Cisco Site-to-Site VPN Technologies Comparison
Reference: www.cisco.com
Layer 2 VPN (L2VPN) Interworking allows you to connect disparate attachment circuits. You can connect various types of L2 networks (Ethernet, VLAN, Frame Relay, ATM, PPP etc.) over L2TPV3. But it is supported on specific routers and line cards only. You can check Cisco documentation for specific requirements.
Here we will connect Site-1 Ethernet link to Site-2 Serial PPP link.
R1 - Provider Edge Router connected to Customer Routers hostname R1 ! ip cef ! pseudowire-class PW-CLASS encapsulation l2tpv3 interworking ip ip local interface Loopback0 ! interface Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 10.1.13.1 255.255.255.0 ip ospf network point-to-point ! interface FastEthernet0/1 description To Cust-A Site-1 R4 no ip address no keepalive xconnect 10.1.1.2 101 pw-class PW-CLASS ! router ospf 1 log-adjacency-changes network 10.1.0.0 0.0.255.255 area 0 ! R2 - Provider Edge Router connected to Customer Routers hostname R2 ! ip cef ! pseudowire-class PW-CLASS encapsulation l2tpv3 interworking ip ip local interface Loopback0 ! interface Loopback0 ip address 10.1.1.2 255.255.255.255 ! interface FastEthernet0/0 ip address 10.1.23.2 255.255.255.0 ip ospf network point-to-point ! interface Serial1/0 description To Cust-A Site-2 R5 no ip address encapsulation ppp serial restart-delay 0 xconnect 10.1.1.1 101 pw-class PW-CLASS ! router ospf 1 log-adjacency-changes network 10.1.0.0 0.0.255.255 area 0 ! R3 - Service Provider Core Network Router hostname R3 ! ip cef ! interface FastEthernet0/0 ip address 10.1.13.3 255.255.255.0 ip ospf network point-to-point ! interface FastEthernet0/1 ip address 10.1.23.3 255.255.255.0 ip ospf network point-to-point ! router ospf 1 log-adjacency-changes network 10.1.0.0 0.0.255.255 area 0 ! R4 - Customer-A Site-1 Edge Router hostname R4 ! interface FastEthernet0/0 ip address 172.16.4.4 255.255.255.0 ! interface FastEthernet0/1 ip address 172.16.45.1 255.255.255.252 ! router eigrp 100 network 172.16.0.0 ! R5 - Customer-A Site-2 Edge Router hostname R5 ! interface FastEthernet0/0 ip address 172.16.5.5 255.255.255.0 ! interface Serial1/0 ip address 172.16.45.2 255.255.255.252 encapsulation ppp serial restart-delay 0 ! router eigrp 100 network 172.16.0.0 !
R1#show l2tun tunnel all L2TP Tunnel Information Total tunnels 1 sessions 1 Tunnel id 3964089202 is up, remote id is 2104878685, 1 active sessions Locally initiated tunnel Tunnel state is established, time since change 00:36:16 Tunnel transport is IP (115) Remote tunnel name is R2 Internet Address 10.1.1.2, port 0 Local tunnel name is R1 Internet Address 10.1.1.1, port 0 L2TP class for tunnel is l2tp_default_class Counters, taking last clear into account: 475 packets sent, 475 received 28562 bytes sent, 28524 received Last clearing of counters never Counters, ignoring last clear: 475 packets sent, 475 received 28562 bytes sent, 28524 received Control Ns 37, Nr 9 Local RWS 1024 (default), Remote RWS 1024 Control channel Congestion Control is disabled Tunnel PMTU checking disabled Retransmission time 1, max 1 seconds Unsent queuesize 0, max 0 Resend queuesize 0, max 3 Total resends 1, ZLB ACKs sent 5 Total out-of-order dropped pkts 0 Total out-of-order reorder pkts 0 Total peer authentication failures 0 Current no session pak queue check 0 of 5 Retransmit time distribution: 0 1 0 0 0 0 0 0 0 Control message authentication is disabled R1#show l2tun session all L2TP Session Information Total tunnels 1 sessions 1 Session id 2788289264 is up, logical session id 32768, tunnel id 3964089202 Remote session id is 1736473654, remote tunnel id 2104878685 Locally initiated session Unique ID is 1 Session Layer 2 circuit, type is Ethernet, name is FastEthernet0/1 Session vcid is 101 Interworking type is IP Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 959200001 Remote tunnel name is R2 Internet address is 10.1.1.2 Local tunnel name is R1 Internet address is 10.1.1.1 IP protocol 115 Session is L2TP signaled Session state is established, time since change 00:36:35 479 Packets sent, 480 received 28802 Bytes sent, 28824 received Last clearing of counters never Counters, ignoring last clear: 479 Packets sent, 480 received 28802 Bytes sent, 28824 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified No session cookie information available FS cached header information: encap size = 24 bytes 45000014 00000000 ff73a572 0a010101 0a010102 67807c36 Sequencing is off Conditional debugging is disabled SSM switch id is 4096, SSM segment id is 8193 R2#show l2tun tunnel all L2TP Tunnel Information Total tunnels 1 sessions 1 Tunnel id 2104878685 is up, remote id is 3964089202, 1 active sessions Remotely initiated tunnel Tunnel state is established, time since change 00:36:54 Tunnel transport is IP (115) Remote tunnel name is R1 Internet Address 10.1.1.1, port 0 Local tunnel name is R2 Internet Address 10.1.1.2, port 0 L2TP class for tunnel is l2tp_default_class Counters, taking last clear into account: 484 packets sent, 484 received 29064 bytes sent, 29102 received Last clearing of counters never Counters, ignoring last clear: 484 packets sent, 484 received 29064 bytes sent, 29102 received Control Ns 9, Nr 37 Local RWS 1024 (default), Remote RWS 1024 Control channel Congestion Control is disabled Tunnel PMTU checking disabled Retransmission time 1, max 1 seconds Unsent queuesize 0, max 0 Resend queuesize 0, max 3 Total resends 0, ZLB ACKs sent 34 Total out-of-order dropped pkts 0 Total out-of-order reorder pkts 0 Total peer authentication failures 0 Current no session pak queue check 0 of 5 Retransmit time distribution: 0 0 0 0 0 0 0 0 0 Control message authentication is disabled R2#show l2tun session all L2TP Session Information Total tunnels 1 sessions 1 Session id 1736473654 is up, logical session id 65537, tunnel id 2104878685 Remote session id is 2788289264, remote tunnel id 3964089202 Remotely initiated session Unique ID is 1 Session Layer 2 circuit, type is PPP, name is Serial1/0 Session vcid is 101 Interworking type is IP Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 959200001 Remote tunnel name is R1 Internet address is 10.1.1.1 Local tunnel name is R2 Internet address is 10.1.1.2 IP protocol 115 Session is L2TP signaled Session state is established, time since change 00:37:08 487 Packets sent, 487 received 29244 Bytes sent, 29282 received Last clearing of counters never Counters, ignoring last clear: 487 Packets sent, 487 received 29244 Bytes sent, 29282 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified No session cookie information available FS cached header information: encap size = 24 bytes 45000014 00000000 ff73a572 0a010102 0a010101 a631eaf0 Sequencing is off Conditional debugging is disabled SSM switch id is 4096, SSM segment id is 8193
R4#sh int f0/1 FastEthernet0/1 is up, line protocol is up Hardware is i82543 (Livengood), address is ca03.3344.0006 (bia ca03.3344.0006) Internet address is 172.16.45.1/30 MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:00, output 00:00:01, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 785 packets input, 58107 bytes Received 8 broadcasts (0 IP multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog 0 input packets with dribble condition detected 1219 packets output, 103455 bytes, 0 underruns 0 output errors, 0 collisions, 3 interface resets 0 unknown protocol drops 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out R5#sh int s1/0 Serial1/0 is up, line protocol is up Hardware is M4T Internet address is 172.16.45.2/30 MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation PPP, LCP Open Open: IPCP, CDPCP, crc 16, loopback not set Keepalive set (10 sec) Restart-Delay is 0 secs Last input 00:00:03, output 00:00:03, output hang never Last clearing of "show interface" counters 01:00:27 Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: weighted fair Output queue: 0/1000/64/0 (size/max total/threshold/drops) Conversations 0/1/256 (active/max active/max total) Reserved Conversations 0/0 (allocated/max allocated) Available Bandwidth 1158 kilobits/sec 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 1515 packets input, 61892 bytes, 0 no buffer Received 0 broadcasts (0 IP multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 1585 packets output, 82294 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 unknown protocol drops 0 output buffer failures, 0 output buffers swapped out 0 carrier transitions DCD=up DSR=up DTR=up RTS=up CTS=up R4#ping 172.16.45.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.16.45.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 68/94/148 ms R4#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 172.16.45.2 Fa0/1 11 01:00:21 199 1194 0 3 R4#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 3 masks C 172.16.4.0/24 is directly connected, FastEthernet0/0 L 172.16.4.4/32 is directly connected, FastEthernet0/0 D 172.16.5.0/24 [90/30720] via 172.16.45.2, 01:00:42, FastEthernet0/1 C 172.16.45.0/30 is directly connected, FastEthernet0/1 L 172.16.45.1/32 is directly connected, FastEthernet0/1 R4#ping 172.16.5.5 source 172.16.4.4 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.16.5.5, timeout is 2 seconds: Packet sent with a source address of 172.16.4.4 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 40/76/168 ms
L2TPv3 provides the capabilities to tunnel Layer 2 payload over IP network. When L2TPv3 is implemented, the physical interfaces that are connected to the customer’s network are used as tunnel ingress and egress interfaces. It is documented in RFC3931.
L2TP is comprised of two types of messages, control messages and data messages.Control messages are used in the establishment, maintenance, and clearing of control connections and sessions. These messages utilize a reliable control channel within L2TP to guarantee delivery. Data messages are used to encapsulate the L2 traffic being carried over the L2TP session. Unlike control messages, data messages are not re-transmitted when packet loss occurs.
The session identifier identifies the tunnel context at the decapsulating router. The session ID of 0 is reserved for use by the protocol. Static L2TPv3 sessions need manual configuration of session ID on the PE routers. However, for dynamic L2TPv3 tunnel setup, the session IDs can be chosen depending on the number of tunnels that are supported by the router in question.
The cookie contains the key for the L2TPv3 session. The cookie length can be configured on a router, but the default value for the cookie length is 4 bytes. When the originating and terminating routers are different platforms, the cookie length needs to be configured manually to be 4 bytes.
Pseudowire control encapsulation consists of 4 bytes and implements sequencing with the L2TPv3 tunnel. It uses only the first bit and bits 8 through 31. The value of the first bit defines if bits 8 through 31 contain a sequence number and if it needs to be updated.
An L2TP control connection is a reliable control channel that is used to establish, maintain, and release individual L2TP sessions as well as the control connection itself.
Control channel messages are used for signalling between the two routers that are the endpoints of the L2TPv3 pseudowire. These endpoints can be referred to as L2TP Control Connection Endpoints – LCCEs. Control connection messages can be used by the LCCEs to setup the control connection itself, to establish L2TPv3 sessions, to indicate circuit status changes, to tear down sessions, to terminate the control connection, and to provide a keepalive mechanism.
The channel for L2TP-encapsulated data traffic that passes between two LCCEs over IP Network.
Data channel messages, on the other hand, are the messages that actually carry the Layer-2 protocols and connections over the IP backbone.
It is an emulated circuit as it traverses a IP network.There is one Pseudowire per L2TP Session.
We will use following topology to configure L2TPv3 and extend Layer2 network from R4 to R5 and from R6 to R7.
R1 - Provider Edge Router connected to Customer Routers hostname R1 ! ip cef ! !! -- L2TP class implements a template for control channel -- !! !! -- parameters that can be applied to different pseudowire -- !! !! -- classes on the router -- !! l2tp-class L2TP-CLASS cookie size 4 ! !! -- Pseudowire class defines the session level parameters of -- !! !! -- the L2TPV3 sessions -- !! pseudowire-class PW-CLASS !! -- Data Encapsulation Protocol -- !! encapsulation l2tpv3 !! -- No signaling protocol for Static Tunnels -- !! protocol none !! -- Configure the Source Address of the Tunnel -- !! ip local interface Loopback0 ! interface Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 10.1.13.1 255.255.255.0 ip ospf network point-to-point duplex full speed 100 ! interface FastEthernet0/1 description To Cust-A Site-1 R4 no ip address no cdp enable xconnect 10.1.1.2 101 encapsulation l2tpv3 manual pw-class PW-CLASS l2tp id 101 101 l2tp cookie local 4 1 l2tp cookie remote 4 1 l2tp hello L2TP-CLASS ! interface Serial1/0 description To Cust-B Site-1 R6 no ip address encapsulation ppp serial restart-delay 0 no cdp enable xconnect 10.1.1.2 102 encapsulation l2tpv3 manual pw-class PW-CLASS l2tp id 102 102 l2tp cookie local 4 1 l2tp cookie remote 4 1 l2tp hello L2TP-CLASS ! router ospf 1 network 10.1.0.0 0.0.255.255 area 0 ! R2 - Provider Edge Router connected to Customer Routers hostname R2 ! ip cef ! l2tp-class L2TP-CLASS cookie size 4 ! pseudowire-class PW-CLASS encapsulation l2tpv3 protocol none ip local interface Loopback0 ! interface Loopback0 ip address 10.1.1.2 255.255.255.255 ! interface FastEthernet0/0 ip address 10.1.23.2 255.255.255.0 ip ospf network point-to-point duplex full speed 100 ! interface FastEthernet0/1 description To Cust-A Site-2 R5 no ip address no cdp enable xconnect 10.1.1.1 101 encapsulation l2tpv3 manual pw-class PW-CLASS l2tp id 101 101 l2tp cookie local 4 1 l2tp cookie remote 4 1 l2tp hello L2TP-CLASS ! interface Serial1/0 description To Cust-B Site-2 R6 no ip address encapsulation ppp serial restart-delay 0 no cdp enable xconnect 10.1.1.1 102 encapsulation l2tpv3 manual pw-class PW-CLASS l2tp id 102 102 l2tp cookie local 4 1 l2tp cookie remote 4 1 l2tp hello L2TP-CLASS ! router ospf 1 network 10.1.0.0 0.0.255.255 area 0 ! R3 - Provider Core Network Router hostname R3 ! ip cef ! interface FastEthernet0/0 ip address 10.1.13.3 255.255.255.0 ip ospf network point-to-point duplex full speed 100 ! interface FastEthernet0/1 ip address 10.1.23.3 255.255.255.0 ip ospf network point-to-point duplex full speed 100 ! router ospf 1 network 10.1.0.0 0.0.255.255 area 0 ! R4 - Customer-A Site-1 Edge Router hostname R4 ! interface FastEthernet0/0 ip address 172.16.4.4 255.255.255.0 ! interface FastEthernet0/1 ip address 172.16.45.1 255.255.255.252 ! router eigrp 100 network 172.16.0.0 ! R5 - Customer-A Site-2 Edge Router hostname R5 ! interface FastEthernet0/0 ip address 172.16.5.5 255.255.255.0 ! interface FastEthernet0/1 ip address 172.16.45.2 255.255.255.252 ! router eigrp 100 network 172.16.0.0 ! R6 - Customer-B Site-1 Edge Router hostname R6 ! interface FastEthernet0/0 ip address 192.168.6.6 255.255.255.0 ! interface Serial1/0 ip address 192.168.67.1 255.255.255.252 encapsulation ppp serial restart-delay 0 ! router eigrp 100 network 192.168.0.0 0.0.255.255 ! R7 - Customer-B Site-2 Edge Router hostname R7 ! interface FastEthernet0/0 ip address 192.168.7.7 255.255.255.0 ! interface Serial1/0 ip address 192.168.67.2 255.255.255.252 encapsulation ppp serial restart-delay 0 ! router eigrp 100 network 192.168.0.0 0.0.255.255 !
