VPN type | HUB Setup | Spoke Setup | Configure HUB when adding a new Spoke | Spoke setup when adding another new Spoke | Using dynamic routing protocols OSPF, EIGRP | Special features |
Regular IPSec (crypto map) | isakmp Crypto-map | isakmp Crypto-map | Yes: isakmp crypto-map: set peer, transform-set, crypto ACL | Yes: To ensure connectivity between the Spokees, it is necessary to add routes of the new Spoke in the crypto ACL of all existing Spokees. | Not | Convenient in case of Spoke <5-10. To ensure connectivity between the Spokes through HUB, it is required to add N networks on N spokes to crypto ACL Extremely unscalable. |
Regular IPSec (Profile) | isakmp profile, IPSec Profile, rypto-map | isakmp profile, IPSec Profile, rypto-map | Yes: crypto-map: set peer, crypto ACL | Yes: Adding new routes to crypto ACL | Not | Extremely non-scalable. Less configuration due to the combination of typical settings in profile. |
Regular IPSec (Profile, Static VTI) | isakmp profile, IPSec Profile, VTI (Virtual Tunnel Interface) | isakmp IPSec Profile, VTI (Virtual Tunnel Interface) | Yes: isakmp new VTI (Virtual Tunnel Interface) | Yes static route to networks beats. office | Yes | In SVTI configuration without IGP - extremely non-scalable. For each Spoke on SVTI. N spoke - N VTI and its own subnet. Spoke requires adding routes to remote Spoke's. Skips multicast! By default, there is only one IPSec SA for each SVTI with traffic selector “IP any any.” There is no crypto ACL command. The networks that are defined via the static route on the SVTI are wrapped in the tunnel. |
Regular IPSec (Profile, Static VTI and IGP) | isakmp IPSec Profile, VTI (Virtual Tunnel Interface) | isakmp IPSec Profile, VTI (Virtual Tunnel Interface) | Yes: isakmp new VTI (Virtual Tunnel Interface) | Not | Yes | Not scalable. For each Spoke on SVTI. N spoke - N VTI and its own subnet. Routes from IGP fall into the tunnel. |
IPSec with dynamic IP (Dynamic VTI and Static VTI and IGP) | keyring, isakmp policy, isakmp profile, ipsec profile, loopback for unnumbered interface (required), Virtual-Template type tunnel | keyring, isakmp policy, isakmp profile, ipsec profile, loopback for unnumbered interface Static VTI | Not | Not | Yes | Very scalable. All spoke and hub are in the same network! Dynamic VTI (DVTIs) is also a point-to-point interface. In point-to-multipoint mode, OSPF adjacency is not established. Using Unnumbered IP as DVTI address is required |
Easy VPN | AAA - for client authorization Isakmp, isakmp policy, isakmp profile, ipsec profile, interface, Virtual-Template type tunnel DHCP for clients | Minimum IPsec client configuration, indicating the VPN server, VPN group, user for aaa, Indication of internal and external interfaces. | Not | Not | Yes | Scalable. If NAT / PAT was previously configured, then this configuration should be deleted before implementing EASY VPN. There are features in the transform-set setup. |
GRE | Interface Tunnel, Static route | Interface Tunnel, Static route | Yes Int tunnel Static route | Yes Static route | Yes | Not scalable. Forms a P2P link, each tunnel has its own subnet. Perfect for tunneling IGP protocols. |
IGP over GRE | Interface Tunnel, Static route | Interface Tunnel, Static route | Yes Int tunnel | Not | Yes | Not scalable. Each tunnel has its own subnet. IGP protocols work through a tunnel with default settings. |
