Solved

Cisco IPSec Verification

Posted on 2014-07-26
4
149 Views
Last Modified: 2014-08-16
Hello Experts,

Can someone please take a look at my configuration on on datacenter, R222 and R223 and let me know how to verify that traffic is being encrypted between R223 and datacenter.

I know that traffic is being encrypted between the datacenter and R222 and R223 and R222, but I don't think traffic is being encrypted between datacenter and R223.

Cheers

Carlton
23-48-58--R223-127.0.0.1-.txt
23-50-30--DataCentre-127.0.0.1-.txt
23-52-24--R222-127.0.0.1-.txt
0
Comment
Question by:cpatte7372
  • 2
  • 2
4 Comments
 
LVL 15

Expert Comment

by:greg ward
ID: 40222396
i would use
show crypto ipsec sa and check the traffic
also you have left your password in so anyone can connect to your dmvpn

Regards
0
 

Author Comment

by:cpatte7372
ID: 40222500
deepdraw,

I tried show crypto ipsec sa but not able to see if traffic encrypted between datacenter and R223
0
 
LVL 15

Accepted Solution

by:
greg ward earned 500 total points
ID: 40222566
if you post
show ip route
we will be able to see if the ip range is going over the tunnel.

Regards
0
 

Author Closing Comment

by:cpatte7372
ID: 40264870
Cheers
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
MAC Access List to Block DHCP Traffic on a Cisco SG500 19 60
Cisco Router help 5 65
How to set DHCPv6 options on a Sonicwall? 13 144
Is WiFi half-duplex or Full -duplex 4 49
This article is a guide to configure bridging on Cisco Routers.  This is something I never knew was possible until after making a few phone calls to Cisco.  Using bridging saved our company money by not requiring us to purchase a new switch.  Bridgi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question