I recently configured an easy vpn client connection on one of the interfaces (interface Vlan2) for our 1841 router. This interface already has a crypto map applied to the same interface for a different peer. The easy vpn client is actually replacing a part of the remaining crypto map entry. I mention that only to say that when both tunnels were configured using the same crypto map, everything was fine. The easy vpn tunnel is working fine now, and the crypto map ipsec tunnel establishes (phase 1 and 2), and even allows 2 or three packets across before traffic is seemingly not routed over the crypto map tunnel any longer. Is there any way to get the two to play nice on the same interface? Current config follows:
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
boot system flash:c1841-advsecurityk9-mz.150-1.M.bin
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...