DMVPN (proprietary) | DMVPN phase 1 - mGRE only DMVPN phase 2 - setting up the ipsec profile to protect traffic | Minimum: DMVPN phase 1 - mGRE only DMVPN phase 2 - setting up the ipsec profile to protect traffic | Not | Not: when adding a new spoke - the tunnel to it is built automatically | Yes: EIGRP on HUB turn off the split of the horizon and save yourself as next-hop in route announcements | The most scalable protocol. GRE multipoint. Tunnels between remote offices are dynamically created. |
PPTP | Vpdn-group, interface virtual-template, IP local pool, username / password for authorization, static route to the office network | service internal (to enable client pptp settings), vpdn-group, interface dialer, dialer-list, static route to center networks., Del. office | Yes Static route for internal networks for PPTP client | Yes Static route for new internal networks for a new PPTP client | Yes | Scalable with restrictions. Morally obsolete protocol, vulnerabilities in cryptography in the MSCHAPv2 authorization protocol. Most often used to create remote access. Supported by many popular versions of Windows. Isp only one protocol for encryption -MPPE (RC4 with a 128-bit key). It supports multicast, because PPP are encapsulated in GRE. |
IGP over PPTP | Vpdn-group, interface virtual-template, IP local pool, username / password for authentication, IGP protocol (router ospf process) | service internal (to enable client pptp settings), vpdn-group, interface dialer, dialer-list, IGP protocol (router ospf process) | Not | Not | Yes | Scalable with restrictions. It supports multicast, because PPP are encapsulated in GRE. Morally obsolete protocol -> L2TP over IPSec alternative |
L2TPv3 xconnect | pseudowire-class xconnect | pseudowire-class xconnect | Yes xconnect | Not | Yes | Not scalable. Great for posting native L2 vlan over IP network. But, you must have a backup gateway by default. Creating xconnect on the router interface, we have to remove the IP address from its interface, thereby removing the default route for all devices within this network. |
L2TPv2 / v3 | aaa new-model, username to authorize L2TP peer, VPDN-group, interface virtual-template, static route to networks beats. office | username for authorization L2TP HUBa, interface virtual-ppp, pseudowire class, static route to center networks., Del. office | Yes: static route to remote office internal networks | Yes: static route to remote office internal networks | Yes | Scalable. L2TPv3 provides great benefits by allowing you to not only encapsulate PPP traffic, like L2TPv2, but also send a VLAN tag and also encapsulate HDLC, Frame Relay. |
IGP over L2TPv2 / v3 | aaa new-model, username to authorize L2TP peer, VPDN-group, interface virtual-template, IGP (router ospf process) | username for authorization L2TP HUBa, interface virtual-ppp, pseudowire class, IGP (router ospf process) | Not | Not | Yes | Very scalable. Allows you to configure the routing protocols "by default", the connection of remote offices via L2TPv2 / v3 HUB (at the central office). |
ISAKMP: (1007): Old State = IKE_I_MM6 New State = IKE_I_MM6 * Sep 3 08: 59: 27.539: ISAKMP: (1007): Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE * Sep 3 08: 59: 27.543: ISAKMP: (1007): Old State = IKE_I_MM6 New State = IKE_P1_COMPLETE |
