@Ronnie-Wong
Thank you for replying.
Yes, I can ping across the tunnel without IPsec but when added IPSec to the GRE Tunnel, the tunnel protocol changes its state to down.
I'm creating a site-to-site over the internet. Site-to-site VPN without IPsec, everything works fine but when adding the IPsec for tunnel protection then both tunnel protocols on both routers change their state to down.
Below is the IPsec/EIGRP/Tunnel configuration for both routers.
HQ Router
IPSec Configs
crypto isakmp policy 15
encryption aes 256
hash sha512
authentication pre-share
group 14
crypto isakmp key 6 cisco address 10.200.100.214
crypto ipsec transform-set VPNSET esp-aes 256 esp-sha-hmac
mode tunnel
crypto ipsec profile VPNPROFILE
set transform-set VPNSET
Tunnel Configs
interface Tunnel0
ip address 130.32.1.1 255.255.255.252
tunnel source 220.98.16.51
tunnel destination 10.200.100.214
tunnel protection ipsec profile VPNPROFILE
EIGRP Routing Configs
router eigrp 1
network 130.32.1.0 0.0.0.255
no passive-interface Tunnel0
Remote Router
IPSec Configs
crypto isakmp policy 15
encryption aes 256
hash sha512
authentication pre-share
group 14
crypto isakmp key 6 cisco address 220.98.16.51
crypto ipsec transform-set VPNSET esp-aes 256 esp-sha-hmac
mode tunnel
crypto ipsec profile VPNPROFILE
set transform-set VPNSET
Tunnel Configs
interface Tunnel0
ip address 130.32.1.2 255.255.255.252
tunnel source 10.200.100.214
tunnel destination 220.98.16.51
tunnel protection ipsec profile VPNPROFILE
EIGRP Routing Configs
router eigrp 1
network 130.32.1.0 0.0.0.255
no passive-interface Tunnel0
Note: IP address and Crypto Key have been changed here but that's the existing configurations.
Is there any possibility that I can resolve the IPsec issue?