R1#show ip route | beg Gate Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks C 10.1.1.1/32 is directly connected, Loopback0 O 10.1.1.2/32 [110/3] via 10.1.13.3, 00:11:24, FastEthernet0/0 C 10.1.13.0/24 is directly connected, FastEthernet0/0 L 10.1.13.1/32 is directly connected, FastEthernet0/0 O 10.1.23.0/24 [110/2] via 10.1.13.3, 00:11:24, FastEthernet0/0 R2#show ip route | beg Gate Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks O 10.1.1.1/32 [110/3] via 10.1.23.3, 00:11:35, FastEthernet0/0 C 10.1.1.2/32 is directly connected, Loopback0 O 10.1.13.0/24 [110/2] via 10.1.23.3, 00:11:45, FastEthernet0/0 C 10.1.23.0/24 is directly connected, FastEthernet0/0 L 10.1.23.2/32 is directly connected, FastEthernet0/0 R3#show ip route | beg Gate Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 6 subnets, 2 masks O 10.1.1.1/32 [110/2] via 10.1.13.1, 00:11:54, FastEthernet0/0 O 10.1.1.2/32 [110/2] via 10.1.23.2, 00:11:54, FastEthernet0/1 C 10.1.13.0/24 is directly connected, FastEthernet0/0 L 10.1.13.3/32 is directly connected, FastEthernet0/0 C 10.1.23.0/24 is directly connected, FastEthernet0/1 L 10.1.23.3/32 is directly connected, FastEthernet0/1 R1#show l2tun tunnel all L2TP Tunnel Information Total tunnels 1 sessions 2 Tunnel id 4276657069 is up, remote id is 1806975601, 2 active sessions Locally initiated tunnel Tunnel state is established, time since change 00:12:34 Tunnel transport is IP (115) Remote tunnel name is R2 Internet Address 10.1.1.2, port 0 Local tunnel name is R1 Internet Address 10.1.1.1, port 0 L2TP class for tunnel is L2TP-CLASS Counters, taking last clear into account: 0 packets sent, 0 received 0 bytes sent, 0 received Last clearing of counters never Counters, ignoring last clear: 0 packets sent, 0 received 0 bytes sent, 0 received Control Ns 3, Nr 13 Local RWS 1024 (default), Remote RWS 1024 Control channel Congestion Control is disabled Tunnel PMTU checking disabled Retransmission time 1, max 1 seconds Unsent queuesize 0, max 0 Resend queuesize 0, max 1 Total resends 0, ZLB ACKs sent 12 Total out-of-order dropped pkts 0 Total out-of-order reorder pkts 0 Total peer authentication failures 0 Current no session pak queue check 0 of 5 Retransmit time distribution: 0 0 0 0 0 0 0 0 0 Control message authentication is disabled R2#show l2tun tunnel all L2TP Tunnel Information Total tunnels 1 sessions 2 Tunnel id 1806975601 is up, remote id is 4276657069, 2 active sessions Remotely initiated tunnel Tunnel state is established, time since change 00:13:47 Tunnel transport is IP (115) Remote tunnel name is R1 Internet Address 10.1.1.1, port 0 Local tunnel name is R2 Internet Address 10.1.1.2, port 0 L2TP class for tunnel is L2TP-CLASS Counters, taking last clear into account: 0 packets sent, 0 received 0 bytes sent, 0 received Last clearing of counters never Counters, ignoring last clear: 0 packets sent, 0 received 0 bytes sent, 0 received Control Ns 14, Nr 3 Local RWS 1024 (default), Remote RWS 1024 Control channel Congestion Control is disabled Tunnel PMTU checking disabled Retransmission time 1, max 1 seconds Unsent queuesize 0, max 0 Resend queuesize 0, max 1 Total resends 0, ZLB ACKs sent 2 Total out-of-order dropped pkts 0 Total out-of-order reorder pkts 0 Total peer authentication failures 0 Current no session pak queue check 0 of 5 Retransmit time distribution: 0 0 0 0 0 0 0 0 0 Control message authentication is disabled R1#show l2tun session all L2TP Session Information Total tunnels 1 sessions 2 Session id 102 is up, logical session id 65548, tunnel id 4276657069 Remote session id is 102, remote tunnel id 1806975601 Locally initiated session Unique ID is 4 Session Layer 2 circuit, type is PPP, name is Serial1/0 Session vcid is 102 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 0 Remote tunnel name is Internet address is 10.1.1.2 Local tunnel name is Internet address is 10.1.1.1 IP protocol 115 Session is manually signaled Session state is established, time since change 00:15:06 408 Packets sent, 406 received 20885 Bytes sent, 20891 received Last clearing of counters never Counters, ignoring last clear: 408 Packets sent, 406 received 20885 Bytes sent, 20891 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified Session cookie information: local cookie, size 4 bytes, value 00 00 00 01 remote cookie, size 4 bytes, value 00 00 00 01 FS cached header information: encap size = 28 bytes 45000014 00000000 ff73a572 0a010101 0a010102 00000066 00000001 Sequencing is off Conditional debugging is disabled SSM switch id is 8200, SSM segment id is 16405 Session id 101 is up, logical session id 32778, tunnel id 4276657069 Remote session id is 101, remote tunnel id 1806975601 Locally initiated session Unique ID is 1 Session Layer 2 circuit, type is Ethernet, name is FastEthernet0/1 Session vcid is 101 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 0 Remote tunnel name is Internet address is 10.1.1.2 Local tunnel name is Internet address is 10.1.1.1 IP protocol 115 Session is manually signaled Session state is established, time since change 00:15:06 315 Packets sent, 310 received 26766 Bytes sent, 26400 received Last clearing of counters never Counters, ignoring last clear: 315 Packets sent, 310 received 26766 Bytes sent, 26400 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified Session cookie information: local cookie, size 4 bytes, value 00 00 00 01 remote cookie, size 4 bytes, value 00 00 00 01 FS cached header information: encap size = 28 bytes 45000014 00000000 ff73a572 0a010101 0a010102 00000065 00000001 Sequencing is off Conditional debugging is disabled SSM switch id is 4102, SSM segment id is 12308 R2#show l2tun session all L2TP Session Information Total tunnels 1 sessions 2 Session id 102 is up, logical session id 65548, tunnel id 1806975601 Remote session id is 102, remote tunnel id 4276657069 Locally initiated session Unique ID is 4 Session Layer 2 circuit, type is PPP, name is Serial1/0 Session vcid is 102 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 0 Remote tunnel name is Internet address is 10.1.1.1 Local tunnel name is Internet address is 10.1.1.2 IP protocol 115 Session is manually signaled Session state is established, time since change 00:15:56 433 Packets sent, 427 received 22397 Bytes sent, 21989 received Last clearing of counters never Counters, ignoring last clear: 433 Packets sent, 427 received 22397 Bytes sent, 21989 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified Session cookie information: local cookie, size 4 bytes, value 00 00 00 01 remote cookie, size 4 bytes, value 00 00 00 01 FS cached header information: encap size = 28 bytes 45000014 00000000 ff73a572 0a010102 0a010101 00000066 00000001 Sequencing is off Conditional debugging is disabled SSM switch id is 8200, SSM segment id is 16405 Session id 101 is up, logical session id 32778, tunnel id 1806975601 Remote session id is 101, remote tunnel id 4276657069 Locally initiated session Unique ID is 1 Session Layer 2 circuit, type is Ethernet, name is FastEthernet0/1 Session vcid is 101 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 0 Remote tunnel name is Internet address is 10.1.1.1 Local tunnel name is Internet address is 10.1.1.2 IP protocol 115 Session is manually signaled Session state is established, time since change 00:15:56 329 Packets sent, 330 received 27997 Bytes sent, 28095 received Last clearing of counters never Counters, ignoring last clear: 329 Packets sent, 330 received 27997 Bytes sent, 28095 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified Session cookie information: local cookie, size 4 bytes, value 00 00 00 01 remote cookie, size 4 bytes, value 00 00 00 01 FS cached header information: encap size = 28 bytes 45000014 00000000 ff73a572 0a010102 0a010101 00000065 00000001 Sequencing is off Conditional debugging is disabled SSM switch id is 4102, SSM segment id is 12307
!! -- Customer A Site-1 router can reach Site-2 Router WAN IP -- !! !! -- through L2TPV3 tunneling over Service Provider IP network -- !! R4#ping 172.16.45.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.16.45.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 96/103/108 ms !! -- Customer A Site-1 Router would see Site-2 Router as -- !! !! -- directly connected as they would be directly connected -- !! !! -- on a layer 2 network -- !! R4#ping 172.16.45.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.16.45.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 96/103/108 ms R4#show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID Local Intrfce Holdtme Capability Platform Port ID R5 Fas 0/1 145 R 7206VXR Fas 0/1 R4#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 172.16.45.2 Fa0/1 10 00:17:52 1605 5000 0 3 R4#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 3 masks C 172.16.4.0/24 is directly connected, FastEthernet0/0 L 172.16.4.4/32 is directly connected, FastEthernet0/0 D 172.16.5.0/24 [90/30720] via 172.16.45.2, 00:18:16, FastEthernet0/1 C 172.16.45.0/30 is directly connected, FastEthernet0/1 L 172.16.45.1/32 is directly connected, FastEthernet0/1 R5#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 3 masks D 172.16.4.0/24 [90/30720] via 172.16.45.1, 00:22:24, FastEthernet0/1 C 172.16.5.0/24 is directly connected, FastEthernet0/0 L 172.16.5.5/32 is directly connected, FastEthernet0/0 C 172.16.45.0/30 is directly connected, FastEthernet0/1 L 172.16.45.2/32 is directly connected, FastEthernet0/1 R4#ping 172.16.5.5 source 172.16.4.4 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.16.5.5, timeout is 2 seconds: Packet sent with a source address of 172.16.4.4 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 84/95/100 ms R4#traceroute 172.16.5.5 source 172.16.4.4 Type escape sequence to abort. Tracing the route to 172.16.5.5 VRF info: (vrf in name/id, vrf out name/id) 1 172.16.45.2 100 msec * 92 msec !! -- Customer B Site-1 router can reach Site-2 Router WAN IP -- !! !! -- through L2TPV3 tunneling over Service Provider IP network -- !! R6#ping 192.168.67.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.67.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 96/105/116 ms R6#show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID Local Intrfce Holdtme Capability Platform Port ID R7 Ser 1/0 136 R 7206VXR Ser 1/0 R6#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 192.168.67.2 Se1/0 14 00:22:46 140 840 0 3 R6#show ip route | beg Gate Gateway of last resort is not set 192.168.6.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.6.0/24 is directly connected, FastEthernet0/0 L 192.168.6.6/32 is directly connected, FastEthernet0/0 D 192.168.7.0/24 [90/2172416] via 192.168.67.2, 00:22:57, Serial1/0 192.168.67.0/24 is variably subnetted, 3 subnets, 2 masks C 192.168.67.0/30 is directly connected, Serial1/0 L 192.168.67.1/32 is directly connected, Serial1/0 C 192.168.67.2/32 is directly connected, Serial1/0 R6#ping 192.168.7.7 source 192.168.6.6 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.7.7, timeout is 2 seconds: Packet sent with a source address of 192.168.6.6 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 96/103/112 ms R6#traceroute 192.168.7.7 source 192.168.6.6 Type escape sequence to abort. Tracing the route to 192.168.7.7 VRF info: (vrf in name/id, vrf out name/id) 1 192.168.67.2 92 msec * 104 msec
The only differences are in the configuration of the pseudowire class or template as well as the attachment circuit configuration. In comparison to implementation of static/manual L2TPV3 tunnel configuration, Dynamic L2TPV3 Tunnel configuration is the configuration of a protocol for signalling the control channel parameters. We used “protocol none” (no signalling protocol) in pseudowire-class with static/manual tunnel configuration. We will not use this command with Dynamic tunnel configuration. By default it will use L2TP for signalling here.
R1 - Provider Edge Router connected to Customer Routers hostname R1 ! ip cef ! pseudowire-class PW-CLASS encapsulation l2tpv3 ip local interface Loopback0 ! interface Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 10.1.13.1 255.255.255.0 ip ospf network point-to-point ! interface FastEthernet0/1 description To Cust-A Site-1 R4 no ip address no cdp enable xconnect 10.1.1.2 101 pw-class PW-CLASS ! interface Serial1/0 description To Cust-B Site-1 R6 no ip address encapsulation ppp no cdp enable xconnect 10.1.1.2 102 pw-class PW-CLASS ! router ospf 1 network 10.1.0.0 0.0.255.255 area 0 ! R2 - Provider Edge Router connected to Customer Routers hostname R2 ! ip cef ! pseudowire-class PW-CLASS encapsulation l2tpv3 ip local interface Loopback0 ! interface Loopback0 ip address 10.1.1.2 255.255.255.255 ! interface FastEthernet0/0 ip address 10.1.23.2 255.255.255.0 ip ospf network point-to-point ! interface FastEthernet0/1 description To Cust-A Site-2 R5 no ip address no cdp enable xconnect 10.1.1.1 101 pw-class PW-CLASS ! interface Serial1/0 description To Cust-B Site-2 R7 no ip address encapsulation ppp no cdp enable xconnect 10.1.1.1 102 pw-class PW-CLASS ! router ospf 1 network 10.1.0.0 0.0.255.255 area 0 !
R1#show l2tun tunnel all L2TP Tunnel Information Total tunnels 1 sessions 2 Tunnel id 1776971907 is up, remote id is 329857833, 2 active sessions Remotely initiated tunnel Tunnel state is established, time since change 00:04:40 Tunnel transport is IP (115) Remote tunnel name is R2 Internet Address 10.1.1.2, port 0 Local tunnel name is R1 Internet Address 10.1.1.1, port 0 L2TP class for tunnel is l2tp_default_class Counters, taking last clear into account: 235 packets sent, 232 received 15766 bytes sent, 15568 received Last clearing of counters never Counters, ignoring last clear: 235 packets sent, 232 received 15766 bytes sent, 15568 received Control Ns 5, Nr 11 Local RWS 1024 (default), Remote RWS 1024 Control channel Congestion Control is disabled Tunnel PMTU checking disabled Retransmission time 1, max 1 seconds Unsent queuesize 0, max 0 Resend queuesize 0, max 2 Total resends 0, ZLB ACKs sent 8 Total out-of-order dropped pkts 0 Total out-of-order reorder pkts 0 Total peer authentication failures 0 Current no session pak queue check 0 of 5 Retransmit time distribution: 0 0 0 0 0 0 0 0 0 Control message authentication is disabled R1#show l2tun session all L2TP Session Information Total tunnels 1 sessions 2 Session id 1211541847 is up, logical session id 98324, tunnel id 1776971907 Remote session id is 132911511, remote tunnel id 329857833 Remotely initiated session Unique ID is 4 Session Layer 2 circuit, type is PPP, name is Serial1/0 Session vcid is 102 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 1898000001 Remote tunnel name is R2 Internet address is 10.1.1.2 Local tunnel name is R1 Internet address is 10.1.1.1 IP protocol 115 Session is L2TP signaled Session state is established, time since change 00:05:01 142 Packets sent, 142 received 7563 Bytes sent, 7583 received Last clearing of counters never Counters, ignoring last clear: 142 Packets sent, 142 received 7563 Bytes sent, 7583 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified No session cookie information available FS cached header information: encap size = 24 bytes 45000014 00000000 ff73a572 0a010101 0a010102 07ec1197 Sequencing is off Conditional debugging is disabled SSM switch id is 8198, SSM segment id is 12312 Session id 2531932146 is up, logical session id 65558, tunnel id 1776971907 Remote session id is 490732246, remote tunnel id 329857833 Remotely initiated session Unique ID is 1 Session Layer 2 circuit, type is Ethernet, name is FastEthernet0/1 Session vcid is 101 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 1898000002 Remote tunnel name is R2 Internet address is 10.1.1.2 Local tunnel name is R1 Internet address is 10.1.1.1 IP protocol 115 Session is L2TP signaled Session state is established, time since change 00:05:01 109 Packets sent, 106 received 9059 Bytes sent, 8841 received Last clearing of counters never Counters, ignoring last clear: 109 Packets sent, 106 received 9059 Bytes sent, 8841 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified No session cookie information available FS cached header information: encap size = 24 bytes 45000014 00000000 ff73a572 0a010101 0a010102 1d3ffad6 Sequencing is off Conditional debugging is disabled SSM switch id is 4100, SSM segment id is 16409 R2#show l2tun tunnel all L2TP Tunnel Information Total tunnels 1 sessions 2 Tunnel id 329857833 is up, remote id is 1776971907, 2 active sessions Locally initiated tunnel Tunnel state is established, time since change 00:06:02 Tunnel transport is IP (115) Remote tunnel name is R1 Internet Address 10.1.1.1, port 0 Local tunnel name is R2 Internet Address 10.1.1.2, port 0 L2TP class for tunnel is l2tp_default_class Counters, taking last clear into account: 295 packets sent, 297 received 19736 bytes sent, 19872 received Last clearing of counters never Counters, ignoring last clear: 295 packets sent, 297 received 19736 bytes sent, 19872 received Control Ns 13, Nr 5 Local RWS 1024 (default), Remote RWS 1024 Control channel Congestion Control is disabled Tunnel PMTU checking disabled Retransmission time 1, max 1 seconds Unsent queuesize 0, max 0 Resend queuesize 0, max 3 Total resends 0, ZLB ACKs sent 4 Total out-of-order dropped pkts 0 Total out-of-order reorder pkts 0 Total peer authentication failures 0 Current no session pak queue check 0 of 5 Retransmit time distribution: 0 0 0 0 0 0 0 0 0 Control message authentication is disabled R2#show l2tun session all L2TP Session Information Total tunnels 1 sessions 2 Session id 132911511 is up, logical session id 65548, tunnel id 329857833 Remote session id is 1211541847, remote tunnel id 1776971907 Locally initiated session Unique ID is 4 Session Layer 2 circuit, type is PPP, name is Serial1/0 Session vcid is 102 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 1898000001 Remote tunnel name is R1 Internet address is 10.1.1.1 Local tunnel name is R2 Internet address is 10.1.1.2 IP protocol 115 Session is L2TP signaled Session state is established, time since change 00:06:16 175 Packets sent, 174 received 9117 Bytes sent, 9035 received Last clearing of counters never Counters, ignoring last clear: 175 Packets sent, 174 received 9117 Bytes sent, 9035 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified No session cookie information available FS cached header information: encap size = 24 bytes 45000014 00000000 ff73a572 0a010102 0a010101 4836a957 Sequencing is off Conditional debugging is disabled SSM switch id is 8198, SSM segment id is 12310 Session id 490732246 is up, logical session id 32776, tunnel id 329857833 Remote session id is 2531932146, remote tunnel id 1776971907 Locally initiated session Unique ID is 1 Session Layer 2 circuit, type is Ethernet, name is FastEthernet0/1 Session vcid is 101 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 1898000002 Remote tunnel name is R1 Internet address is 10.1.1.1 Local tunnel name is R2 Internet address is 10.1.1.2 IP protocol 115 Session is L2TP signaled Session state is established, time since change 00:06:16 132 Packets sent, 135 received 11203 Bytes sent, 11421 received Last clearing of counters never Counters, ignoring last clear: 132 Packets sent, 135 received 11203 Bytes sent, 11421 received Receive packets dropped: out-of-order: 0 other: 0 total: 0 Send packets dropped: exceeded session MTU: 0 other: 0 total: 0 DF bit off, ToS reflect disabled, ToS value 0, TTL value 255 Sending UDP checksums are disabled Received UDP checksums are verified No session cookie information available FS cached header information: encap size = 24 bytes 45000014 00000000 ff73a572 0a010102 0a010101 96ea37f2 Sequencing is off Conditional debugging is disabled SSM switch id is 4100, SSM segment id is 16407
R4#ping 172.16.45.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.16.45.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 92/105/116 ms R4#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 172.16.45.2 Fa0/1 14 00:07:29 192 1152 0 3 R4#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 3 masks C 172.16.4.0/24 is directly connected, FastEthernet0/0 L 172.16.4.4/32 is directly connected, FastEthernet0/0 D 172.16.5.0/24 [90/30720] via 172.16.45.2, 00:07:45, FastEthernet0/1 C 172.16.45.0/30 is directly connected, FastEthernet0/1 L 172.16.45.1/32 is directly connected, FastEthernet0/1 R6#ping 192.168.67.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.67.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 96/104/116 ms R6#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 192.168.67.2 Se1/0 12 00:08:43 119 714 0 3 R6#show ip route | beg Gate Gateway of last resort is not set 192.168.6.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.6.0/24 is directly connected, FastEthernet0/0 L 192.168.6.6/32 is directly connected, FastEthernet0/0 D 192.168.7.0/24 [90/2172416] via 192.168.67.2, 00:08:50, Serial1/0 192.168.67.0/24 is variably subnetted, 3 subnets, 2 masks C 192.168.67.0/30 is directly connected, Serial1/0 L 192.168.67.1/32 is directly connected, Serial1/0 C 192.168.67.2/32 is directly connected, Serial1/0
GET VPN is a Cisco solution to encrypt the traffic across private WAN. In recent years government regulations, such as Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), and Payment Card Industry Data Security Standard (PCI DSS), mandate encryption even over private IP networks. GET VPN is common deployed over private WAN topologies such as MPLS VPN.