* Sep 3 08: 59: 27.559: ISAKMP: (1007): beginning Quick Mode exchange, M-ID of 2551719066 * Sep 3 08: 59: 27.563: ISAKMP: (1007): QM Initiator gets spi * Sep 3 08: 59: 27.575: ISAKMP: (1007): sending packet to 192.168.0.2 my_port 500 peer_port 500 (I) QM_IDLE * Sep 3 08: 59: 27.575: ISAKMP: (1007): Sending an IKE IPv4 Packet . * Sep 3 08: 59: 27.583: ISAKMP: (1007): Node 2551719066, Input = IKE_MESG_INTERNAL, IKE_INIT_QM * Sep 3 08: 59: 27.587: ISAKMP: (1007): Old State = IKE_QM_READY New State = IKE_QM_I_QM1 * Sep 3 08: 59: 27.803: ISAKMP: (1007): Checking IPSec proposal 1 * Sep 3 08: 59: 27.803: ISAKMP: transform 1, ESP_AES * Sep 3 08: 59: 27.807: ISAKMP: attributes in transform : * Sep 3 08: 59: 27.807: ISAKMP: encaps is 1 (Tunnel) * Sep 3 08: 59: 27.811: ISAKMP: SA life type in seconds * Sep 3 08: 59: 27.815: ISAKMP: SA life duration (basic) of 3600 * Sep 3 08: 59: 27.815: ISAKMP: SA life type in kilobytes * Sep 3 08: 59: 27.819: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0 * Sep 3 08: 59: 27.827: ISAKMP: authenticator is HMAC-SHA * Sep 3 08: 59: 27.827: ISAKMP: key length is 128 * Sep 3 08: 59: 27.831: ISAKMP: (1007): atts are acceptable. * Sep 3 08: 59: 27.855: ISAKMP: (1007): Old State = IKE_QM_I_QM1 New State = IKE_QM_IPSEC_INSTALL_AWAIT ISAKMP: (1007): Old State = IKE_QM_IPSEC_INSTALL_AWAIT New State = IKE_QM_PHASE2_COMPLETE |
Error while processing SA request: Failed to initialize SA * Sep 3 08: 36: 38.239: ISAKMP: Error while processing KMI message 0, error 2. * Sep 3 08: 36: 38.287: ISAKMP: (0): retransmitting phase 1 MM_NO_STATE ... * Sep 3 08: 40: 38.307: ISAKMP (0): incrementing error on ret 5, retransmit phase 1 * Sep 3 08: 40: 38.307: ISAKMP: (0): retransmitting phase 1 MM_NO_STATE * Sep 3 08: 37: 08.339: ISAKMP: (0): deleting SA reason "Death by retransmission P1" state (I) MM_NO_STATE (peer 192.168.0.2) * Sep 3 08: 41: 08.359: ISAKMP: (0): Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL * Sep 3 08: 41: 08.359: ISAKMP: (0): Old State = IKE_I_MM1 New State = IKE_DEST_SA |
R7 # sh crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id status 192.168.0.2 192.168.0.1 MM_NO_STATE 0 ACTIVE |
R7 # sh run | i transform crypto ipsec transform-set TRANSFORM esp-aes esp-md5-hmac |
R10 # sh run | i transform crypto ipsec transform-set TRANSFORM esp-aes esp-sha-hmac |
* Sep 3 08: 56: 08.551: ISAKMP: (1006): IPSec policy invalidated proposal with error 256 * Sep 3 08: 56: 08.559: ISAKMP: (1006): phase 2 SA policy not acceptable! (local 192.168.0.1 remote 192.168.0.2) * Sep 3 08: 56: 08.563: ISAKMP: set new node -1456368678 to QM_IDLE * Sep 3 08: 56: 08.567: ISAKMP: (1006): Sending NOTIFY PROPOSAL_NOT_CHOSEN protocol 3 spi 1785687224, message ID = 2838598618 * Sep 3 08: 56: 08.575: ISAKMP: (1006): sending packet to 192.168.0.2 my_port 500 peer_port 500 (I) QM_IDLE * Sep 3 08: 56: 08.579: ISAKMP: (1006): Sending an IKE IPv4 Packet. * Sep 3 08: 56: 08.583: ISAKMP: (1006): purging node -1456368678 * Sep 3 08: 56: 08.587: ISAKMP: (1006): deleting node 1350414148 error TRUE reason " QM rejected " * Sep 3 08: 56: 08.591: ISAKMP: (1006): Node 1350414148, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH * Sep 3 08: 56: 08.595: ISAKMP: (1006): Old State = IKE_QM_READY New State = IKE_QM_READY |
R7 #sh run | i isakmp key crypto isakmp key cisco123 address 172.16.1.2 |
R10 #sh run | i isakmp key crypto isakmp key cisco address 0.0.0.0 0.0.0.0 |
