakmp template vsr
#
ike identity address 88.238.51.202
ike nat-keepalive 5
#
ike profile vsr
keychain vsr
exchange-mode aggressive
local-identity address 88.238.51.202
match remote identity address 91.93.188.206 255.255.255.255
proposal 1
#
ike proposal 1
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
#
ike keychain vsr
pre-shared-key address 91.93.188.206 255.255.255.255 key cipher $c$3$p/GPavNSjkBGsE89MMJhRJOsKq+vhJC85xz2
#
ip route-static 10.142.20.0 24 GigabitEthernet2/0/1 88.238.51.202
#
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
End of content
United States
Hewlett Packard Enterprise International
Communities
- Communities
- HPE Blogs and Forum
© Copyright 2021 Hewlett Packard Enterprise Development LP