Cisco IOS offers several IP security (IPsec) tunnel-based encryption solutions (for example, Site to Site IPsec, IPsec/GRE, and Dynamic Multipoint VPN (DMVPN) that can be deployed over an MPLS VPN, VPLS or shared IP networks. Traditional tunnel-based encryption solutions are point-to-point.
GET VPN uses IPSec to encrypt the traffic but the main concept of GET VPN is to use group security association (SA) as opposed to the standard LAN to LAN tunnels where the SA is created in a point to point fashion.
Traditional point-to-point IPsec tunneling solutions suffer from multicast replication issues because multicast replication must be performed before tunnel encapsulation and encryption at the IPsec CE (customer edge) router closest to the multicast source. Multicast replication cannot be performed in the provider network because encapsulated multicasts appear to the core network as unicast data.
GET VPN provides a tunnel-less VPN solution. It is tunnel-less as it retains the original IP header of the packet and encrypts only the data payload. To retain the original IP header, the original header is copied and placed before the IPSEC header. GET VPN does not rely on a point-to-point VPN mechanism and can further expand with the capability of scaling any-to-any intersite VPN connectivity. It takes advantage of underlying IP VPN routing infrastructure and does not require an overlay routing control plane.
Cisco’s Group Encrypted Transport VPN (GET VPN) introduces the concept of a trusted group to eliminate point-to-point tunnels and their associated overlay routing. All group members (GMs) share a common security association (SA), also known as a group SA. This enables GMs to decrypt traffic that was encrypted by any other GM. The CE router acts as a GM. In GET VPN networks, there is no need to negotiate point-to- point IPsec tunnels between the members of a group, because GET VPN is “tunnel-less.”
The GDOI group key management protocol is used to provide a set of cryptographic keys and policies to a group of devices. In a GET VPN network, GDOI is used to distribute common IPsec keys to a group of enterprise VPN gateways that must communicate securely. These keys are periodically refreshed and are updated on all the VPN gateways using a process called “rekey.” GDOI protocol uses UDP port 848. GDOI is documented in RFC3547.
The GDOI protocol is protected by a Phase 1 Internet Key Exchange (IKE) SA. The participating VPN gateways authenticate themselves to the device providing keys using IKE. Authentication can be performed with a pre-shared key (PSK) or through a public key infrastructure (PKI). After the VPN gateways have been authenticated and provided with the appropriate security keys via the IKE SA, the IKE SA will expire and GDOI is then used to update the GMs in a more scalable and efficient manner.
A key server (KS) is an IOS device responsible for creating and maintaining the GET VPN control plane. All encryption policies, such as interesting traffic, encryption protocols, security association, rekey timers, and so on, are centrally defined on the KS and are pushed down to all GMs at registration time. The KS sends two types of keys:
The TEK becomes the IPsec SA, which is used to communicate with group members within the same group.
The KEK is used to encrypt the rekey messages and is used by the group members (GMs) to decrypt the incoming rekey messages from the key server (KS).
The KS is the most important entity in the GET VPN network because the KS maintains the control plane. Therefore, a single KS is a single point of failure for an entire GET VPN network. Because redundancy is an important consideration for KSs, GET VPN supports multiple KSs, called cooperative (COOP) KSs, to ensure seamless fault recovery if a KS fails or becomes unreachable.
A GM can be configured to register to any available KS from a list of all COOP KSs. GM configuration determines the registration order. The KS defined first is contacted first, followed by the second defined KS, and so on.
When COOP KSs boot, all KSs assume a “secondary” role and begin an election process. One KS, typically the one having the highest priority, is elected as a “primary” KS. The other KSs remain in the secondary state. The primary KS is responsible for creating and distributing group policies to all GMs, and to periodically synchronize the COOP KSs.
The group member (GM) is the router that registers with the key server (KS) to get the IPsec SA to communicate with other devices in the group.
Unlike traditional IPsec encryption solutions, GET VPN uses the concept of group SA. All members in the GET VPN group can communicate with each other using a common encryption policy and a shared SA. With a common encryption policy and a shared SA, there is no need to negotiate IPsec between GMs.
Traffic that requires encryption is statically defined on the key server (KS) through an access control list (ACL). This policy is defined for both unicast and multicast traffic. This information is sent to all authenticated group members (GMs) to create a trusted domain of communication.
It is a best practice to summarize interesting traffic to as few permit entries as possible, and to build symmetric policies. For example, an enterprise network is using subnets from a class A major IP network 10.0.0.0/8 for all LAN interfaces behind the group members. You can define one ACL permit statement “access-list 101 permit ip 10.0.0.0 0.255.255.255 10.0.0.0 0.255.255.255” to represent all the subnets in your network.
The KS will generate a rekey message and send multiple copies of this message, one copy to each GM. The GM will then ACK this rekey message to the KS. The ACK mechanism keeps the list of GMs at the KS current and ensures that the rekey message is only sent to active GMs.
A KS can be configured to re-transmit rekey messages to overcome reachability issues in the network. If a GM does not send an ACK for three consecutive rekey messages, the KS will remove the GM from the active GM database and stop sending rekey messages to that GM.
In the multicast rekey process, a single copy of the rekey message is sent to a multicast group which the GMs will have joined. Each GM joins this multicast group at registration, each GM will therefore receive this rekey message.
The multicast rekey process does not have an ACK mechanism and the KS does not keep a list of active GMs. The KS can be configured to retransmit rekey messages. The CPU overhead is a lot less with multicast rekeying since only a single messages needs to be sent compared to having to replicating it in unicast mode to potentially hundreds of routers.
Multicast must be enabled in the core network for multicast rekey to work in the GET VPN control plane.
Traditional IPSec solutions have anti replay capabilities to prevent a malicious third party from capturing IPSec packets and relaying those packets at a later time to perform an attack against the IPSec endpoints. This is normally done by having a counter based sliding window where the sender sends a packet with a sequence number and the receiver will use the sliding window to determine if the packet is acceptable or if it has arrived out of sequence and outside the window of acceptable packets.
This mechanism is not useful in GET VPN because it uses a group SA. GET VPN therefore uses a time based anti replay function where the KS uses a pseudo time clock. Because the KS uses a pseudo time clock, there is no need to synchronize the time with NTP for this reason.
The primary KS will keep this pseudo time synchronized on all GMs with rekey updates. Every GM will include its pseudo time as a time stamp in the data packets. The receiving VPN gateway will then compare the time stamp of the received packet with the GM reference pseudo time clock it maintains for the group. If the packet is too late it will be dropped.
We will use following topology for GET VPN implementation.
R1 - PE Router hostname R1 ! vrf definition CUST-A rd 100:1 ! address-family ipv4 route-target export 100:1 route-target import 100:1 exit-address-family ! ip cef ! interface Loopback0 ip address 10.1.0.1 255.255.255.255 ip ospf 1 area 0 ! interface FastEthernet0/0 ip address 10.1.15.1 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! interface FastEthernet0/1 vrf forwarding CUST-A ip address 172.16.16.1 255.255.255.0 ! router ospf 1 router-id 10.1.0.1 ! router bgp 100 bgp router-id 10.1.0.1 bgp log-neighbor-changes no bgp default ipv4-unicast neighbor 10.1.0.5 remote-as 100 neighbor 10.1.0.5 update-source Loopback0 ! address-family ipv4 exit-address-family ! address-family vpnv4 neighbor 10.1.0.5 activate neighbor 10.1.0.5 send-community extended exit-address-family ! address-family ipv4 vrf CUST-A redistribute connected neighbor 172.16.16.6 remote-as 65001 neighbor 172.16.16.6 activate neighbor 172.16.16.6 as-override exit-address-family ! R2 - PE Router hostname R2 ! vrf definition CUST-A rd 100:1 ! address-family ipv4 route-target export 100:1 route-target import 100:1 exit-address-family ! ip cef ! interface Loopback0 ip address 10.1.0.2 255.255.255.255 ip ospf 1 area 0 ! interface FastEthernet0/0 ip address 10.1.25.2 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! interface FastEthernet0/1 vrf forwarding CUST-A ip address 172.16.27.2 255.255.255.0 ! router ospf 1 router-id 10.1.0.2 ! router bgp 100 bgp router-id 10.1.0.2 bgp log-neighbor-changes no bgp default ipv4-unicast neighbor 10.1.0.5 remote-as 100 neighbor 10.1.0.5 update-source Loopback0 ! address-family ipv4 exit-address-family ! address-family vpnv4 neighbor 10.1.0.5 activate neighbor 10.1.0.5 send-community extended exit-address-family ! address-family ipv4 vrf CUST-A redistribute connected neighbor 172.16.27.7 remote-as 65001 neighbor 172.16.27.7 activate neighbor 172.16.27.7 as-override exit-address-family ! R3 - PE Router hostname R3 ! vrf definition CUST-A rd 100:1 ! address-family ipv4 route-target export 100:1 route-target import 100:1 exit-address-family ! ip cef ! interface Loopback0 ip address 10.1.0.3 255.255.255.255 ip ospf 1 area 0 ! interface FastEthernet0/0 ip address 10.1.35.3 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! interface FastEthernet0/1 vrf forwarding CUST-A ip address 172.16.38.3 255.255.255.0 ! router ospf 1 router-id 10.1.0.3 ! router bgp 100 bgp router-id 10.1.0.3 bgp log-neighbor-changes no bgp default ipv4-unicast neighbor 10.1.0.5 remote-as 100 neighbor 10.1.0.5 update-source Loopback0 ! address-family ipv4 exit-address-family ! address-family vpnv4 neighbor 10.1.0.5 activate neighbor 10.1.0.5 send-community extended exit-address-family ! address-family ipv4 vrf CUST-A redistribute connected neighbor 172.16.38.8 remote-as 65001 neighbor 172.16.38.8 activate neighbor 172.16.38.8 as-override exit-address-family ! R4 - PE Router hostname R4 ! vrf definition CUST-A rd 100:1 ! address-family ipv4 route-target export 100:1 route-target import 100:1 exit-address-family ! ip cef ! interface Loopback0 ip address 10.1.0.4 255.255.255.255 ip ospf 1 area 0 ! interface FastEthernet0/0 ip address 10.1.45.4 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! interface FastEthernet0/1 vrf forwarding CUST-A ip address 172.16.49.4 255.255.255.0 ! router ospf 1 router-id 10.1.0.4 ! router bgp 100 bgp router-id 10.1.0.4 bgp log-neighbor-changes no bgp default ipv4-unicast neighbor 10.1.0.5 remote-as 100 neighbor 10.1.0.5 update-source Loopback0 ! address-family ipv4 exit-address-family ! address-family vpnv4 neighbor 10.1.0.5 activate neighbor 10.1.0.5 send-community extended exit-address-family ! address-family ipv4 vrf CUST-A redistribute connected neighbor 172.16.49.9 remote-as 65001 neighbor 172.16.49.9 activate neighbor 172.16.49.9 as-override exit-address-family ! R5 - P Router hostname R5 ! ip cef ! interface Loopback0 ip address 10.1.0.5 255.255.255.255 ip ospf 1 area 0 ! interface FastEthernet0/0 ip address 10.1.15.5 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! interface FastEthernet0/1 ip address 10.1.25.5 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! interface FastEthernet1/0 ip address 10.1.35.5 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! interface FastEthernet1/1 ip address 10.1.45.5 255.255.255.0 ip ospf network point-to-point ip ospf 1 area 0 mpls ip ! router ospf 1 router-id 10.1.0.5 ! router bgp 100 bgp router-id 10.1.0.5 bgp log-neighbor-changes no bgp default ipv4-unicast neighbor PE-ROUTERS peer-group neighbor PE-ROUTERS remote-as 100 neighbor PE-ROUTERS update-source Loopback0 neighbor 10.1.0.1 peer-group PE-ROUTERS neighbor 10.1.0.2 peer-group PE-ROUTERS neighbor 10.1.0.3 peer-group PE-ROUTERS neighbor 10.1.0.4 peer-group PE-ROUTERS ! address-family ipv4 exit-address-family ! address-family vpnv4 neighbor PE-ROUTERS send-community extended neighbor PE-ROUTERS route-reflector-client neighbor 10.1.0.1 activate neighbor 10.1.0.2 activate neighbor 10.1.0.3 activate neighbor 10.1.0.4 activate exit-address-family !
We need to generate RSA key before key server (KS) configurations. RSA keys must be generated on any KS. All KSs must share the same keys, so these keys must be generated with an “exportable” tag. The keys are then imported on the remaining KSs. These keys do not need to be imported on the GMs.