* Sep 3 09: 14: 30.659: ISAKMP: (1010): retransmitting phase 1 MM_KEY_EXCH ... * Sep 3 09: 14: 30.663: ISAKMP (1010): incrementing error on ret 5, retransmit phase 1 * Sep 3 09: 14: 30.663: ISAKMP: (1010): retransmitting phase 1 MM_KEY_EXCH * Sep 3 09: 14: 30.663: ISAKMP: (1010): sending packet to 192.168.0.2 my_port 500 peer_port 500 (I) MM_KEY_EXCH * Sep 3 09: 14: 30.663: ISAKMP: (1010): Sending an IKE IPv4 Packet. * Sep 3 09: 14: 30.711: ISAKMP (1010): received packet from 192.168.0.2 dport 500 sport 500 Global (I) MM_KEY_EXCH * Sep 3 09: 14: 30.715: ISAKMP: (1010): phase 1 packet is a duplicate of a previous packet. * Sep 3 09: 14: 50.883: ISAKMP: (1011): retransmitting due to retransmit phase 1 * Sep 3 09: 14: 51.383: ISAKMP: (1011): retransmitting phase 1 MM_KEY_EXCH ... * Sep 3 09: 14: 51.387: ISAKMP: (1011): peer does not paranoid keepalives. * Sep 3 09: 14: 51.387: ISAKMP: (1011): deleting SA reason "Death by retransmission P1" state ® MM_KEY_EXCH (peer 192.168.0.2) * Sep 3 09: 14: 51.395: ISAKMP: (1011): Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL |
Hub | Spoke1 |
Configure the first IPSec phase for session key exchange: crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp key cisco123 address 172.16.1.2 ! Setting up the second phase of IPSec c setting the encryption algorithm and authentication crypto ipsec transform-set Trans_HUB1_SP1 esp-aes 256 esp-md5-hmac ! crypto map HUB_SPOKEs 1 ipsec-isakmp set peer 172.16.1.2 set transform-set Trans_HUB1_SP1 match address TO_Spoke1 reverse-route static ! | crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp key cisco123 address 192.168.1.1 ! crypto ipsec transform-set Trans_SP1_HUB1 esp-aes 256 esp-md5-hmac ! crypto map SP1_HUB 1 ipsec-isakmp set peer 192.168.1.1 set transform-set Trans_SP1_HUB1 match address TO_HUB reverse-route static ! |
Configuring route wrapping in a tunnel | |
ip access-list extended TO_Spoke1 permit ip 10.0.0.0 0.0.0.255 1.1.1.0 0.0.0.255 ! Interface Ethernet0 / 0 ip address 192.168.1.1 255.255.255.0 crypto map HUB_SPOKEs ! | ip access-list extended TO_HUB permit ip 1.1.1.0 0.0.0.255 10.0.0.0 0.0.0.255 ! Interface Ethernet0 / 0 ip address 172.16.1.1 255.255.255.0 crypto map SP1_HUB ! |
HUB #ping 1.1.1.1 source 10.0.0.1 . !!!! Success rate is 80 percent (4/5), round-trip min / avg / max = 4/4/5 ms | Spoke1 #ping 10.0.0.1 source 1.1.1.1 . !!!! Success rate is 80 percent (4/5), round-trip min / avg / max = 4/4/5 ms |
VPN Convergence Check: | |
Successful key exchange: Spoke1 #show crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id status 192.168.1.1 172.16.1.2 QM_IDLE 1007 ACTIVE Successful passing of traffic through VPN: Spoke1 #show crypto ipsec sa interface: Ethernet0 / 0 Crypto map tag: SP1_HUB, local addr 172.16.1.2 protected vrf: (none) local ident (addr / mask / prot / port): (1.1.1.0/255.255.255.0/256/0) remote ident (addr / mask / prot / port): (10.0.0.0/255.255.255.0/256/0) current_peer 192.168.1.1 port 500 PERMIT, flags = {origin_is_acl,} # pkts encaps: 4 , #pkts encrypt: 4, #pkts digest: 4 # pkts decaps: 4 , #pkts decrypt: 4, #pkts verify: 4 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt .: 172.16.1.2, remote crypto endpt .: 192.168.1.1 path mtu 1500, ip mtu 1500, ip mtu idb Ethernet0 / 0 current outbound spi: 0xA7424886 (2806139014) PFS (Y / N): N, DH group: none |
