[c-nsp] Changing Peer IP of VPN headend
Michael Malitsky
malitsky at netabn.com
Thu Apr 2 10:31:25 EDT 2015
The ISP is not giving me a new circuit, just swapping IP space, so I am limited to one interface on one box. Is there a way to bind multiple crypt maps to an interface? Or a way to bind different entries in a crypto map to different source IPs?
Sincerely,
Michael Malitsky
-----Original Message-----
Date: Wed, 1 Apr 2015 23:49:40 +0000 (UTC)
From: Tony <td_miles at yahoo.com>
To: Michael Malitsky <malitsky at netabn.com>,
"cisco-nsp at puck.nether.net" <cisco-nsp at puck.nether.net>
Subject: Re: [c-nsp] Changing Peer IP of VPN headend
Message-ID:
<308918667.3284805.1427932180978.JavaMail.yahoo at mail.yahoo.com>
Content-Type: text/plain; charset=UTF-8
Hi Michael,
I don't know about the ability to provision IPSec on a secondary IP address on the router, but given you could pick up another 2801 for about $100 why not grab one, configure it up on your new IP address and cut things over in a more controlled fashion. You can move one tunnel at a time and just update your routing to point the traffic for each remote IPSec subnet/site to the appropriate router. Once you've got all of your remote endpoints moved to new IP address remove the surplus router.
Could also be a good chance to upgrade to something newer than a 2801 if you desire, although I'm not really an advocate of upgrading hardware if there isn't really any reason for it.
regards,Tony.
From: Michael Malitsky <malitsky at netabn.com>
To: "cisco-nsp at puck.nether.net" <cisco-nsp at puck.nether.net>
Sent: Thursday, 2 April 2015, 1:05
Subject: [c-nsp] Changing Peer IP of VPN headend
Greetings,
I need to change the public IP of my VPN headend, which will necessitate corresponding Peer IP changes on all N remote peers.? We already have the new IP space, currently configured as a secondary address.? Problem is that N-1 of the peers are completely outside of our control, and scheduling all of them to cut over within a narrow window (one day?) is going to be very challenging to say the least.? Is there a way to cut them over one-by-one, perhaps a way to bind another crypto map to the secondary ip address?? My searching on google and cisco lead me to believe the answer is NO, but I am hoping I missed something.
Router in question is a 2801.? All VPNs are site-to-site IPSEC.
Sincerely,
Michael Malitsky
_______________________________________________
cisco-nsp mailing list? cisco-nsp at puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
------------------------------
Message: 6
Date: Wed, 01 Apr 2015 23:13:53 -0700
From: Octavio Alvarez <alvarezp at alvarezp.ods.org>
To: Michael Malitsky <malitsky at netabn.com>,
"cisco-nsp at puck.nether.net" <cisco-nsp at puck.nether.net>
Subject: Re: [c-nsp] Changing Peer IP of VPN headend
Message-ID: <551CDE21.9020709 at alvarezp.ods.org>
Content-Type: text/plain; charset=windows-1252
On 01/04/15 08:05, Michael Malitsky wrote:
> I need to change the public IP of my VPN headend, which will
> necessitate corresponding Peer IP changes on all N remote peers. We
> already have the new IP space, currently configured as a secondary
> address. Problem is that N-1 of the peers are completely outside of
> our control, and scheduling all of them to cut over within a narrow
> window (one day?) is going to be very challenging to say the least.
> Is there a way to cut them over one-by-one, perhaps a way to bind
> another crypto map to the secondary ip address? My searching on
> google and cisco lead me to believe the answer is NO, but I am hoping
> I missed something.
I would try using a different physical interface in the router to have another crypto map (you can even use "crypto map local-address"). If you don't have another physical interface you could --depending on your
topology-- change your output interface to an 802.1Q trunk and have two subinterfaces.
> Router in question is a 2801. All VPNs are site-to-site IPSEC.
Best regards.
------------------------------
More information about the cisco-nsp
mailing list