!! -- Generate RSA key on Primary Key Server Router R10 -- !! R10-Primary-KS#conf t Enter configuration commands, one per line. End with CNTL/Z. R10-Primary-KS(config)#crypto key generate rsa general-keys label getvpn-export-general modulus 1024 exportable The name for the keys will be: getvpn-export-general % The key modulus size is 1024 bits % Generating 1024 bit RSA keys, keys will be exportable... [OK] (elapsed time was 1 seconds) R10-Primary-KS(config)# !! -- Export this key to the terminal -- !! R10-Primary-KS(config)#crypto key export rsa getvpn-export-general pem terminal 3des myrsakeypasswd % Key name: getvpn-export-general Usage: General Purpose Key Key data: -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC0W2WX/cvI41mAJ+AbDgOMpRbi l6FPtOIiw6SDYa3z4GixsYqem5pt7SLk/spxLeHFNsYaD7XqzRAj/hmDWpfrHOmE IANfiCwfhnh4/Ep1a0+dBKCqK7C90qtQQswdDJfdX8Eunbp93E73caSws4Qkpwqs iEigKWoAauIvFlDV6QIDAQAB -----END PUBLIC KEY----- -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,DAAC1EB9DAA8FA6D HqkzonxyuD6bXNJZD6+Zblyscwuvbfskhs9mLnYo1CflKMUxHv1XU/5Ctdvmirp2 AVzlWFgR/FFriVYofQoT1BbCtoCJXsT4nPbF07K/rsBsP7HXX0UEsh6zx/Tagv6Q EBOjk15Tfx+yP3twIpK7jN3hp/81Yjybg+hDV2sfVElqpVShHr8HrAqpiQdtuQiC MNUtC3/GJy95CO0Wpg/qAKknG4H/wEQqG4wXU0yZ8qUE71xlO7p9Z2GqGMjcRmwZ ADsIKvGBwNQSg77VZ+Bq2zYLosThz63r1kn7oVxt2dU4wNSpu3CvcAlVhxf7TJoW mKCr7H99Yk8upFH6Nh+HUG6+BhFZEkkDOjIU1CJeFFO1qEToQA1U4ue0OMt0IQnU KMA+1IfNCIoH05L4+x2TRHu+uEk1tgu5smU+QmJYSwn6drj74poXsuRcJgNs4VWO 0B7phKvaoXXUdkXiyaOMgHacnnCHL8LEzmp6BzVUbDCbBtYomeaFCI6B7BaOvwDv sr1Z85xgynXhm1vGWJNd45Lk7+SSVaOp6qp/IIAcFTbA1OfqtWayMMcDHRsc1m3O iyn5fa4AUlx6smkhkBe7lh1FCQh+C1DrZdrKVWmo7iuDfAxdC6IW+XiUW1gwlnKd taw4Fy+AALlhMc/pKHqx2WVX1s6SAWgxwhsjxbFIZXSDdRfhkLdl9QAd6G0zVsBq U7J1rPwZ1dMtZTDfyj/KSl2DbPpv90vJYGHMcU+h49XfBNF2QsizIkx8mjegmX0O +ep0LsrsqV5XnMeotYzCTPNmb6PoE/fN+YdhzjWJHmTOt6HAdhRsKw== -----END RSA PRIVATE KEY----- R10-Primary-KS(config)# !! -- Import this key using cut-and-paste -- !! !! -- to other Key Server (KS) Router R11 -- !! R11-Backup-KS#conf t Enter configuration commands, one per line. End with CNTL/Z. R11-Backup-KS(config)#crypto key import rsa getvpn-export-general pem exportable terminal myrsakeypasswd % Enter PEM-formatted public General Purpose key or certificate. % End with a blank line or "quit" on a line by itself. -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC0W2WX/cvI41mAJ+AbDgOMpRbi l6FPtOIiw6SDYa3z4GixsYqem5pt7SLk/spxLeHFNsYaD7XqzRAj/hmDWpfrHOmE IANfiCwfhnh4/Ep1a0+dBKCqK7C90qtQQswdDJfdX8Eunbp93E73caSws4Qkpwqs iEigKWoAauIvFlDV6QIDAQAB -----END PUBLIC KEY----- quit % Enter PEM-formatted encrypted private General Purpose key. % End with "quit" on a line by itself. -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,DAAC1EB9DAA8FA6D HqkzonxyuD6bXNJZD6+Zblyscwuvbfskhs9mLnYo1CflKMUxHv1XU/5Ctdvmirp2 AVzlWFgR/FFriVYofQoT1BbCtoCJXsT4nPbF07K/rsBsP7HXX0UEsh6zx/Tagv6Q EBOjk15Tfx+yP3twIpK7jN3hp/81Yjybg+hDV2sfVElqpVShHr8HrAqpiQdtuQiC MNUtC3/GJy95CO0Wpg/qAKknG4H/wEQqG4wXU0yZ8qUE71xlO7p9Z2GqGMjcRmwZ ADsIKvGBwNQSg77VZ+Bq2zYLosThz63r1kn7oVxt2dU4wNSpu3CvcAlVhxf7TJoW mKCr7H99Yk8upFH6Nh+HUG6+BhFZEkkDOjIU1CJeFFO1qEToQA1U4ue0OMt0IQnU KMA+1IfNCIoH05L4+x2TRHu+uEk1tgu5smU+QmJYSwn6drj74poXsuRcJgNs4VWO 0B7phKvaoXXUdkXiyaOMgHacnnCHL8LEzmp6BzVUbDCbBtYomeaFCI6B7BaOvwDv sr1Z85xgynXhm1vGWJNd45Lk7+SSVaOp6qp/IIAcFTbA1OfqtWayMMcDHRsc1m3O iyn5fa4AUlx6smkhkBe7lh1FCQh+C1DrZdrKVWmo7iuDfAxdC6IW+XiUW1gwlnKd taw4Fy+AALlhMc/pKHqx2WVX1s6SAWgxwhsjxbFIZXSDdRfhkLdl9QAd6G0zVsBq U7J1rPwZ1dMtZTDfyj/KSl2DbPpv90vJYGHMcU+h49XfBNF2QsizIkx8mjegmX0O +ep0LsrsqV5XnMeotYzCTPNmb6PoE/fN+YdhzjWJHmTOt6HAdhRsKw== -----END RSA PRIVATE KEY----- quit % Key pair import succeeded. R11-Backup-KS(config)#
!! -- R10 Primary Key Server Router -- !! hostname R10-Primary-KS ! !! -- IKE Phase 1 Configuration -- !! crypto isakmp policy 10 encr aes 256 authentication pre-share group 2 !! --Defined Pre-shared key for peers network range 172.16.0.0/16--!! crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.0.0 crypto isakmp keepalive 10 periodic ! !! -- Transform Set Configuration -- !! crypto ipsec transform-set GDOI-TRANS esp-aes 256 esp-sha256-hmac mode transport ! !! -- IPsec Profile Configuration -- !! crypto ipsec profile GDOI-PROFILE set security-association lifetime seconds 7200 set transform-set GDOI-TRANS ! !! -- GDOI Group Configuration -- !! crypto gdoi group GETVPN-GROUP identity number 1234 !! -- Local keyword identified this router as Key Server -- !! server local rekey retransmit 10 number 2 !! -- RSA Key -- !! rekey authentication mypubkey rsa getvpn-export-general !! -- Rekeying through unicast transport -- !! rekey transport unicast sa ipsec 1 !! -- Transform Set for Group Members -- !! profile GDOI-PROFILE !! -- Policies defining traffic to be encrypted -- !! match address ipv4 GETVPN-ACL replay time window-size 5 address ipv4 172.16.16.10 !! -- Enable Cooperative Key Server feature -- !! !! -- High Priority server decides the Primary Key Server Role -- !! !! -- All other Key Server(s) must be configured with as peers -- !! redundancy local priority 100 peer address ipv4 172.16.27.11 ! interface FastEthernet0/0 ip address 172.16.16.10 255.255.255.0 ! ip route 0.0.0.0 0.0.0.0 172.16.16.6 ! ip access-list extended GETVPN-ACL permit ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255 ! !! -- R11 Backup Key Server Router -- !! hostname R11-Backup-KS ! crypto isakmp policy 10 encr aes 256 authentication pre-share group 2 ! crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.0.0 crypto isakmp keepalive 10 periodic ! crypto ipsec transform-set GDOI-TRANS esp-aes 256 esp-sha256-hmac mode transport ! crypto ipsec profile GDOI-PROFILE set security-association lifetime seconds 7200 set transform-set GDOI-TRANS ! crypto gdoi group GETVPN-GROUP identity number 1234 server local rekey retransmit 10 number 2 rekey authentication mypubkey rsa getvpn-export-general rekey transport unicast sa ipsec 1 profile GDOI-PROFILE match address ipv4 GETVPN-ACL replay time window-size 5 address ipv4 172.16.27.11 redundancy local priority 75 peer address ipv4 172.16.16.10 ! interface FastEthernet0/0 ip address 172.16.27.11 255.255.255.0 ! ip route 0.0.0.0 0.0.0.0 172.16.27.7 ! ip access-list extended GETVPN-ACL permit ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255 ! !! -- R6 CE, GET VPN Group Member Router -- !! hostname R6-CE-GM ! !! -- IKE Phase 1 Configuration -- !! crypto isakmp policy 10 encr aes 256 authentication pre-share group 2 ! !! -- Defined Pre-shared key for Key Server Routers -- !! crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.16.10 crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.27.11 ! !! -- GDOI Group Configuration -- !! crypto gdoi group GETVPN-GROUP identity number 1234 server address ipv4 172.16.16.10 server address ipv4 172.16.27.11 ! !! -- Crypto MAP Configuration -- !! crypto map GETVPN-MAP 10 gdoi set group GETVPN-GROUP ! !! -- Associate Crypto MAP to the WAN Interfaces -- !! interface FastEthernet0/0 description To MPLS Provider ip address 172.16.16.6 255.255.255.0 crypto map GETVPN-MAP ! interface FastEthernet0/1 description To LAN ip address 192.168.6.6 255.255.255.0 ! router bgp 65001 bgp router-id 172.16.16.6 bgp log-neighbor-changes network 192.168.0.6 mask 255.255.255.255 network 192.168.6.0 neighbor 172.16.16.1 remote-as 100 ! !! -- R7 CE, GET VPN Group Member Router -- !! hostname R7-CE-GM ! crypto isakmp policy 10 encr aes 256 authentication pre-share group 2 ! crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.16.10 crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.27.11 ! crypto gdoi group GETVPN-GROUP identity number 1234 server address ipv4 172.16.16.10 server address ipv4 172.16.27.11 ! crypto map GETVPN-MAP 10 gdoi set group GETVPN-GROUP ! interface FastEthernet0/0 description To MPLS Provider ip address 172.16.27.7 255.255.255.0 crypto map GETVPN-MAP ! interface FastEthernet0/1 description To LAN ip address 192.168.7.7 255.255.255.0 ! router bgp 65001 bgp router-id 172.16.27.7 bgp log-neighbor-changes network 192.168.0.7 mask 255.255.255.255 network 192.168.7.0 neighbor 172.16.27.2 remote-as 100 ! !! -- R8 CE, GET VPN Group Member Router -- !! hostname R8-CE-GM ! crypto isakmp policy 10 encr aes 256 authentication pre-share group 2 ! crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.16.10 crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.27.11 ! crypto gdoi group GETVPN-GROUP identity number 1234 server address ipv4 172.16.16.10 server address ipv4 172.16.27.11 ! crypto map GETVPN-MAP 10 gdoi set group GETVPN-GROUP ! interface FastEthernet0/0 description To MPLS Provider ip address 172.16.38.8 255.255.255.0 crypto map GETVPN-MAP ! interface FastEthernet0/1 description To LAN ip address 192.168.8.8 255.255.255.0 ! router bgp 65001 bgp router-id 192.168.8.8 bgp log-neighbor-changes network 192.168.8.0 neighbor 172.16.38.3 remote-as 100 ! !! -- R9 CE, GET VPN Group Member Router -- !! hostname R9-CE-GM ! crypto isakmp policy 10 encr aes 256 authentication pre-share group 2 ! crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.16.10 crypto isakmp key $3cur3dG3tVpNK3Y address 172.16.27.11 ! crypto gdoi group GETVPN-GROUP identity number 1234 server address ipv4 172.16.16.10 server address ipv4 172.16.27.11 ! crypto map GETVPN-MAP 10 gdoi set group GETVPN-GROUP ! interface FastEthernet0/0 description To MPLS Provider ip address 172.16.49.9 255.255.255.0 crypto map GETVPN-MAP ! interface FastEthernet0/1 description To LAN ip address 192.168.9.9 255.255.255.0 ! router bgp 65001 bgp router-id 192.168.9.9 bgp log-neighbor-changes network 192.168.9.0 neighbor 172.16.49.4 remote-as 100 !