Hub #sho crypto ipsec sa interface: Ethernet0 / 0 Crypto map tag: HUB_SPOKEs, local addr 192.168.1.1 protected vrf: (none) local ident (addr / mask / prot / port): (10.0.0.0/255.255.255.0/256/0) remote ident (addr / mask / prot / port): (1.1.1.0/255.255.255.0/256/0) current_peer 172.16.1.2 port 500 PERMIT, flags = {origin_is_acl,} #pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4 #pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt .: 192.168.1.1, remote crypto endpt .: 172.16.1.2 path mtu 1500, ip mtu 1500, ip mtu idb Ethernet0 / 0 current outbound spi: 0x10101858 (269490264) PFS (Y / N): N, DH group: none inbound esp sas: spi: 0xA7424886 (2806139014) transform: esp-256-aes esp-md5-hmac, in use settings = {Tunnel,} conn id: 19, flow_id: SW: 19, sibling_flags 80000040, crypto map: HUB_SPOKEs sa timing: remaining key lifetime (k / sec): (4360017/2846) IV size: 16 bytes replay detection support: Y Status: ACTIVE (ACTIVE) |
Setup on HUB | Setup on the new Spoke |
HUB # crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp key cisco123 address 172.16.1.2 crypto isakmp key cisco456 address 172.16.2.3 ! ! crypto ipsec transform-set Trans_HUB1_SP1 esp-aes 256 esp-md5-hmac ! crypto map HUB_SPOKEs 1 ipsec-isakmp set peer 172.16.1.2 set peer 172.16.2.3 set transform-set Trans_HUB1_SP1 match address TO_Spokes reverse-route static ! ip access-list extended TO_Spokes permit ip 10.0.0.0 0.0.0.255 1.1.1.0 0.0.0.255 permit ip 10.0.0.0 0.0.0.255 2.2.2.0 0.0.0.255 those. to add N spoke, you need 3 N additional lines | The setup is the same as on the first Spoke1 (including the internal network correction in the ACL) Spoke2 # crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp key cisco456 address 192.168.1.1 ! ! crypto ipsec transform-set Trans_SP2_HUB1 esp-aes 256 esp-md5-hmac ! crypto map SP2_HUB 1 ipsec-isakmp set peer 192.168.1.1 set transform-set Trans_SP2_HUB1 match address TO_HUB reverse-route static ! ip access-list extended TO_HUB permit ip 2.2.2.0 0.0.0.255 10.0.0.0 0.0.0.255 |
Check availability of a second remote office: HUB # ping 2.2.2.2 source 10.0.0.1 . !!!! Success rate is 80 percent (4/5), round-trip min / avg / max = 4/4/5 ms An additional key exchange session with the second Spoke now appeared on HUB: Hub sho crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id status 192.168.1.1 172.16.2.3 QM_IDLE 1009 ACTIVE 192.168.1.1 172.16.1.2 QM_IDLE 1008 ACTIVE However, there is no connection between the offices (even through HUB). Spoke1 # ping 2.2.2.2 source 1.1.1.1 ..... Success rate is 0 percent (0/5) |
HUB # crypto ipsec transform-set 3DES-MD5 esp-3des esp-md5-hmac mode tunnel ! crypto ipsec profile Spokes_VPN_Profile set security-association lifetime seconds 86400 set transform-set 3DES-MD5 set reverse-route distance 1 reverse-route ! crypto dynamic-map hq-vpn 30 set profile Spokes_VPN_Profile match address VPN33-32-TRAFFIC crypto dynamic-map hq-vpn 3348 set profile Spokes_VPN_Profile match address VPN3348-TRAFFIC crypto dynamic-map hq-vpn 50 set profile Spokes_VPN_Profile match address VPN33-64-TRAFFIC ! crypto map VPN 1 ipsec-isakmp dynamic hq-vpn ! interface GigabitEthernet1 / 0 ip address 55.1.1.5 255.255.255.0 <omitted ...> crypto map VPN ! ip access-list extended VPN33-32-TRAFFIC permit ip any 192.168.33.32 0.0.0.15 ip access-list extended VPN33-48-TRAFFIC permit ip any 192.168.33.48 0.0.0.15 ip access-list extended VPN33-64-TRAFFIC permit ip any 192.168.33.64 0.0.0.15 | Spoke # crypto ipsec transform-set 3DES-MD5 esp-3des esp-md5-hmac mode tunnel ! crypto map VPN 1 ipsec-isakmp set peer 55.1.1.5 set transform-set 3DES-MD5 match address TO_HUB reverse-route static ! interface FastEthernet0 / 0 ip address negotiated <omitted ...> crypto map VPN ! ip access-list extended TO_HUB permit ip 192.168.33.32 0.0.0.15 any |
Configuring Static VTI through profiles | |
