Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

Ipsec config

I have a couple of questions about peer configuration.

The peers do not have to match end to end on VPN config?

I am looking at a scenario that has the main site configured to peer to the remote site's backup wireless router. The wireless router is facing the Internet, so the Main site has it's peer set to a Public Internet address.

The remote site is configured with a default route to the Wireless router, if the main mpls connection drops, all traffic is sent to the wireless router, then to the Internet.

The remote site route has a loopback interface

A partial config is shown below, my questions are concnering the:

crypto isakmp key xxxx address

Why is this here if it is the loopback address of the router that owns this loopback?

crypto map PEFCU_Crypt local-address Loopback0

What is this line doing?


crypto isakmp policy 10

encr 3des

hash md5

authentication pre-share

crypto isakmp key xxxx address

crypto isakmp key xxxx address



crypto ipsec transform-set 1234 esp-3des esp-md5-hmac


crypto map PEFCU_Crypt local-address Loopback0

crypto map PEFCU_Crypt 10 ipsec-isakmp

set peer

set transform-set 1234

match address 10

qos pre-classify


Re: Ipsec config

We cannot conclude with the information provided. Can you post the complete configuration with the topology diagram? this will help to understand the problem better.