!! -- Routing on all Customer sites Routers -- !! R6-CE-GM#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks C 172.16.16.0/24 is directly connected, FastEthernet0/0 L 172.16.16.6/32 is directly connected, FastEthernet0/0 B 172.16.27.0/24 [20/0] via 172.16.16.1, 09:25:04 B 172.16.38.0/24 [20/0] via 172.16.16.1, 09:25:04 B 172.16.49.0/24 [20/0] via 172.16.16.1, 09:24:55 192.168.6.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.6.0/24 is directly connected, FastEthernet0/1 L 192.168.6.6/32 is directly connected, FastEthernet0/1 B 192.168.7.0/24 [20/0] via 172.16.16.1, 09:25:04 B 192.168.8.0/24 [20/0] via 172.16.16.1, 09:25:04 B 192.168.9.0/24 [20/0] via 172.16.16.1, 09:23:48 R7-CE-GM#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks B 172.16.16.0/24 [20/0] via 172.16.27.2, 09:25:25 C 172.16.27.0/24 is directly connected, FastEthernet0/0 L 172.16.27.7/32 is directly connected, FastEthernet0/0 B 172.16.38.0/24 [20/0] via 172.16.27.2, 09:25:25 B 172.16.49.0/24 [20/0] via 172.16.27.2, 09:25:16 B 192.168.6.0/24 [20/0] via 172.16.27.2, 09:25:25 192.168.7.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.7.0/24 is directly connected, FastEthernet0/1 L 192.168.7.7/32 is directly connected, FastEthernet0/1 B 192.168.8.0/24 [20/0] via 172.16.27.2, 09:25:25 B 192.168.9.0/24 [20/0] via 172.16.27.2, 09:24:09 R8-CE-GM#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks B 172.16.16.0/24 [20/0] via 172.16.38.3, 09:25:35 B 172.16.27.0/24 [20/0] via 172.16.38.3, 09:25:35 C 172.16.38.0/24 is directly connected, FastEthernet0/0 L 172.16.38.8/32 is directly connected, FastEthernet0/0 B 172.16.49.0/24 [20/0] via 172.16.38.3, 09:25:26 B 192.168.6.0/24 [20/0] via 172.16.38.3, 09:25:35 B 192.168.7.0/24 [20/0] via 172.16.38.3, 09:25:35 192.168.8.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.8.0/24 is directly connected, FastEthernet0/1 L 192.168.8.8/32 is directly connected, FastEthernet0/1 B 192.168.9.0/24 [20/0] via 172.16.38.3, 09:24:19 R9-CE-GM#show ip route | beg Gate Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 5 subnets, 2 masks B 172.16.16.0/24 [20/0] via 172.16.49.4, 09:24:31 B 172.16.27.0/24 [20/0] via 172.16.49.4, 09:24:31 B 172.16.38.0/24 [20/0] via 172.16.49.4, 09:24:31 C 172.16.49.0/24 is directly connected, FastEthernet0/0 L 172.16.49.9/32 is directly connected, FastEthernet0/0 B 192.168.6.0/24 [20/0] via 172.16.49.4, 09:24:31 B 192.168.7.0/24 [20/0] via 172.16.49.4, 09:24:31 B 192.168.8.0/24 [20/0] via 172.16.49.4, 09:24:31 192.168.9.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.9.0/24 is directly connected, FastEthernet0/1 L 192.168.9.9/32 is directly connected, FastEthernet0/1 R10-Primary-KS#show ip route | beg Gate Gateway of last resort is 172.16.16.6 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 172.16.16.6 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks C 172.16.16.0/24 is directly connected, FastEthernet0/0 L 172.16.16.10/32 is directly connected, FastEthernet0/0 R11-Backup-KS#show ip route | beg Gate Gateway of last resort is 172.16.27.7 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 172.16.27.7 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks C 172.16.27.0/24 is directly connected, FastEthernet0/0 L 172.16.27.11/32 is directly connected, FastEthernet0/0 !! -- When only Primary Key Server is configured -- !! !! -- KS would participate in the Election with Secondary role -- !! *Apr 19 15:21:13.519: %CRYPTO-6-GDOI_ON_OFF: GDOI is ON *Apr 19 15:21:47.923: %GDOI-5-KS_REKEY_TRANS_2_UNI: Group GETVPN-GROUP transitioned to Unicast Rekey. *Apr 19 15:22:55.623: %GDOI-5-COOP_KS_ADD: 172.16.27.11 added as COOP Key Server in group GETVPN-GROUP. *Apr 19 15:23:35.671: %GDOI-5-COOP_KS_ELECTION: KS entering election mode in group GETVPN-GROUP (Previous Primary = NONE) R10-Primary-KS#sh crypto gdoi ks coop Crypto Gdoi Group Name :GETVPN-GROUP Group handle: 2147483650, Local Key Server handle: 2147483650 Local Address: 172.16.16.10 Local Priority: 100 Local KS Role: Secondary , Local KS Status: Alive Local KS version: 1.0.4 Secondary Timers: Sec Primary Periodic Time: 30 Remaining Time: 2, Retries: 2 Invalid ANN PST recvd: 0 New GM Temporary Blocking Enforced?: No Antireplay Sequence Number: 3 Peer Sessions: Session 1: Server handle: 2147483651 Peer Address: 172.16.27.11 Peer Version: 0.0.0 Peer Priority: Unknown Peer KS Role: Secondary , Peer KS Status: Unknown Antireplay Sequence Number: 0 IKE status: In Progress Counters: Ann msgs sent: 0 Ann msgs sent with reply request: 0 Ann msgs recv: 0 Ann msgs recv with reply request: 0 Packet sent drops: 3 Packet Recv drops: 0 Total bytes sent: 0 Total bytes recv: 0 !! -- It keep trying to reach peer KS but we have not confiugured--!! !! -- Backup KS (Peer KS) so when Primary KS do not receive response!! !! -- from any other KS, it will become Primary and declare -- !! !! -- Peer KS as dead -- !! *Apr 19 15:25:05.775: %GDOI-5-COOP_KS_TRANS_TO_PRI: KS 172.16.16.10 in group GETVPN-GROUP transitioned to Primary (Previous Primary = NONE) *Apr 19 15:25:05.815: %GDOI-3-COOP_KS_UNREACH: Cooperative KS 172.16.27.11 Unreachable in group GETVPN-GROUP. IKE SA Status = Failed to establish. R10-Primary-KS#sh crypto gdoi ks coop Crypto Gdoi Group Name :GETVPN-GROUP Group handle: 2147483650, Local Key Server handle: 2147483650 Local Address: 172.16.16.10 Local Priority: 100 Local KS Role: Primary , Local KS Status: Alive Local KS version: 1.0.4 Primary Timers: Primary Refresh Policy Time: 20 Remaining Time: 18 Antireplay Sequence Number: 5 Peer Sessions: Session 1: Server handle: 2147483651 Peer Address: 172.16.27.11 Peer Version: 0.0.0 Peer Priority: Unknown Peer KS Role: Secondary , Peer KS Status: Dead Antireplay Sequence Number: 0 IKE status: In Progress Counters: Ann msgs sent: 0 Ann msgs sent with reply request: 0 Ann msgs recv: 0 Ann msgs recv with reply request: 0 Packet sent drops: 5 Packet Recv drops: 0 Total bytes sent: 0 Total bytes recv: 0 !! -- When we configure Backup Key Server, it will also participate-!! !! -- in the Election with Secondary KS Role -- !! !! -- When It knows Primary KS with higher priority is active -- !! !! -- It remains in the Secondary Role -- !! R11-Backup-KS# *Apr 19 15:26:17.627: %CRYPTO-6-GDOI_ON_OFF: GDOI is ON *Apr 19 15:27:24.143: %GDOI-5-COOP_KS_ADD: 172.16.16.10 added as COOP Key Server in group GETVPN-GROUP. *Apr 19 15:27:24.183: %GDOI-5-COOP_KS_ELECTION: KS entering election mode in group GETVPN-GROUP (Previous Primary = NONE) *Apr 19 15:27:29.527: %GDOI-4-GDOI_ANN_TIMESTAMP_LARGE: COOP_KS ANN received from KS 172.16.16.10 in group GETVPN-GROUP has PST bigger than myself. Adjust to new PST: my_old_pst is 71 sec, peer_pst is 375 sec *Apr 19 15:27:34.543: %GDOI-5-COOP_KS_TRANS_TO_PRI: KS 172.16.16.10 in group GETVPN-GROUP transitioned to Primary (Previous Primary = NONE) R11-Backup-KS#sh crypto gdoi ks coop Crypto Gdoi Group Name :GETVPN-GROUP Group handle: 2147483650, Local Key Server handle: 2147483650 Local Address: 172.16.27.11 Local Priority: 75 Local KS Role: Secondary , Local KS Status: Alive Local KS version: 1.0.4 Secondary Timers: Sec Primary Periodic Time: 30 Remaining Time: 27, Retries: 0 Invalid ANN PST recvd: 0 New GM Temporary Blocking Enforced?: No Antireplay Sequence Number: 1 Peer Sessions: Session 1: Server handle: 2147483651 Peer Address: 172.16.16.10 Peer Version: 1.0.4 Peer Priority: 100 Peer KS Role: Primary , Peer KS Status: Alive Antireplay Sequence Number: 42 IKE status: Established Counters: Ann msgs sent: 0 Ann msgs sent with reply request: 1 Ann msgs recv: 29 Ann msgs recv with reply request: 0 Packet sent drops: 0 Packet Recv drops: 0 Total bytes sent: 152 Total bytes recv: 18415 !! -- Now IKE phase-1 is UP between Primary and Backup KS -- !! R10-Primary-KS#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.27.11 172.16.16.10 GDOI_IDLE 1001 ACTIVE R11-Backup-KS#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.27.11 172.16.16.10 GDOI_IDLE 1001 ACTIVE !! -- Verify interesting traffic ACL added into GETVPN domain -- !! R10-Primary-KS#sh crypto gdoi ks acl Group Name: GETVPN-GROUP Configured ACL: access-list GETVPN-ACL permit ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255 !! -- Verify GDOI Policy on KS, which would be pushed to the -- !! !! -- Group Members (GM) -- !! R10-Primary-KS#sh crypto gdoi ks policy Key Server Policy: For group GETVPN-GROUP (handle: 2147483650) server 172.16.16.10 (handle: 2147483650): # of teks : 2 Seq num : 1 KEK POLICY (transport type : Unicast) spi : 0x25C92085E5951A54B8182918A13D10B4 management alg : disabled encrypt alg : 3DES crypto iv length : 8 key size : 24 orig life(sec): 86400 remaining life(sec): 79722 sig hash algorithm : enabled sig key length : 162 sig size : 128 sig key name : getvpn-export-general TEK POLICY (encaps : ENCAPS_TRANSPORT) spi : 0xF22F8F3B access-list : GETVPN-ACL transform : esp-256-aes esp-sha256-hmac alg key size : 32 sig key size : 32 orig life(sec) : 7200 remaining life(sec) : 523 tek life(sec) : 7200 elapsed time(sec) : 6677 override life (sec): 0 antireplay window size: 5 TEK POLICY (encaps : ENCAPS_TRANSPORT) spi : 0xBB9CF351 access-list : GETVPN-ACL transform : esp-256-aes esp-sha256-hmac alg key size : 32 sig key size : 32 orig life(sec) : 7200 remaining life(sec) : 6978 tek life(sec) : 7200 elapsed time(sec) : 222 override life (sec): 0 antireplay window size: 5 Replay Value 6909.39 secs For group GETVPN-GROUP (handle: 2147483650) server 172.16.27.11 (handle: 2147483651): !! -- After configuration of Group Member (GM) Router R6 -- !! !! -- It will register to all key servers (KS) in order -- !! !! -- of KS configuration list on GM -- !! !! -- But GM will have ISAKMP SA only with Primary KS -- !! !! -- and Primary KS will push the GDOI policies to GM -- !! R6-CE-GM(config-if)# *Apr 19 15:41:54.175: %CRYPTO-5-GM_REGSTER: Start registration to KS 172.16.16.10 for group GETVPN-GROUP using address 172.16.16.6 *Apr 19 15:41:54.191: %CRYPTO-6-GDOI_ON_OFF: GDOI is ON R6-CE-GM(config-if)# *Apr 19 15:41:54.719: %GDOI-5-GM_REKEY_TRANS_2_UNI: Group GETVPN-GROUP transitioned to Unicast Rekey. *Apr 19 15:41:54.723: %GDOI-5-SA_KEK_UPDATED: SA KEK was updated *Apr 19 15:41:54.727: %GDOI-5-SA_TEK_UPDATED: SA TEK was updated *Apr 19 15:41:54.863: %GDOI-5-GM_REGS_COMPL: Registration to KS 172.16.16.10 complete for group GETVPN-GROUP using address 172.16.16.6 *Apr 19 15:41:54.883: %GDOI-5-GM_INSTALL_POLICIES_SUCCESS: SUCCESS: Installation of Reg/Rekey policies from KS 172.16.16.10 for group GETVPN-GROUP & gm identity 172.16.16.6 R6-CE-GM(config-if)#end R6-CE-GM# R6-CE-GM#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.16.10 172.16.16.6 GDOI_IDLE 1001 ACTIVE 172.16.16.6 172.16.16.10 GDOI_REKEY 1002 ACTIVE !! -- Similarily configure Group Member Router R7 -- !! R7-CE-GM(config-if)# *Apr 19 15:46:30.231: %CRYPTO-5-GM_REGSTER: Start registration to KS 172.16.16.10 for group GETVPN-GROUP using address 172.16.27.7 *Apr 19 15:46:30.247: %CRYPTO-6-GDOI_ON_OFF: GDOI is ON *Apr 19 15:46:31.643: %GDOI-5-GM_REKEY_TRANS_2_UNI: Group GETVPN-GROUP transitioned to Unicast Rekey. *Apr 19 15:46:31.647: %GDOI-5-SA_KEK_UPDATED: SA KEK was updated *Apr 19 15:46:31.651: %GDOI-5-SA_TEK_UPDATED: SA TEK was updated *Apr 19 15:46:31.851: %GDOI-5-GM_REGS_COMPL: Registration to KS 172.16.16.10 complete for group GETVPN-GROUP using address 172.16.27.7 *Apr 19 15:46:31.871: %GDOI-5-GM_INSTALL_POLICIES_SUCCESS: SUCCESS: Installation of Reg/Rekey policies from KS 172.16.16.10 for group GETVPN-GROUP & gm identity 172.16.27.7 R7-CE-GM# *Apr 19 15:46:33.451: %SYS-5-CONFIG_I: Configured from console by console R7-CE-GM#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.16.10 172.16.27.7 GDOI_IDLE 1001 ACTIVE 172.16.27.7 172.16.16.10 GDOI_REKEY 1002 ACTIVE !! -- Configure Group Member Router R8 -- !! R8-CE-GM(config-if)# *Apr 19 16:11:57.187: %CRYPTO-5-GM_REGSTER: Start registration to KS 172.16.16.10 for group GETVPN-GROUP using address 172.16.38.8 R8-CE-GM(config-if)#end R8-CE-GM# *Apr 19 16:11:57.207: %CRYPTO-6-GDOI_ON_OFF: GDOI is ON R8-CE-GM# *Apr 19 16:11:58.739: %SYS-5-CONFIG_I: Configured from console by console *Apr 19 16:11:58.795: %GDOI-5-GM_REKEY_TRANS_2_UNI: Group GETVPN-GROUP transitioned to Unicast Rekey. *Apr 19 16:11:58.799: %GDOI-5-SA_KEK_UPDATED: SA KEK was updated *Apr 19 16:11:58.803: %GDOI-5-SA_TEK_UPDATED: SA TEK was updated *Apr 19 16:11:59.131: %GDOI-5-GM_REGS_COMPL: Registration to KS 172.16.16.10 complete for group GETVPN-GROUP using address 172.16.38.8 *Apr 19 16:11:59.151: %GDOI-5-GM_INSTALL_POLICIES_SUCCESS: SUCCESS: Installation of Reg/Rekey policies from KS 172.16.16.10 for group GETVPN-GROUP & gm identity 172.16.38.8 R8-CE-GM#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.38.8 172.16.16.10 GDOI_REKEY 1002 ACTIVE 172.16.16.10 172.16.38.8 GDOI_IDLE 1001 ACTIVE !! -- Configure Group Member Router R9 -- !! R9-CE-GM(config-if)# *Apr 19 16:13:31.651: %CRYPTO-5-GM_REGSTER: Start registration to KS 172.16.16.10 for group GETVPN-GROUP using address 172.16.49.9 R9-CE-GM(config-if)# *Apr 19 16:13:31.667: %CRYPTO-6-GDOI_ON_OFF: GDOI is ON R9-CE-GM(config-if)# *Apr 19 16:13:33.055: %GDOI-5-GM_REKEY_TRANS_2_UNI: Group GETVPN-GROUP transitioned to Unicast Rekey. *Apr 19 16:13:33.059: %GDOI-5-SA_KEK_UPDATED: SA KEK was updated *Apr 19 16:13:33.063: %GDOI-5-SA_TEK_UPDATED: SA TEK was updated *Apr 19 16:13:33.279: %GDOI-5-GM_REGS_COMPL: Registration to KS 172.16.16.10 complete for group GETVPN-GROUP using address 172.16.49.9 *Apr 19 16:13:33.295: %GDOI-5-GM_INSTALL_POLICIES_SUCCESS: SUCCESS: Installation of Reg/Rekey policies from KS 172.16.16.10 for group GETVPN-GROUP & gm identity 172.16.49.9 R9-CE-GM(config-if)#end R9-CE-GM# *Apr 19 16:13:35.263: %SYS-5-CONFIG_I: Configured from console by console R9-CE-GM#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.49.9 172.16.16.10 GDOI_REKEY 1002 ACTIVE 172.16.16.10 172.16.49.9 GDOI_IDLE 1001 ACTIVE !! -- After configuration of all GM -- !! R10-Primary-KS#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.16.10 172.16.27.7 GDOI_IDLE 1003 ACTIVE 172.16.16.10 172.16.49.9 GDOI_IDLE 1005 ACTIVE 172.16.16.10 172.16.16.6 GDOI_IDLE 1002 ACTIVE 172.16.27.11 172.16.16.10 GDOI_IDLE 1001 ACTIVE 172.16.16.10 172.16.38.8 GDOI_IDLE 1004 ACTIVE R11-Backup-KS#sh cry isa sa IPv4 Crypto ISAKMP SA dst src state conn-id status 172.16.27.11 172.16.16.10 GDOI_IDLE 1001 ACTIVE !! -- Verify GDOI status on Group Member (GM) Routers -- !! R6-CE-GM#show crypto gdoi GROUP INFORMATION Group Name : GETVPN-GROUP Group Identity : 1234 Crypto Path : ipv4 Key Management Path : ipv4 Rekeys received : 1 IPSec SA Direction : Both Group Server list : 172.16.16.10 172.16.27.11 Group member : 172.16.16.6 vrf: None Version : 1.0.4 Registration status : Registered Registered with : 172.16.16.10 Re-registers in : 6947 sec Succeeded registration: 1 Attempted registration: 1 Last rekey from : 172.16.16.10 Last rekey seq num : 1 Unicast rekey received: 1 Rekey ACKs sent : 1 Rekey Rcvd(hh:mm:ss) : 00:00:31 allowable rekey cipher: any allowable rekey hash : any allowable transformtag: any ESP Rekeys cumulative Total received : 1 After latest register : 1 Rekey Acks sents : 1 ACL Downloaded From KS 172.16.16.10: access-list permit ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255 KEK POLICY: Rekey Transport Type : Unicast Lifetime (secs) : 79912 Encrypt Algorithm : 3DES Key Size : 192 Sig Hash Algorithm : HMAC_AUTH_SHA Sig Key Length (bits) : 1024 TEK POLICY for the current KS-Policy ACEs Downloaded: FastEthernet0/0: IPsec SA: spi: 0xF22F8F3B(4063203131) transform: esp-256-aes esp-sha256-hmac sa timing:remaining key lifetime (sec): (714) Anti-Replay(Time Based) : 5 sec interval IPsec SA: spi: 0xBB9CF351(3147625297) transform: esp-256-aes esp-sha256-hmac sa timing:remaining key lifetime (sec): (7169) Anti-Replay(Time Based) : 5 sec interval !! -- No traffic is exchanged between sites yet -- !! !! -- encap/decap and encryp/decrypt packet count is zero -- !! R8-CE-GM#sh cry ipsec sa interface: FastEthernet0/0 Crypto map tag: GETVPN-MAP, local addr 172.16.38.8 protected vrf: (none) local ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0) remote ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0) current_peer 0.0.0.0 port 848 PERMIT, flags={} #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0 #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.16.38.8, remote crypto endpt.: 0.0.0.0 path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0 current outbound spi: 0xBB9CF351(3147625297) PFS (Y/N): N, DH group: none inbound esp sas: spi: 0xBB9CF351(3147625297) transform: esp-256-aes esp-sha256-hmac , in use settings ={Transport, } conn id: 3, flow_id: SW:3, sibling_flags 80000000, crypto map: GETVPN-MAP sa timing: remaining key lifetime (sec): (6387) Kilobyte Volume Rekey has been disabled IV size: 16 bytes replay detection support: Y replay window size: 5 Status: ACTIVE(ACTIVE) inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0xBB9CF351(3147625297) transform: esp-256-aes esp-sha256-hmac , in use settings ={Transport, } conn id: 4, flow_id: SW:4, sibling_flags 80000000, crypto map: GETVPN-MAP sa timing: remaining key lifetime (sec): (6387) Kilobyte Volume Rekey has been disabled IV size: 16 bytes replay detection support: Y replay window size: 5 Status: ACTIVE(ACTIVE) outbound ah sas: outbound pcp sas: !! -- Send traffic between Site-3 and Site-4 LAN -- !! R8-CE-GM#ping 192.168.9.9 so 192.168.8.8 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.9.9, timeout is 2 seconds: Packet sent with a source address of 192.168.8.8 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 184/202/228 ms R8-CE-GM#sh cry ipsec sa interface: FastEthernet0/0 Crypto map tag: GETVPN-MAP, local addr 172.16.38.8 protected vrf: (none) local ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0) remote ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0) current_peer 0.0.0.0 port 848 PERMIT, flags={} #pkts encaps: 5, #pkts encrypt: 5, #pkts digest: 5 #pkts decaps: 5, #pkts decrypt: 5, #pkts verify: 5 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.16.38.8, remote crypto endpt.: 0.0.0.0 path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0 current outbound spi: 0xBB9CF351(3147625297) PFS (Y/N): N, DH group: none inbound esp sas: spi: 0xBB9CF351(3147625297) transform: esp-256-aes esp-sha256-hmac , in use settings ={Transport, } conn id: 3, flow_id: SW:3, sibling_flags 80000000, crypto map: GETVPN-MAP sa timing: remaining key lifetime (sec): (6373) Kilobyte Volume Rekey has been disabled IV size: 16 bytes replay detection support: Y replay window size: 5 Status: ACTIVE(ACTIVE) inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0xBB9CF351(3147625297) transform: esp-256-aes esp-sha256-hmac , in use settings ={Transport, } conn id: 4, flow_id: SW:4, sibling_flags 80000000, crypto map: GETVPN-MAP sa timing: remaining key lifetime (sec): (6373) Kilobyte Volume Rekey has been disabled IV size: 16 bytes replay detection support: Y replay window size: 5 Status: ACTIVE(ACTIVE) outbound ah sas: outbound pcp sas: !! -- Send traffic between Site-1 and Site-3 LAN -- !! R8-CE-GM#ping 192.168.6.6 so 192.168.8.8 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.6.6, timeout is 2 seconds: Packet sent with a source address of 192.168.8.8 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 168/188/224 ms !! -- Send traffic between Site-2 and Site-3 LAN -- !! R8-CE-GM#ping 192.168.7.7 so 192.168.8.8 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.7.7, timeout is 2 seconds: Packet sent with a source address of 192.168.8.8 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 176/194/212 ms !! -- Traffic between each site LAN is ecnrypted now -- !! !! -- GM has downloaded the ACL from KS, which covers LAN subnets --!! !! -- of all sites -- !! R8-CE-GM#sh cry ipsec sa interface: FastEthernet0/0 Crypto map tag: GETVPN-MAP, local addr 172.16.38.8 protected vrf: (none) local ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0) remote ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0) current_peer 0.0.0.0 port 848 PERMIT, flags={} #pkts encaps: 15, #pkts encrypt: 15, #pkts digest: 15 #pkts decaps: 15, #pkts decrypt: 15, #pkts verify: 15 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.16.38.8, remote crypto endpt.: 0.0.0.0 path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0 current outbound spi: 0xBB9CF351(3147625297) PFS (Y/N): N, DH group: none inbound esp sas: spi: 0xBB9CF351(3147625297) transform: esp-256-aes esp-sha256-hmac , in use settings ={Transport, } conn id: 3, flow_id: SW:3, sibling_flags 80000000, crypto map: GETVPN-MAP sa timing: remaining key lifetime (sec): (6341) Kilobyte Volume Rekey has been disabled IV size: 16 bytes replay detection support: Y replay window size: 5 Status: ACTIVE(ACTIVE) inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0xBB9CF351(3147625297) transform: esp-256-aes esp-sha256-hmac , in use settings ={Transport, } conn id: 4, flow_id: SW:4, sibling_flags 80000000, crypto map: GETVPN-MAP sa timing: remaining key lifetime (sec): (6341) Kilobyte Volume Rekey has been disabled IV size: 16 bytes replay detection support: Y replay window size: 5 Status: ACTIVE(ACTIVE) outbound ah sas: outbound pcp sas:
The Shortcut Switching Enhancements for NHRP in DMVPN Phase 3 provides a more scalable alternative to the previous NHRP model. Routers in a Dynamic Multipoint VPN (DMVPN) Phase 3 network use Next Hop Resolution Protocol (NHRP) Shortcut Switching to discover shorter paths to a destination network after receiving an NHRP redirect message from the hub. This allows the routers to communicate directly with each other without the need for an intermediate hop.