HUB # crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp key cisco123 address 172.16.1.2 ! crypto ipsec transform-set Trans_HUB_SP esp-aes esp-sha-hmac ! crypto ipsec profile P1 set transform-set Trans_HUB_SP ! interface Tunnel0 ip address 10.1.1.254 255.255.255.0 ip ospf mtu-ignore * (see below) load-interval 30 tunnel source 192.168.1.1 tunnel mode ipsec ipv4 tunnel destination 172.16.1.2 tunnel protection ipsec profile P1 ! router ospf 1 network 10.0.0.0 0.0.0.255 area 0 network 10.1.1.0 0.0.0.255 area 0 | Spoke1 # crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp key cisco123 address 192.168.1.1 ! crypto ipsec transform-set Trans_HUB_SP esp-aes esp-sha-hmac ! crypto ipsec profile P1 set transform-set Trans_HUB_SP ! interface Tunnel0 ip address 10.1.1.1 255.255.255.0 ip ospf mtu-ignore load-interval 30 tunnel source 172.16.1.2 tunnel mode ipsec ipv4 tunnel destination 192.168.1.1 tunnel protection ipsec profile P1 ! router ospf 1 network 1.1.1.0 0.0.0.255 area 0 network 10.1.1.0 0.0.0.255 area 0 |
Hub # sh ip opf neighbor Neighbor ID Pri State Dead Time Address Interface 1.1.1.1 0 FULL / - 00:00:33 10.1.1.1 Tunnel0 The network on Spoke 1 is now accessible via the tunnel. HUB # sh ip route 1.0.0.0/32 is subnetted, 1 subnets O 1.1.1.1 [110/1001] via 10.1.1.1, 00:02:56, Tunnel0 10.0.0.0/8 is variably subnetted, 6 subnets, 2 masks C 10.0.0.0/24 is directly connected, Loopback0 L 10.0.0.1/32 is directly connected, Loopback0 C 10.0.1.0/24 is directly connected, Loopback1 L 10.0.1.1/32 is directly connected, Loopback1 C 10.1.1.0/24 is directly connected, Tunnel0 L 10.1.1.254/32 is directly connected, Tunnel0 Checking the availability of networks in the Central Office with Spoke 1 Spoke1 # ping 10.0.0.1 source 1.1.1.1 !!!!! Success rate is 100 percent (5/5), round-trip min / avg / max = 5/5/5 ms |
Spoke1#sho crypto ipsec sa interface: Tunnel0 Crypto map tag: Tunnel0-head-0, local addr 172.16.1.2 protected vrf: (none) local ident (addr/mask/prot/port): ( 0.0.0.0 /0.0.0.0/256/0) remote ident (addr/mask/prot/port): ( 0.0.0.0 /0.0.0.0/256/0) current_peer 192.168.1.1 port 500 PERMIT, flags={origin_is_acl,} #pkts encaps: 76, #pkts encrypt: 76, #pkts digest: 76 #pkts decaps: 65, #pkts decrypt: 65, #pkts verify: 65 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 |
HUB #sho ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 2.2.2.2 0 FULL/ - 00:00:31 10.1.2.2 Tunnel1 1.1.1.1 0 FULL/ - 00:00:30 10.1.1.1 Tunnel0 Spoke1 Spoke1 #sh ip route Gateway of last resort is 172.16.1.5 to network 0.0.0.0 <...ommited...> C 1.1.1.0/24 is directly connected, Loopback0 L 1.1.1.1/32 is directly connected, Loopback0 2.0.0.0/32 is subnetted, 1 subnets O 2.2.2.2 [110/2001] via 10.1.1.254, 01:53:04, Tunnel0 <- Spoke2 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks O 10.0.0.1 /32 [110/1001] via 10.1.1.254, 02:04:11, Tunnel0 <- O 10.0.1.1 /32 [110/1001] via 10.1.1.254, 02:04:11, Tunnel0 <- HUB-Spoke1 C 10.1.1.0/24 is directly connected, Tunnel0 L 10.1.1.1/32 is directly connected, Tunnel0 O 10.1.2.0/2 4 [110/2000] via 10.1.1.254, 01:53:14, Tunnel0 <- HUB-Spoke2 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks : Spoke1 #traceroute 2.2.2.2 Type escape sequence to abort. Tracing the route to 2.2.2.2 VRF info: (vrf in name/id, vrf out name/id) 1 10.1.1.254 5 msec 4 msec 5 msec 2 10.1.2.2 5 msec 10 msec * |
