Solved

question on GRE tunnels

Posted on 2011-10-01
1
510 Views
Last Modified: 2012-05-12
Hi , i have a cisco 2811 router with the following tunnel

int t529

description  connection to Site B
ip address 10.10.10.10 255.255.255.252
ip flow ingress
tunnel source fa0/1
tunnel destination 20.20.20.20
tunnel key 529
tunnel checksum


I added a second 2811 and did HSRP
when it comes to creating the tunnel to site B on this router

source can be the same fa0/1
destination will be the same 20.20.20.20
what about tunnel IP ? can it be the same ?
Tunnel key will be different ( i.e 530 )

Any inputs would be appreciated... I am not sure about the tunnel IP...
0
Comment
Question by:c_hockland
1 Comment
 
LVL 22

Accepted Solution

by:
Jody Lemoine earned 500 total points
ID: 36899455
In this case, the HSRP configuration has nothing to do with the GRE tunnels. They should each source from the physical interface closest to the destination, must have separate IP networks and should use defferent tunnel tunnel keys to keep everything discreet. Because they will run independently of HSRP, you will want to run a routing protocol to ensure connectivity in the event of a failover.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
switch design question 6 42
TL-R470T+ and Cisco ASA 2 21
Cisco 800 router unable to connect through TPG network 12 23
VTP Setup 4 9
I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (http://en.wikipedia.org/wiki/Vir…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question