Benefits of DMVPN Phase 3 Design:
Check these links for
Here is the network topology for DMVPN phase 3 discussion and configuration.
The DMVPN Phase 2 design requires to maintain full routing table on all spoke routers. Each route for remote spoke networks needs to be a specific route with the next hop pointing to the remote spoke’s tunnel address. This prevents the hub from being able to send down a summarized route to the spokes for a more concise routing table.
Phase 3 overcomes this restriction using NHRP traffic indication messages from the hub to signal to the spokes that a better path exists to reach the target network. This functionality is enabled by configuring ip nhrp redirect on the hub and ip nhrp shortcut on the spokes. The redirect command tells the hub to send the NHRP traffic indication message while the shortcut command tells the spokes to accept the redirect and install the shortcut route.
---------- R1 - Hub: ---------- hostname R1 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.1 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast dynamic ip nhrp network-id 100 ip nhrp redirect ip summary-address eigrp 100 10.10.0.0 255.255.0.0 ip tcp adjust-mss 1360 tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.14.1 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.1.1 255.255.255.0 ! router eigrp 100 network 10.10.1.1 0.0.0.0 network 192.168.1.1 0.0.0.0 ! ip route 0.0.0.0 0.0.0.0 1.1.14.4 ------------ R2 - Spoke: ------------ hostname R2 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.2 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast 1.1.14.1 ip nhrp map 192.168.1.1 1.1.14.1 ip nhrp network-id 100 ip nhrp nhs 192.168.1.1 ip nhrp shortcut ip tcp adjust-mss 1360 tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.24.2 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.2.2 255.255.255.0 ! router eigrp 100 network 10.10.2.2 0.0.0.0 network 192.168.1.2 0.0.0.0 ! ip route 0.0.0.0 0.0.0.0 1.1.24.4 ------------ R3 - Spoke: ------------ hostname R3 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.3 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast 1.1.14.1 ip nhrp map 192.168.1.1 1.1.14.1 ip nhrp network-id 100 ip nhrp nhs 192.168.1.1 ip nhrp shortcut ip tcp adjust-mss 1360 tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.34.3 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.3.3 255.255.255.0 ! router eigrp 100 network 10.10.3.3 0.0.0.0 network 192.168.1.3 0.0.0.0 ! ip route 0.0.0.0 0.0.0.0 1.1.34.4 --------------- R4 - Internet: --------------- hostname R4 ! interface FastEthernet0/0 ip address 1.1.14.4 255.255.255.0 ! interface FastEthernet0/1 ip address 1.1.24.4 255.255.255.0 ! interface FastEthernet1/0 ip address 1.1.34.4 255.255.255.0 !
- Hub and Spokes routers are using mGRE tunnels R1#show int t0 Tunnel0 is up, line protocol is up Hardware is Tunnel Internet address is 192.168.1.1/24 MTU 17870 bytes, BW 4096 Kbit/sec, DLY 50000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation TUNNEL, loopback not set Keepalive not set Tunnel source 1.1.14.1 (FastEthernet0/0) Tunnel Subblocks: src-track: Tunnel0 source tracking subblock associated with FastEthernet0/0 Set of tunnels with source FastEthernet0/0, 1 member (includes iterators), on interface <OK> Tunnel protocol/transport multi-GRE/IP R2#show int t0 Tunnel0 is up, line protocol is up Hardware is Tunnel Internet address is 192.168.1.2/24 MTU 17870 bytes, BW 4096 Kbit/sec, DLY 50000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation TUNNEL, loopback not set Keepalive not set Tunnel source 1.1.24.2 (FastEthernet0/0) Tunnel Subblocks: src-track: Tunnel0 source tracking subblock associated with FastEthernet0/0 Set of tunnels with source FastEthernet0/0, 1 member (includes iterators), on interface <OK> Tunnel protocol/transport multi-GRE/IP R3#show int t0 Tunnel0 is up, line protocol is up Hardware is Tunnel Internet address is 192.168.1.3/24 MTU 17870 bytes, BW 4096 Kbit/sec, DLY 50000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation TUNNEL, loopback not set Keepalive not set Tunnel source 1.1.34.3 (FastEthernet0/0) Tunnel Subblocks: src-track: Tunnel0 source tracking subblock associated with FastEthernet0/0 Set of tunnels with source FastEthernet0/0, 1 member (includes iterators), on interface <OK> Tunnel protocol/transport multi-GRE/IP - Routing adjacencies (EIGRP neighborship) are between Hub and Spokes only R1#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 1 192.168.1.2 Tu0 10 00:28:43 188 1128 0 3 0 192.168.1.3 Tu0 14 00:29:10 174 1044 0 3 R2#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 192.168.1.1 Tu0 14 00:28:45 1282 5000 0 5 R3#show ip eigrp neighbors EIGRP-IPv4 Neighbors for AS(100) H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 192.168.1.1 Tu0 11 00:29:16 200 1200 0 2 - Routing Table - Hub router advertised a summary route (10.10.0.0/16) to spoke EIGRP routers R1#show ip route eigrp | beg Gate Gateway of last resort is 1.1.14.4 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 5 subnets, 3 masks D 10.10.0.0/16 is a summary, 00:30:13, Null0 D 10.10.2.0/24 [90/1907456] via 192.168.1.2, 00:29:34, Tunnel0 D 10.10.3.0/24 [90/1907456] via 192.168.1.3, 00:30:04, Tunnel0 R2#show ip route eigrp | beg Gate Gateway of last resort is 1.1.24.4 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 3 subnets, 3 masks D 10.10.0.0/16 [90/1907456] via 192.168.1.1, 00:29:38, Tunnel0 R3#show ip route eigrp | beg Gate Gateway of last resort is 1.1.34.4 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 3 subnets, 3 masks D 10.10.0.0/16 [90/1907456] via 192.168.1.1, 00:30:10, Tunnel0 - DMVPN Status - Initially there is no spoke-to-spoke communication R1#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ==================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Hub, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 1.1.24.2 192.168.1.2 UP 00:30:53 D 1 1.1.34.3 192.168.1.3 UP 00:31:22 D R2#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:1, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 1.1.14.1 192.168.1.1 UP 00:30:55 S R3#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:1, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 1.1.14.1 192.168.1.1 UP 00:31:26 S - Traffic between Spoke R2 and Spoke R3 - First packet would traverse via Hub and it will trigger NHRP shortcut switching process then traffic will start using direct spoke-to-spoke tunnel R2#trace 10.10.3.3 so 10.10.2.2 Type escape sequence to abort. Tracing the route to 10.10.3.3 VRF info: (vrf in name/id, vrf out name/id) 1 192.168.1.1 132 msec 136 msec 160 msec << Hub R1 Tunnel IP 2 192.168.1.3 236 msec << Spoke R3 Tunnel IP Following events occur for NHRP shortcut switching: When the traffic between Spokes R2 & R3 arrives at Hub-R1 router, it will send redirect message (due to "ip nhrp redirect") to spokes to tell them, as both of you are DMVPN spokes and there would be a better path if you can build a direct spoke-to-spoke tunnel. => Hub-R1 sends NHRP redirect to Spoke-R2 R1# *Mar 1 23:24:47.063: NHRP: Send Traffic Indication via Tunnel0 vrf 0, packet size: 100 *Mar 1 23:24:47.071: src: 192.168.1.1, dst: 10.10.2.2 *Mar 1 23:24:47.079: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.079: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.083: pktsz: 100 extoff: 68 *Mar 1 23:24:47.087: (M) traffic code: redirect(0) *Mar 1 23:24:47.087: src NBMA: 1.1.14.1 *Mar 1 23:24:47.087: src protocol: 192.168.1.1, dst protocol: 10.10.2.2 *Mar 1 23:24:47.087: Contents of nhrp traffic indication packet: *Mar 1 23:24:47.087: 45 00 00 64 00 00 00 00 FE 01 A3 80 0A 0A 02 02 *Mar 1 23:24:47.087: 0A 0A 03 03 08 00 A8 A1 00 00 00 => Hub-R1 sends NHRP redirect to Spoke-R3 R1# *Mar 1 23:24:47.139: NHRP: Send Traffic Indication via Tunnel0 vrf 0, packet size: 100 *Mar 1 23:24:47.143: src: 192.168.1.1, dst: 10.10.3.3 *Mar 1 23:24:47.151: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.155: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.155: pktsz: 100 extoff: 68 *Mar 1 23:24:47.159: (M) traffic code: redirect(0) *Mar 1 23:24:47.163: src NBMA: 1.1.14.1 *Mar 1 23:24:47.163: src protocol: 192.168.1.1, dst protocol: 10.10.3.3 *Mar 1 23:24:47.171: Contents of nhrp traffic indication packet: *Mar 1 23:24:47.175: 45 00 00 64 00 00 00 00 FE 01 A3 80 0A 0A 03 03 *Mar 1 23:24:47.179: 0A 0A 02 02 00 00 B0 A1 00 00 00 => Spoke-R2 receives NHRP redirect from Hub-R1 R2# *Mar 1 23:24:47.135: NHRP: Receive Traffic Indication via Tunnel0 vrf 0, packet size: 100 *Mar 1 23:24:47.139: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.139: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.139: pktsz: 100 extoff: 68 *Mar 1 23:24:47.139: (M) traffic code: redirect(0) *Mar 1 23:24:47.139: src NBMA: 1.1.14.1 *Mar 1 23:24:47.143: src protocol: 192.168.1.1, dst protocol: 10.10.2.2 *Mar 1 23:24:47.143: Contents of nhrp traffic indication packet: *Mar 1 23:24:47.143: 45 00 00 64 00 00 00 00 FE 01 A3 80 0A 0A 02 02 *Mar 1 23:24:47.143: 0A 0A 03 03 08 00 A8 A1 00 00 00 => Spoke-R2 will accept this message and want to build a shortcut path (direct spoke-to-spoke tunnel) because of "ip nhrp shortcut" command. => Spoke-R2 will send a NHRP resolution request to Spoke-R3 via Hub-R1, to find NBMA IP of Spoke-R3 to build a direct spoke-to-spoke tunnel R2# *Mar 1 23:24:47.163: NHRP: Send Resolution Request via Tunnel0 vrf 0, packet size: 88 *Mar 1 23:24:47.167: src: 192.168.1.2, dst: 10.10.3.3 *Mar 1 23:24:47.167: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.167: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.167: pktsz: 88 extoff: 52 *Mar 1 23:24:47.167: (M) flags: "router auth src-stable nat ", reqid: 2 *Mar 1 23:24:47.167: src NBMA: 1.1.24.2 *Mar 1 23:24:47.167: src protocol: 192.168.1.2, dst protocol: 10.10.3.3 *Mar 1 23:24:47.167: (C-1) code: no error(0) *Mar 1 23:24:47.167: prefix: 32, mtu: 17870, hd_time: 7200 *Mar 1 23:24:47.167: addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 0, pref: 0 => Similar events happens on Spoke-R3. => Spoke-R3 receives NHRP redirect from Hub-R1 => Spoke-R3 will also send a NHRP resolution request to Spoke-R2 via Hub-R1, to find NBMA IP of Spoke-R2 to build a direct spoke-to-spoke tunnel R3# *Mar 1 23:24:47.263: NHRP: Receive Traffic Indication via Tunnel0 vrf 0, packet size: 100 *Mar 1 23:24:47.267: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.271: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.275: pktsz: 100 extoff: 68 *Mar 1 23:24:47.275: (M) traffic code: redirect(0) *Mar 1 23:24:47.275: src NBMA: 1.1.14.1 *Mar 1 23:24:47.275: src protocol: 192.168.1.1, dst protocol: 10.10.3.3 *Mar 1 23:24:47.275: Contents of nhrp traffic indication packet: *Mar 1 23:24:47.275: 45 00 00 64 00 00 00 00 FE 01 A3 80 0A 0A 03 03 *Mar 1 23:24:47.275: 0A 0A 02 02 00 00 B0 A1 00 00 00 R3# *Mar 1 23:24:47.307: NHRP: Send Resolution Request via Tunnel0 vrf 0, packet size: 88 *Mar 1 23:24:47.311: src: 192.168.1.3, dst: 10.10.2.2 *Mar 1 23:24:47.319: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.323: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.323: pktsz: 88 extoff: 52 R3#*Mar 1 23:24:47.327: (M) flags: "router auth src-stable nat ", reqid: 2 *Mar 1 23:24:47.331: src NBMA: 1.1.34.3 *Mar 1 23:24:47.335: src protocol: 192.168.1.3, dst protocol: 10.10.2.2 *Mar 1 23:24:47.335: (C-1) code: no error(0) *Mar 1 23:24:47.335: prefix: 32, mtu: 17870, hd_time: 7200 *Mar 1 23:24:47.335: addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 0, pref: 0 => Hub-R1 receives NHRP resolution requests and forward it to both the spokes (R2 & R3) R1# *Mar 1 23:24:47.211: NHRP: Receive Resolution Request via Tunnel0 vrf 0, packet size: 88 *Mar 1 23:24:47.219: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.219: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.219: pktsz: 88 extoff: 52 *Mar 1 23:24:47.219: (M) flags: "router auth src-stable nat ", reqid: 2 *Mar 1 23:24:47.219: src NBMA: 1.1.24.2 *Mar 1 23:24:47.219: src protocol: 192.168.1.2, dst protocol: 10.10.3.3 *Mar 1 23:24:47.219: (C-1) code: no error(0) *Mar 1 23:24:47.219: R1# prefix: 32, mtu: 17870, hd_time: 7200 *Mar 1 23:24:47.219: addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 0, pref: 0 *Mar 1 23:24:47.223: NHRP: Forwarding Resolution Request via Tunnel0 vrf 0, packet size: 108 *Mar 1 23:24:47.223: src: 192.168.1.1, dst: 10.10.3.3 *Mar 1 23:24:47.223: (F) afn: AF_IP(1), type: IP(800), hop: 254, ver: 1 *Mar 1 23:24:47.223: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.223: pktsz: 108 extoff: 52 *Mar 1 23:24:47.223: (M) flags: "router auth src-stable nat ", reqid: 2 *Mar 1 23:24:47.223: src NBMA: 1.1.24.2 *Mar 1 23:24:47.223: src protocol: 192.168.1.2, dst protocol: 10.10.3.3 *Mar 1 23:24:47.223: (C-1) code: no error(0) *Mar 1 23:24:47.223: prefix: 32, mtu: 17870, hd_time: 7200 *Mar 1 23:24:47.223: addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 0, pref: 0 R1# *Mar 1 23:24:47.387: NHRP: Receive Resolution Request via Tunnel0 vrf 0, packet size: 88 *Mar 1 23:24:47.395: (F) R1# afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:47.399: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.399: pktsz: 88 extoff: 52 *Mar 1 23:24:47.403: (M) flags: "router auth src-stable nat ", reqid: 2 *Mar 1 23:24:47.403: src NBMA: 1.1.34.3 *Mar 1 23:24:47.403: src protocol: 192.168.1.3, dst protocol: 10.10.2.2 *Mar 1 23:24:47.403: (C-1) code: no error(0) *Mar 1 23:24:47.403: prefix: 32, mtu: 17870, hd_time: 7200 *Mar 1 23:24:47.403: addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 0, pref: 0 *Mar 1 23:24:47.407: NHRP: Forwarding Resolution Request via Tunnel0 vrf 0, packet size: 108 *Mar 1 23:24:47.407: src: 192.168.1.1, dst: 10.10.2.2 *Mar 1 23:24:47.407: (F) afn: AF_IP(1), type: IP(800), hop: 254, ver: 1 *Mar 1 23:24:47.407: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:47.407: pktsz: 108 extoff: 52 *Mar 1 23:24:47.407: (M) flags: "router auth src-stable nat ", reqid: 2 *Mar 1 23:24:47.407: src NBMA: 1.1.34.3 *Mar 1 23:24:47.407: src protocol: 192.168.1.3, dst protocol: 10.10.2.2 *Mar 1 23:24:47.407: (C-1) code: no error(0) *Mar 1 23:24:47.407: prefix: 32, mtu: 17870, hd_time: 7200 *Mar 1 23:24:47.407: addr_len: 0(NSAP), subaddr_len: 0(NSAP), proto_len: 0, pref: 0 => Both Spoke-R2 & Spoke-R3 send NHRP resolution reply via Hub-R1 R2# *Mar 1 23:24:48.431: NHRP: Send Resolution Reply via Tunnel0 vrf 0, packet size: 136 *Mar 1 23:24:48.435: src: 192.168.1.2, dst: 192.168.1.3 R3# *Mar 1 23:24:48.267: NHRP: Send Resolution Reply via Tunnel0 vrf 0, packet size: 136 *Mar 1 23:24:48.271: src: 192.168.1.3, dst: 192.168.1.2 => Finally, both Spokes receives each other's NHRP resolution reply R2# *Mar 1 23:24:48.311: NHRP: Receive Resolution Reply via Tunnel0 vrf 0, packet size: 136 *Mar 1 23:24:48.319: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:48.323: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:48.323: pktsz: 136 extoff: 60 *Mar 1 23:24:48.327: (M) flags: "router auth dst-stable unique src-stable nat ", reqid: 2 *Mar 1 23:24:48.331: src NBMA: 1.1.24.2 *Mar 1 23:24:48.335: src protocol: 192.168.1.2, dst protocol: 10.10.3.3 *Mar 1 23:24:48.335: (C-1) code: no error(0) *Mar 1 23:24:48.335: prefix: 24, mtu: 17870, hd_time: 7199 *Mar 1 23:24:48.335: addr_len: 4(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0 *Mar 1 23:24:48.335: client NBMA: 1.1.34.3 *Mar 1 23:24:48.335: client protocol: 192.168.1.3 R3# *Mar 1 23:24:48.551: NHRP: Receive Resolution Reply via Tunnel0 vrf 0, packet size: 136 *Mar 1 23:24:48.559: (F) afn: AF_IP(1), type: IP(800), hop: 255, ver: 1 *Mar 1 23:24:48.563: shtl: 4(NSAP), sstl: 0(NSAP) *Mar 1 23:24:48.563: pktsz: 136 extoff: 60 *Mar 1 23:24:48.567: (M) flags: "router auth dst-stable unique src-stable nat ", reqid: 2 *Mar 1 23:24:48.571: src NBMA: 1.1.34.3 *Mar 1 23:24:48.575: src protocol: 192.168.1.3, dst protocol: 10.10.2.2 *Mar 1 23:24:48.579: (C-1) code: no error(0) *Mar 1 23:24:48.579: prefix: 24, mtu: 17870, hd_time: 7200 *Mar 1 23:24:48.579: addr_len: 4(NSAP), subaddr_len: 0(NSAP), proto_len: 4, pref: 0 *Mar 1 23:24:48.579: client NBMA: 1.1.24.2 *Mar 1 23:24:48.579: client protocol: 192.168.1.2 => Now both spokes know each other's NBMA & Tunnel IP address, and can build a direct spoke-to-spoke tunnel => And both spokes add a NHRP shortcut route entry to reach each other's LAN subnet R2# *Mar 1 23:24:48.455: NHRP: Adding route entry for 10.10.3.0/24 to RIB *Mar 1 23:24:48.455: NHRP: Route addition to RIB Successful R3# *Mar 1 23:24:48.587: NHRP: Adding route entry for 10.10.2.0/24 to RIB *Mar 1 23:24:48.595: NHRP: Route addition to RIB Successful - Let's test communication between Spoke-R2 and Spoke-R3 now R2#ping 10.10.3.3 so 10.10.2.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.10.3.3, timeout is 2 seconds: Packet sent with a source address of 10.10.2.2 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 116/136/152 ms - Now traffic between Spoke-R2 and Spoke-R3 is using direct DMVPN tunnel R2#trace 10.10.3.3 so 10.10.2.2 Type escape sequence to abort. Tracing the route to 10.10.3.3 VRF info: (vrf in name/id, vrf out name/id) 1 192.168.1.3 148 msec * 116 msec << Spoke-R3 Tunnel IP - Spokes routing table would show a new NHRP routing entry to reach subnet behind other spoke router R2#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.24.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.24.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.24.0/24 is directly connected, FastEthernet0/0 L 1.1.24.2/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 4 subnets, 3 masks D 10.10.0.0/16 [90/1907456] via 192.168.1.1, 01:31:44, Tunnel0 C 10.10.2.0/24 is directly connected, FastEthernet0/1 L 10.10.2.2/32 is directly connected, FastEthernet0/1 H 10.10.3.0/24 [250/1] via 192.168.1.3, 00:05:13, Tunnel0 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 L 192.168.1.2/32 is directly connected, Tunnel0 R3#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.34.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.34.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.34.0/24 is directly connected, FastEthernet0/0 L 1.1.34.3/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 4 subnets, 3 masks D 10.10.0.0/16 [90/1907456] via 192.168.1.1, 01:32:12, Tunnel0 H 10.10.2.0/24 [250/1] via 192.168.1.2, 00:06:01, Tunnel0 C 10.10.3.0/24 is directly connected, FastEthernet0/1 L 10.10.3.3/32 is directly connected, FastEthernet0/1 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 L 192.168.1.3/32 is directly connected, Tunnel0 - DMVPN Status R1#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Hub, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 1.1.24.2 192.168.1.2 UP 01:37:55 D 1 1.1.34.3 192.168.1.3 UP 01:37:36 D R2#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 2 1.1.34.3 192.168.1.3 UP 00:11:26 DT1 192.168.1.3 UP 00:11:26 D 1 1.1.14.1 192.168.1.1 UP 01:37:59 S *T1 - Route Installed R3#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 2 1.1.24.2 192.168.1.2 UP 00:11:29 DT1 192.168.1.2 UP 00:11:29 D 1 1.1.14.1 192.168.1.1 UP 01:37:43 S *T1 - Route Installed - NHRP Table R1#show ip nhrp 192.168.1.2/32 via 192.168.1.2 Tunnel0 created 01:38:52, expire 01:41:01 Type: dynamic, Flags: unique registered used NBMA address: 1.1.24.2 192.168.1.3/32 via 192.168.1.3 Tunnel0 created 01:38:33, expire 01:41:00 Type: dynamic, Flags: unique registered used NBMA address: 1.1.34.3 R2#show ip nhrp 10.10.2.0/24 via 192.168.1.2 Tunnel0 created 00:12:24, expire 01:47:35 Type: dynamic, Flags: router unique local NBMA address: 1.1.24.2 (no-socket) 10.10.3.0/24 via 192.168.1.3 Tunnel0 created 00:12:24, expire 01:47:35 Type: dynamic, Flags: router used rib NBMA address: 1.1.34.3 192.168.1.1/32 via 192.168.1.1 Tunnel0 created 01:39:13, never expire Type: static, Flags: used NBMA address: 1.1.14.1 192.168.1.3/32 via 192.168.1.3 Tunnel0 created 00:12:25, expire 01:47:35 Type: dynamic, Flags: router implicit used NBMA address: 1.1.34.3 R3#show ip nhrp 10.10.2.0/24 via 192.168.1.2 Tunnel0 created 00:12:26, expire 01:47:33 Type: dynamic, Flags: router used rib NBMA address: 1.1.24.2 10.10.3.0/24 via 192.168.1.3 Tunnel0 created 00:12:26, expire 01:47:33 Type: dynamic, Flags: router unique local NBMA address: 1.1.34.3 (no-socket) 192.168.1.1/32 via 192.168.1.1 Tunnel0 created 01:39:16, never expire Type: static, Flags: used NBMA address: 1.1.14.1 192.168.1.2/32 via 192.168.1.2 Tunnel0 created 00:12:27, expire 01:47:33 Type: dynamic, Flags: router implicit used NBMA address: 1.1.24.2
---------- R1 - Hub: ---------- hostname R1 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.1 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast dynamic ip nhrp network-id 100 ip nhrp redirect ip tcp adjust-mss 1360 ip ospf network point-to-multipoint tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.14.1 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.1.1 255.255.255.0 ! router ospf 1 network 10.10.1.1 0.0.0.0 area 0 network 192.168.1.1 0.0.0.0 area 0 ! ip route 0.0.0.0 0.0.0.0 1.1.14.4 ------------ R2 - Spoke: ------------ hostname R2 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.2 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast 1.1.14.1 ip nhrp map 192.168.1.1 1.1.14.1 ip nhrp network-id 100 ip nhrp nhs 192.168.1.1 ip nhrp shortcut ip tcp adjust-mss 1360 ip ospf network point-to-multipoint tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.24.2 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.2.2 255.255.255.0 ! router ospf 1 network 10.10.2.2 0.0.0.0 area 0 network 192.168.1.2 0.0.0.0 area 0 ! ip route 0.0.0.0 0.0.0.0 1.1.24.4 ------------ R3 - Spoke: ------------ hostname R3 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.3 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast 1.1.14.1 ip nhrp map 192.168.1.1 1.1.14.1 ip nhrp network-id 100 ip nhrp nhs 192.168.1.1 ip nhrp shortcut ip tcp adjust-mss 1360 ip ospf network point-to-multipoint tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.34.3 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.3.3 255.255.255.0 ! router ospf 1 network 10.10.3.3 0.0.0.0 area 0 network 192.168.1.3 0.0.0.0 area 0 ! ip route 0.0.0.0 0.0.0.0 1.1.34.4
- Tunnel OSPF Network Type R1#show ip ospf int t0 Tunnel0 is up, line protocol is up Internet Address 192.168.1.1/24, Area 0, Attached via Network Statement Process ID 1, Router ID 192.168.1.1, Network Type POINT_TO_MULTIPOINT, Cost: 24 Topology-MTID Cost Disabled Shutdown Topology Name 0 24 no no Base Transmit Delay is 1 sec, State POINT_TO_MULTIPOINT Timer intervals configured, Hello 30, Dead 120, Wait 120, Retransmit 5 oob-resync timeout 120 Hello due in 00:00:19 Supports Link-local Signaling (LLS) Cisco NSF helper support enabled IETF NSF helper support enabled Index 2/2, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1, maximum is 1 Last flood scan time is 4 msec, maximum is 4 msec Neighbor Count is 2, Adjacent neighbor count is 2 Adjacent with neighbor 192.168.1.3 Adjacent with neighbor 192.168.1.2 Suppress hello for 0 neighbor(s) R2#show ip ospf int t0 Tunnel0 is up, line protocol is up Internet Address 192.168.1.2/24, Area 0, Attached via Network Statement Process ID 1, Router ID 192.168.1.2, Network Type POINT_TO_MULTIPOINT, Cost: 24 Topology-MTID Cost Disabled Shutdown Topology Name 0 24 no no Base Transmit Delay is 1 sec, State POINT_TO_MULTIPOINT Timer intervals configured, Hello 30, Dead 120, Wait 120, Retransmit 5 oob-resync timeout 120 Hello due in 00:00:15 Supports Link-local Signaling (LLS) Cisco NSF helper support enabled IETF NSF helper support enabled Index 2/2, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1, maximum is 1 Last flood scan time is 0 msec, maximum is 4 msec Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 192.168.1.1 Suppress hello for 0 neighbor(s) R3#show ip ospf int t0 Tunnel0 is up, line protocol is up Internet Address 192.168.1.3/24, Area 0, Attached via Network Statement Process ID 1, Router ID 192.168.1.3, Network Type POINT_TO_MULTIPOINT, Cost: 24 Topology-MTID Cost Disabled Shutdown Topology Name 0 24 no no Base Transmit Delay is 1 sec, State POINT_TO_MULTIPOINT Timer intervals configured, Hello 30, Dead 120, Wait 120, Retransmit 5 oob-resync timeout 120 Hello due in 00:00:09 Supports Link-local Signaling (LLS) Cisco NSF helper support enabled IETF NSF helper support enabled Index 2/2, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1, maximum is 1 Last flood scan time is 4 msec, maximum is 4 msec Neighbor Count is 1, Adjacent neighbor count is 1 Adjacent with neighbor 192.168.1.1 Suppress hello for 0 neighbor(s) - OSPF Adjacencies R1#show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 192.168.1.3 0 FULL/ - 00:01:37 192.168.1.3 Tunnel0 192.168.1.2 0 FULL/ - 00:01:55 192.168.1.2 Tunnel0 R2#show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 192.168.1.1 0 FULL/ - 00:01:50 192.168.1.1 Tunnel0 R3#show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 192.168.1.1 0 FULL/ - 00:01:48 192.168.1.1 Tunnel0 - Traffic between Spoke-R2 and Spoke-R3 is via direct spoke-to-spoke DMVPN tunnel R2#ping 10.10.3.3 so 10.10.2.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.10.3.3, timeout is 2 seconds: Packet sent with a source address of 10.10.2.2 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 120/134/148 ms R2#trace 10.10.3.3 so 10.10.2.2 Type escape sequence to abort. Tracing the route to 10.10.3.3 VRF info: (vrf in name/id, vrf out name/id) 1 192.168.1.3 128 msec * 152 msec << Spoke-R3 Tunnel IP - DMVPN Status R1#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Hub, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 1.1.24.2 192.168.1.2 UP 01:33:58 D 1 1.1.34.3 192.168.1.3 UP 01:33:48 D R2#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 2 1.1.34.3 192.168.1.3 UP 00:01:42 DT2 192.168.1.3 UP 00:01:42 D 1 1.1.14.1 192.168.1.1 UP 01:34:01 S *T2 - Nexthop-override R3#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 2 1.1.24.2 192.168.1.2 UP 00:01:44 DT2 192.168.1.2 UP 00:01:44 D 1 1.1.14.1 192.168.1.1 UP 01:33:54 S *T2 - Nexthop-override - Routing Table R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.14.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.14.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.14.0/24 is directly connected, FastEthernet0/0 L 1.1.14.1/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 4 subnets, 2 masks C 10.10.1.0/24 is directly connected, FastEthernet0/1 L 10.10.1.1/32 is directly connected, FastEthernet0/1 O 10.10.2.0/24 [110/25] via 192.168.1.2, 01:36:33, Tunnel0 O 10.10.3.0/24 [110/25] via 192.168.1.3, 01:36:03, Tunnel0 192.168.1.0/24 is variably subnetted, 4 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 L 192.168.1.1/32 is directly connected, Tunnel0 O 192.168.1.2/32 [110/24] via 192.168.1.2, 01:36:33, Tunnel0 O 192.168.1.3/32 [110/24] via 192.168.1.3, 01:36:03, Tunnel0 R2#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.24.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.24.