HUB# crypto keyring KEY_Dynamic_connection pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123 ! crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp profile DVTI keyring KEY_Dynamic_connection match identity address 0.0.0.0 virtual-template 1 ! crypto ipsec transform-set Trans_HUB_SP esp-aes esp-sha-hmac ! crypto ipsec profile P1 set transform-set Trans_HUB_SP set isakmp-profile DVTI ! interface Loopback1 ip address 10.1.1.254 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Loopback1 ip ospf mtu-ignore tunnel mode ipsec ipv4 tunnel protection ipsec profile P1 ! router ospf 1 network 10.0.0.0 0.0.0.255 area 0 network 10.1.1.0 0.0.0.255 area 0 | Spoke1# crypto keyring KEY_Dynamic_connection pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123 ! crypto isakmp policy 1 hash md5 authentication pre-share group 5 crypto isakmp profile DVTI keyring KEY_Dynamic_connection match identity address 0.0.0.0 ! crypto ipsec transform-set Trans_HUB_SP esp-aes esp-sha-hmac ! crypto ipsec profile P1 set transform-set Trans_HUB_SP set isakmp-profile DVTI ! interface Loopback1 ip address 10.1.1.1 255.255.255.0 ! interface Tunnel0 ip unnumbered Loopback1 ip ospf mtu-ignore tunnel source Ethernet0/0 tunnel mode ipsec ipv4 tunnel destination 192.168.1.1 tunnel protection ipsec profile P1 ! router ospf 1 network 1.1.1.0 0.0.0.255 area 0 network 10.1.1.0 0.0.0.255 area 0 |
HUB#sh crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id status 192.168.1.1 172.16.2.3 QM_IDLE 1047 ACTIVE 192.168.1.1 172.16.1.2 QM_IDLE 1046 ACTIVE HUB# sh ip int br Interface IP-Address OK? Method Status Protocol Ethernet0/0 192.168.1.1 YES NVRAM up up Ethernet0/1 unassigned YES manual up up Ethernet0/2 unassigned YES NVRAM down down Ethernet0/3 unassigned YES manual up up Loopback0 10.0.0.1 YES manual up up Loopback1 10.1.1.254 YES manual up up Virtual-Access1 10.1.1.254 YES unset up up Virtual-Access2 10.1.1.254 YES unset up up Virtual-Template1 10.1.1.254 YES manual up down HUB#sho crypto ipsec sa interface: Virtual-Access2 Crypto map tag: Virtual-Access2-head-0, local addr 192.168.1.1 protected vrf: (none) local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/256/0) remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/256/0) current_peer 172.16.1.2 port 500 interface: Virtual-Access1 Crypto map tag: Virtual-Access1-head-0, local addr 192.168.1.1 protected vrf: (none) local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/256/0) remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/256/0) current_peer 172.16.2.3 port 500 |
HUB #sh ip ospf neighbor spoke- ! Neighbor ID Pri State Dead Time Address Interface 1.1.1.1 0 FULL/ - 00:00:32 10.1.1 .1 Virtual-Access2 2.2.2.2 0 FULL/ - 00:00:35 10.1.1 .2 Virtual-Access1 HUB #sh ip route Gateway of last resort is not set 1.0.0.0/32 is subnetted, 1 subnets O 1.1.1.1 [110/2] via 10.1.1.1, 00:05:00, Virtual-Access2 <- Spoke1 2.0.0.0/32 is subnetted, 1 subnets O 2.2.2.2 [110/2] via 10.1.1.2, 00:44:01, Virtual-Access1 <- Spoke2 10.0.0.0/8 is variably subnetted, 6 subnets, 2 masks C 10.0.0.0/24 is directly connected, Loopback0 L 10.0.0.1/32 is directly connected, Loopback0 C 10.1.1.0/24 is directly connected, Loopback1 O 10.1.1.1 /32 [110/2] via 10.1.1.1, 00:05:00, Virtual-Access2 <- Spoke1 O 10.1.1.2 /32 [110/2] via 10.1.1.2, 00:44:01, Virtual-Access1 <- Spoke2 L 10.1.1.254/32 is directly connected, Loopback1 172.16.0.0/24 is subnetted, 3 subnets 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.1.0/24 is directly connected, Ethernet0/0 L 192.168.1.1/32 is directly connected, Ethernet0/0 Spoke1: Spoke1 #sh ip route Gateway