Solved

Cisco IPSec Verification

Posted on 2014-07-26
4
154 Views
Last Modified: 2014-08-16
Hello Experts,

Can someone please take a look at my configuration on on datacenter, R222 and R223 and let me know how to verify that traffic is being encrypted between R223 and datacenter.

I know that traffic is being encrypted between the datacenter and R222 and R223 and R222, but I don't think traffic is being encrypted between datacenter and R223.

Cheers

Carlton
23-48-58--R223-127.0.0.1-.txt
23-50-30--DataCentre-127.0.0.1-.txt
23-52-24--R222-127.0.0.1-.txt
0
Comment
Question by:cpatte7372
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 15

Expert Comment

by:greg ward
ID: 40222396
i would use
show crypto ipsec sa and check the traffic
also you have left your password in so anyone can connect to your dmvpn

Regards
0
 

Author Comment

by:cpatte7372
ID: 40222500
deepdraw,

I tried show crypto ipsec sa but not able to see if traffic encrypted between datacenter and R223
0
 
LVL 15

Accepted Solution

by:
greg ward earned 500 total points
ID: 40222566
if you post
show ip route
we will be able to see if the ip range is going over the tunnel.

Regards
0
 

Author Closing Comment

by:cpatte7372
ID: 40264870
Cheers
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question