MX to FTD using IKEv2

Doopzzy
Conversationalist

MX to FTD using IKEv2

Hello,

 

I know there were reported incompatibility issues with the using IKEv2 when it comes to establishing a S2S with a MX & FTD. The best option being recommended was using IKEv1 as of about a year ago. 

 

Recently I have been having issues with SA's not rekeying while using IKEv1 and am considering switching to IKEv2 due to the cleaner CHILD SA process. Is there any word on if there is still an issue using IKEv2 between a MX67W and FTD on S2S tunnels?

11 Replies 11
DarrenOC
Kind of a big deal
Kind of a big deal

I take it you’re referring to this little issue:

 

https://community.meraki.com/t5/Security-SD-WAN/MX-to-Cisco-FTD-Site-to-Site-Using-IKEv2/m-p/245108#...

 

I’ve not seen anything of note recently but I’m sure @RaphaelL  may know?

Darren OConnor | doconnor@resalire.co.uk
https://www.linkedin.com/in/darrenoconnor/

I'm not an employee of Cisco/Meraki. My posts are based on Meraki best practice and what has worked for me in the field.
Doopzzy
Conversationalist

That is correct, any insight or update would be helpful.

PhilipDAth
Kind of a big deal
Kind of a big deal

It can't handle multiple subnets.  Could you change it to be a single pair of subnets (perhaps using a supernet on the FTD side)?

Doopzzy
Conversationalist

We could maybe look at that but I know we like split tunneling the traffic.

 

When you say it can't handle multiple subnets you mean IKEv2 between a MX and FTD will only work if using one subnet prefix correct?

AlexP
Meraki Employee
Meraki Employee

Static crypto maps are really something most of the industry as a whole has either already, or is moving away from anyway, so if you want to use IKEv2, you can enable a health check or eBGP to form a routed tunnel instead.

GIdenJoe
Kind of a big deal
Kind of a big deal

And please start supporting outbound filtering on that BGP session and/or static routing 😜

AlexP
Meraki Employee
Meraki Employee

We do support static routing! That's part of what enabling health checks does.

PhilipDAth
Kind of a big deal
Kind of a big deal

Is this *really* a static route over a VTI, or is this just manipulating a policy map?

AlexP
Meraki Employee
Meraki Employee

An equivalent to a VTI - internally they're mapped to an ip xfrm interface

PhilipDAth
Kind of a big deal
Kind of a big deal

That is interesting.  I would not have expected a health check to change the underlying mechanism of how the VPN is built.

 

Is it possible to create a "null" health check that always just returns "true"?

GIdenJoe
Kind of a big deal
Kind of a big deal

Isn't Meraki supposed to be simple?
There is nothing obvious about those health checks automatically making routes and having your traffic selectors set to 0.0.0.0 0.0.0.0.
Just give us the option to make the VPN route based explicitly.
I see when you choose BGP you can have those fields where you set the tunnel IP's, why take it away when doing static?

As said before the whole IPsec VPN configuration must be overhauled from the ground up.
It is difficult that you can't choose source subnets per VPN.  That you can't only NAT for one tunnel.  That you can't filter BGP incoming and outgoing entries and that you can't have inbound VPN firewall rules.

Get notified when there are additional replies to this discussion.