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.24.0/24 is directly connected, FastEthernet0/0 L 1.1.24.2/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 4 subnets, 2 masks O 10.10.1.0/24 [110/25] via 192.168.1.1, 01:36:38, Tunnel0 C 10.10.2.0/24 is directly connected, FastEthernet0/1 L 10.10.2.2/32 is directly connected, FastEthernet0/1 O % 10.10.3.0/24 [110/49] via 192.168.1.1, 01:35:58, Tunnel0 192.168.1.0/24 is variably subnetted, 4 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 O 192.168.1.1/32 [110/24] via 192.168.1.1, 01:36:38, Tunnel0 L 192.168.1.2/32 is directly connected, Tunnel0 O 192.168.1.3/32 [110/48] via 192.168.1.1, 01:35:58, Tunnel0 R3#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.34.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.34.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.34.0/24 is directly connected, FastEthernet0/0 L 1.1.34.3/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 4 subnets, 2 masks O 10.10.1.0/24 [110/25] via 192.168.1.1, 01:36:10, Tunnel0 O % 10.10.2.0/24 [110/49] via 192.168.1.1, 01:36:10, Tunnel0 C 10.10.3.0/24 is directly connected, FastEthernet0/1 L 10.10.3.3/32 is directly connected, FastEthernet0/1 192.168.1.0/24 is variably subnetted, 4 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 O 192.168.1.1/32 [110/24] via 192.168.1.1, 01:36:10, Tunnel0 O 192.168.1.2/32 [110/48] via 192.168.1.1, 01:36:10, Tunnel0 L 192.168.1.3/32 is directly connected, Tunnel0 - NHRP Table R1#show ip nhrp 192.168.1.2/32 via 192.168.1.2 Tunnel0 created 01:45:40, expire 01:33:54 Type: dynamic, Flags: unique registered used NBMA address: 1.1.24.2 192.168.1.3/32 via 192.168.1.3 Tunnel0 created 01:45:30, expire 01:33:54 Type: dynamic, Flags: unique registered used NBMA address: 1.1.34.3 R2#show ip nhrp 10.10.2.0/24 via 192.168.1.2 Tunnel0 created 00:13:24, expire 01:46:35 Type: dynamic, Flags: router unique local NBMA address: 1.1.24.2 (no-socket) 10.10.3.0/24 via 192.168.1.3 Tunnel0 created 00:13:23, expire 01:46:36 Type: dynamic, Flags: router used rib nho << next-hop override NBMA address: 1.1.34.3 192.168.1.1/32 via 192.168.1.1 Tunnel0 created 01:46:18, never expire Type: static, Flags: used NBMA address: 1.1.14.1 192.168.1.3/32 via 192.168.1.3 Tunnel0 created 00:13:24, expire 01:46:35 Type: dynamic, Flags: router implicit NBMA address: 1.1.34.3 R3#show ip nhrp 10.10.2.0/24 via 192.168.1.2 Tunnel0 created 00:13:30, expire 01:46:28 Type: dynamic, Flags: router used rib nho << next-hop override NBMA address: 1.1.24.2 10.10.3.0/24 via 192.168.1.3 Tunnel0 created 00:13:30, expire 01:46:29 Type: dynamic, Flags: router unique local NBMA address: 1.1.34.3 (no-socket) 192.168.1.1/32 via 192.168.1.1 Tunnel0 created 01:46:24, never expire Type: static, Flags: used NBMA address: 1.1.14.1 192.168.1.2/32 via 192.168.1.2 Tunnel0 created 00:13:31, expire 01:46:29 Type: dynamic, Flags: router implicit NBMA address: 1.1.24.2
---------- R1 - Hub: ---------- hostname R1 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.1 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast dynamic ip nhrp network-id 100 ip nhrp redirect ip tcp adjust-mss 1360 tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.14.1 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.1.1 255.255.255.0 ! router bgp 65001 bgp router-id 192.168.1.1 bgp log-neighbor-changes bgp listen range 192.168.1.0/24 peer-group DMVPN-SPOKES bgp listen limit 50 network 10.10.1.0 mask 255.255.255.0 aggregate-address 10.10.0.0 255.255.0.0 summary-only neighbor DMVPN-SPOKES peer-group neighbor DMVPN-SPOKES remote-as 65001 neighbor DMVPN-SPOKES route-reflector-client ! ip route 0.0.0.0 0.0.0.0 1.1.14.4 ------------ R2 - Spoke: ------------ hostname R2 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.2 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast 1.1.14.1 ip nhrp map 192.168.1.1 1.1.14.1 ip nhrp network-id 100 ip nhrp nhs 192.168.1.1 ip nhrp shortcut ip tcp adjust-mss 1360 tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.24.2 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.2.2 255.255.255.0 ! router bgp 65001 bgp router-id 192.168.1.2 bgp log-neighbor-changes network 10.10.2.0 mask 255.255.255.0 neighbor 192.168.1.1 remote-as 65001 ! ip route 0.0.0.0 0.0.0.0 1.1.24.4 ------------ R3 - Spoke: ------------ hostname R3 ! ip cef ! crypto isakmp policy 10 encr aes authentication pre-share group 2 crypto isakmp key DmVpNpR3$h@r3dK3Y address 0.0.0.0 ! crypto ipsec transform-set TRANSFORM-SET esp-aes esp-sha-hmac mode transport ! crypto ipsec profile PROTECT-GRE set transform-set TRANSFORM-SET ! interface Tunnel0 bandwidth 4096 ip address 192.168.1.3 255.255.255.0 no ip redirects ip mtu 1400 ip nhrp authentication NhRp@UtH ip nhrp map multicast 1.1.14.1 ip nhrp map 192.168.1.1 1.1.14.1 ip nhrp network-id 100 ip nhrp nhs 192.168.1.1 ip nhrp shortcut ip tcp adjust-mss 1360 tunnel source FastEthernet0/0 tunnel mode gre multipoint tunnel key 123 tunnel protection ipsec profile PROTECT-GRE ! interface FastEthernet0/0 ip address 1.1.34.3 255.255.255.0 ! interface FastEthernet0/1 ip address 10.10.3.3 255.255.255.0 ! router bgp 65001 bgp router-id 192.168.1.3 bgp log-neighbor-changes network 10.10.3.0 mask 255.255.255.0 neighbor 192.168.1.1 remote-as 65001 ! ip route 0.0.0.0 0.0.0.0 1.1.34.4
- BGP peering between Hub and Spokes only, No spoke to spoke peering R1#show ip bgp summary BGP router identifier 192.168.1.1, local AS number 65001 BGP table version is 8, main routing table version 8 4 network entries using 592 bytes of memory 4 path entries using 256 bytes of memory 3/3 BGP path/bestpath attribute entries using 408 bytes of memory 0 BGP route-map cache entries using 0 bytes of memory 0 BGP filter-list cache entries using 0 bytes of memory BGP using 1256 total bytes of memory BGP activity 4/0 prefixes, 4/0 paths, scan interval 60 secs Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd *192.168.1.2 4 65001 18 20 8 0 0 00:12:43 1 *192.168.1.3 4 65001 19 18 8 0 0 00:12:45 1 * Dynamically created based on a listen range command Dynamically created neighbors: 2, Subnet ranges: 1 BGP peergroup DMVPN-SPOKES listen range group members: 192.168.1.0/24 Total dynamically created neighbors: 2/(50 max), Subnet ranges: 1 R2#show ip bgp summary BGP router identifier 192.168.1.2, local AS number 65001 BGP table version is 3, main routing table version 3 2 network entries using 296 bytes of memory 2 path entries using 128 bytes of memory 2/2 BGP path/bestpath attribute entries using 272 bytes of memory 0 BGP route-map cache entries using 0 bytes of memory 0 BGP filter-list cache entries using 0 bytes of memory BGP using 696 total bytes of memory BGP activity 2/0 prefixes, 2/0 paths, scan interval 60 secs Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 192.168.1.1 4 65001 20 18 3 0 0 00:12:50 1 R3#show ip bgp summary BGP router identifier 192.168.1.3, local AS number 65001 BGP table version is 3, main routing table version 3 2 network entries using 296 bytes of memory 2 path entries using 128 bytes of memory 2/2 BGP path/bestpath attribute entries using 272 bytes of memory 0 BGP route-map cache entries using 0 bytes of memory 0 BGP filter-list cache entries using 0 bytes of memory BGP using 696 total bytes of memory BGP activity 2/0 prefixes, 2/0 paths, scan interval 60 secs Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 192.168.1.1 4 65001 19 19 3 0 0 00:12:54 1 - Traffic between Spoke-R2 and Spoke-R3 R2#ping 10.10.3.3 so 10.10.2.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.10.3.3, timeout is 2 seconds: Packet sent with a source address of 10.10.2.2 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 124/132/140 ms R2#trace 10.10.3.3 so 10.10.2.2 Type escape sequence to abort. Tracing the route to 10.10.3.3 VRF info: (vrf in name/id, vrf out name/id) 1 192.168.1.3 144 msec * 124 msec << Spoke R3 Tunnel IP - DMVPN Status R1#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Hub, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 1.1.24.2 192.168.1.2 UP 00:15:42 D 1 1.1.34.3 192.168.1.3 UP 00:15:42 D R2#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 2 1.1.34.3 192.168.1.3 UP 00:01:20 DT1 192.168.1.3 UP 00:01:20 D 1 1.1.14.1 192.168.1.1 UP 00:15:47 S *T1 - Route Installed R3#show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting UpDn Time --> Up or Down Time for a Tunnel ====================================================================== Interface: Tunnel0, IPv4 NHRP Details Type:Spoke, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 2 1.1.24.2 192.168.1.2 UP 00:01:23 DT1 192.168.1.2 UP 00:01:23 D 1 1.1.14.1 192.168.1.1 UP 00:15:49 S *T1 - Route Installed - BGP Table R1#show ip bgp BGP table version is 8, local router ID is 192.168.1.1 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, r RIB-failure, S Stale, m multipath, b backup-path, f RT-Filter, x best-external, a additional-path, c RIB-compressed, Origin codes: i - IGP, e - EGP, ? - incomplete RPKI validation codes: V valid, I invalid, N Not found Network Next Hop Metric LocPrf Weight Path *> 10.10.0.0/16 0.0.0.0 32768 i s> 10.10.1.0/24 0.0.0.0 0 32768 i s>i 10.10.2.0/24 192.168.1.2 0 100 0 i s>i 10.10.3.0/24 192.168.1.3 0 100 0 i R2#show ip bgp BGP table version is 3, local router ID is 192.168.1.2 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, r RIB-failure, S Stale, m multipath, b backup-path, f RT-Filter, x best-external, a additional-path, c RIB-compressed, Origin codes: i - IGP, e - EGP, ? - incomplete RPKI validation codes: V valid, I invalid, N Not found Network Next Hop Metric LocPrf Weight Path *>i 10.10.0.0/16 192.168.1.1 0 100 0 i *> 10.10.2.0/24 0.0.0.0 0 32768 i R3#show ip bgp BGP table version is 3, local router ID is 192.168.1.3 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, r RIB-failure, S Stale, m multipath, b backup-path, f RT-Filter, x best-external, a additional-path, c RIB-compressed, Origin codes: i - IGP, e - EGP, ? - incomplete RPKI validation codes: V valid, I invalid, N Not found Network Next Hop Metric LocPrf Weight Path *>i 10.10.0.0/16 192.168.1.1 0 100 0 i *> 10.10.3.0/24 0.0.0.0 0 32768 i - Routing Table R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.14.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.14.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.14.0/24 is directly connected, FastEthernet0/0 L 1.1.14.1/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 5 subnets, 3 masks B 10.10.0.0/16 [200/0] via 0.0.0.0, 00:17:13, Null0 C 10.10.1.0/24 is directly connected, FastEthernet0/1 L 10.10.1.1/32 is directly connected, FastEthernet0/1 B 10.10.2.0/24 [200/0] via 192.168.1.2, 00:16:05 B 10.10.3.0/24 [200/0] via 192.168.1.3, 00:16:57 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 L 192.168.1.1/32 is directly connected, Tunnel0 R2#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.24.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.24.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.24.0/24 is directly connected, FastEthernet0/0 L 1.1.24.2/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 4 subnets, 3 masks B 10.10.0.0/16 [200/0] via 192.168.1.1, 00:16:11 C 10.10.2.0/24 is directly connected, FastEthernet0/1 L 10.10.2.2/32 is directly connected, FastEthernet0/1 H 10.10.3.0/24 [250/1] via 192.168.1.3, 00:02:52, Tunnel0 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 L 192.168.1.2/32 is directly connected, Tunnel0 R3#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override Gateway of last resort is 1.1.34.4 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 1.1.34.4 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.34.0/24 is directly connected, FastEthernet0/0 L 1.1.34.3/32 is directly connected, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 4 subnets, 3 masks B 10.10.0.0/16 [200/0] via 192.168.1.1, 00:17:06 H 10.10.2.0/24 [250/1] via 192.168.1.2, 00:02:55, Tunnel0 C 10.10.3.0/24 is directly connected, FastEthernet0/1 L 10.10.3.3/32 is directly connected, FastEthernet0/1 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.1.0/24 is directly connected, Tunnel0 L 192.168.1.3/32 is directly connected, Tunnel0 - NHRP Table R1#show ip nhrp 192.168.1.2/32 via 192.168.1.2 Tunnel0 created 00:17:49, expire 01:42:10 Type: dynamic, Flags: unique registered used NBMA address: 1.1.24.2 192.168.1.3/32 via 192.168.1.3 Tunnel0 created 00:17:49, expire 01:42:11 Type: dynamic, Flags: unique registered used NBMA address: 1.1.34.3 R2#show ip nhrp 10.10.2.0/24 via 192.168.1.2 Tunnel0 created 00:03:27, expire 01:56:32 Type: dynamic, Flags: router unique local NBMA address: 1.1.24.2 (no-socket) 10.10.3.0/24 via 192.168.1.3 Tunnel0 created 00:03:27, expire 01:56:31 Type: dynamic, Flags: router used rib NBMA address: 1.1.34.3 192.168.1.1/32 via 192.168.1.1 Tunnel0 created 00:18:28, never expire Type: static, Flags: used NBMA address: 1.1.14.1 192.168.1.3/32 via 192.168.1.3 Tunnel0 created 00:03:28, expire 01:56:32 Type: dynamic, Flags: router implicit used NBMA address: 1.1.34.3 R3#show ip nhrp 10.10.2.0/24 via 192.168.1.2 Tunnel0 created 00:03:29, expire 01:56:30 Type: dynamic, Flags: router used rib NBMA address: 1.1.24.2 10.10.3.0/24 via 192.168.1.3 Tunnel0 created 00:03:30, expire 01:56:29 Type: dynamic, Flags: router unique local NBMA address: 1.1.34.3 (no-socket) 192.168.1.1/32 via 192.168.1.1 Tunnel0 created 00:18:31, never expire Type: static, Flags: used NBMA address: 1.1.14.1 192.168.1.2/32 via 192.168.1.2 Tunnel0 created 00:03:31, expire 01:56:29 Type: dynamic, Flags: router implicit used NBMA address: 1.1.24.2