breaks GRE and therefore DMVPN. TAC tells me it has to do with a double access-list lookup.
can someone please show me a sample config where at the hub or the spoke all that is allowed to go in are IPSec packets and nothing else. Right now if I allow GRE in my access list DMVPN works again but all other traffic can get in as long as its wrapped in GRE
Yes, that is the ideThis scenario lets customers run all security services, including Cisco IOS Firewall, Cisco IOS IPS, IPSec VPNs, quality of service (QoS), Network Address Translation (NAT), and routing along with SSL VPN on a single integrated services router.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...