Remote peers
A remote peer is the Netgraph-side endpoint a Service Gateway router connects to. For each peer, Sign In stores:- Peer address — the IP or hostname of the Netgraph endpoint.
- Shared secret — the pre-shared key used for authentication. Coordinate this with your router team; both sides must agree.
- Phase 1 / Phase 2 parameters — encryption and DH group settings that must match the router’s IPsec configuration.
- Tunnel health-check parameters — DPD (dead peer detection) and rekey timers.
Setting up a tunnel
Coordinate parameters with the router team
Nail down phase-1 and phase-2 ciphers, DH group, lifetimes, and a
strong shared secret. Document these so both sides install
matching configuration.
Configure the router
On the Cisco side, configure the IPsec tunnel to the Netgraph peer
address with the same parameters.
Shared secret handling
- Treat the shared secret as a credential — don’t paste it into chat or ticketing systems.
- Rotate when you rotate other network credentials. Coordinate a maintenance window because both sides need to change simultaneously.
- The audit log records when the secret was last updated, and by whom, but not the value itself.
When tunnels flap
Tunnels dropping and re-establishing usually point to:- MTU mismatch — the path MTU between the router and Netgraph is lower than the tunnel’s clear-text MTU. Tune the tunnel MTU down.
- NAT in the path — if NAT is present, NAT-traversal (NAT-T) must be enabled on both sides.
- DPD timer mismatch — one side declares the peer dead before the other side renews.
Related
Gateways
Each registered router references one IPsec peer.
BGP
BGP sessions usually run over the IPsec tunnel.

