Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring Group VPNs in Group VPNv2 on Routing Devices

date_range 23-Nov-23

You can configure an MX Series router with MS-MIC-16G and MS-MPC-PIC line cards to provide the Group VPNv2 member functionality support with one or more Cisco group controllers or key servers (GC/KSs). The group members can connect to a maximum of four Cisco GC/KSs with minimum interoperability with the cooperative servers.

The Group VPNv2 feature also provides system logging support for the Group VPNv2 functionality, and routing instance support for both control and data traffic.

Before you begin:

  1. Configure the routers for network communication.

  2. Configure the Cisco GC/KS.

  3. Configure the group member device interfaces.

  4. Configure a static route to reach the group server.

To configure a Group VPNv2 member, complete the following tasks:

  1. In configuration mode, go to the following hierarchy level:
    content_copy zoom_out_map
    [edit]
    user@GM1# edit security
    
  2. Define the IKE proposal.
    content_copy zoom_out_map
    [edit security]
    user@GM1# set group-vpn member ike proposal proposal-name
    
  3. Configure the Phase 1 SA for the IKE proposal.
    content_copy zoom_out_map
    [edit security]
    user@GM1# set group-vpn member ike proposal proposal-name  authentication-method pre-shared-keys
    user@GM1# set group-vpn member ike proposal proposal-name dh-group group
    user@GM1# set group-vpn member ike proposal proposal-name authentication-algorithm sha1
    user@GM1# set group-vpn member ike proposal proposal-name encryption-algorithm 3des-cbc
    
  4. Define the IKE policy.
    content_copy zoom_out_map
    [edit security]
    user@GM1# set group-vpn member ike policy policy-name mode main
    user@GM1# set group-vpn member ike policy policy-name proposals proposal-name
    user@GM1# set group-vpn member ike policy policy-name pre-shared-key ascii-text text
    
  5. Set the remote gateways for the IKE gateway group.
    content_copy zoom_out_map
    [edit security]
    user@GM1# set group-vpn member ike gateway gateway-group-name ike-policy policy-name
    user@GM1# set group-vpn member ike gateway gateway-group-name server-address server-IP-address
    user@GM1# set group-vpn member ike gateway gateway-group-name local-address server-facing-interface-IP-address
    
    Note:

    To configure a group member to connect to multiple group servers, add the IP address of all the servers to the remote IKE gateway group configuration.

    For example,

    content_copy zoom_out_map
    [edit security]
    user@GM1# set group-vpn member ike gateway gw-group1 server-address 203.0.113.0
    user@GM1# set group-vpn member ike gateway gw-group1 server-address 203.0.113.1
    
  6. Configure the group identifier and IKE gateway for the remote gateway group.
    content_copy zoom_out_map
    [edit security]
    user@GM1# set group-vpn member ipsec vpn vpn-name ike-gateway gateway-group-name
    user@GM1# set group-vpn member ipsec vpn vpn-name group group-ID
    user@GM1# set group-vpn member ipsec vpn vpn-name match-direction output
    
  7. In configuration mode, go to the following hierarchy level:
    content_copy zoom_out_map
    [edit]
    user@GM1# edit services
    
  8. Configure the service set for the remote gateway group.
    content_copy zoom_out_map
    [edit services]
    user@GM1# set service-set service-set-name interface-service service-interface service-interface
    user@GM1# set service-set service-set-name ipsec-group-vpn vpn-name
    
    Note:

    The service set has to be applied on the interface connecting to the other group member.

    For example:

    content_copy zoom_out_map
    [edit interfaces]
    user@GM1# set xe-0/3/1 unit 1 family inet service input service-set gvpn-service-set
    user@GM1# set xe-0/3/1 unit 1 family inet service output service-set gvpn-service-set
    
  9. Verify and commit the configuration.

    For example:

    content_copy zoom_out_map
    [edit security]
    user@GM1# set group-vpn member ike proposal ike-proposal  authentication-method pre-shared-keys
    user@GM1# set group-vpn member ike proposal ike-proposal  dh-group group2
    user@GM1# set group-vpn member ike proposal ike-proposal  authentication-algorithm sha1
    user@GM1# set group-vpn member ike proposal ike-proposal  encryption-algorithm 3des-cbc
    user@GM1# set group-vpn member ike policy ike-policy  mode main
    user@GM1# set group-vpn member ike policy ike-policy proposals ike-proposal
    user@GM1# set group-vpn member ike policy ike-policy pre-shared-key ascii-text ""$9$QEni3/t1RSM87uO87-V4oz36"
    user@GM1# set group-vpn member ike gateway gw-group1 ike-policy ike-policy
    user@GM1# set group-vpn member ike gateway gw-group1 server-address 203.0.113.0
    user@GM1# set group-vpn member ike gateway gw-group1 local-address 192.0.2.0
    user@GM1# set group-vpn member ipsec vpn vpn-group1 ike-gateway gw-group1
    user@GM1# set group-vpn member ipsec vpn vpn-group1 group 1
    user@GM1# set group-vpn member ipsec vpn vpn-group1 match-direction output
    
    content_copy zoom_out_map
    [edit services]
    user@GM1# set service-set gvpn-service-set interface-service service-interface ms-4/0/0.1
    user@GM1# set service-set gvpn-service-set ipsec-group-vpn vpn-group1
    
    content_copy zoom_out_map
    [edit]
    user@GM1# commit
    commit complete
    
footer-navigation