of last resort is 172.16.1.5 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 172.16.1.5 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 1.1.1.0/24 is directly connected, Loopback0 L 1.1.1.1/32 is directly connected, Loopback0 2.0.0.0/32 is subnetted, 1 subnets O 2.2.2.2 [110/1002] via 10.1.1.254, 00:05:38, Tunnel0 <- Spoke2 10.0.0.0/8 is variably subnetted, 5 subnets, 2 masks O 10.0.0.1 /32 [110/1001] via 10.1.1.254, 00:05:38, Tunnel0 <- C 10.1.1.0/24 is directly connected, Loopback1 L 10.1.1.1/32 is directly connected, Loopback1 O 10.1.1.2 /32 [110/1002] via 10.1.1.254, 00:05:38, Tunnel0 <- Spoke2 O 10.1.1.254 /32 [110/1001] via 10.1.1.254, 00:02:26, Tunnel0 <- HUBa 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks C 172.16.1.0/24 is directly connected, Ethernet0/0 L 172.16.1.2/32 is directly connected, Ethernet0/0 Spoke1 #traceroute 2.2.2.2 1 10.1.1.254 5 msec 5 msec 5 msec 2 10.1.1.2 9 msec 5 msec * Spoke1 #traceroute 10.1.1.2 1 10.1.1.254 5 msec 5 msec 5 msec 2 10.1.1.2 5 msec 10 msec * |
Spoke1 (config-if)#no shutdown *Aug 6 10:02:27.669: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON *Aug 6 10:02:27.702 : %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to up *Aug 6 10:02:27.713 : %OSPF-5-ADJCHG: Process 1, Nbr 10.0.0.1 on Tunnel0 from LOADING to FULL, Loading Done |
VPN_HUB# aaa new-model ! aaa authorization network LOCAL-AUTHOR local crypto isakmp policy 10 authentication pre-share group 2 ! crypto isakmp client configuration group VPN-CLIENT-GROUP key vpnclientcisco pool VPN-LOCAL-POOL acl 100 crypto isakmp profile PROFILE-ISAKMP match identity group VPN-CLIENT-GROUP isakmp authorization list LOCAL-AUTHOR client configuration address respond client configuration group VPN-CLIENT-GROUP virtual-template 1 ! crypto ipsec transform-set TRANSFORM-IPSEC esp-aes esp-sha-hmac ! crypto ipsec profile PROFILE-IPSEC set transform-set TRANSFORM-IPSEC set isakmp-profile PROFILE-ISAKMP interface Ethernet0/0 ip address 192.168.1.2 255.255.255.0 ip nat inside ip virtual-reassembly in ! interface Ethernet0/1 ip address 77.1.1.2 255.255.255.0 ip nat outside ip virtual-reassembly in ! interface Virtual-Template1 type tunnel ip unnumbered Ethernet0/1 ip nat inside ip virtual-reassembly in tunnel mode ipsec ipv4 tunnel protection ipsec profile PROFILE-IPSEC ! ip local pool VPN-LOCAL-POOL 172.16.40.1 172.16.40.100 ! ip nat inside source list TONAT interface Ethernet0/1 overload | ( ip VPN HUB, VPN-, VPN- ) VPN_Client # crypto ipsec client ezvpn EZVPN-CLIENT connect auto group VPN-CLIENT-GROUP key vpnclientcisco mode client peer 77.1.1.2 username cisco password cisco xauth userid mode local ! interface Ethernet0/0 ip address 172.16.1.7 255.255.255.0 crypto ipsec client ezvpn EZVPN-CLIENT ! interface Ethernet0/2 ip address 192.168.2.7 255.255.255.0 ip nat inside crypto ipsec client ezvpn EZVPN-CLIENT inside |
IP VPN_ Client #sh ip int br Interface IP-Address OK? Method Status Protocol Ethernet0/0 172.16.1.7 YES NVRAM up up Ethernet0/2 192.168.2.7 YES NVRAM up up Loopback0 7.7.7.7 YES NVRAM up up Loopback10000 172.16.40.49 YES TFTP up up NVI0 172.16.1.7 YES unset up up |
VPN_Client #sh ip nat statistics Total active translations: 0 (0 static, 0 dynamic; 0 extended) Peak translations: 0 Outside interfaces: Ethernet0/0 Inside interfaces: Ethernet0/2 Hits: 0 Misses: 0 CEF Translated packets: 0, CEF Punted packets: 0 Expired translations: 0 Dynamic mappings: — Inside Source [Id: 106] access-list EZVPN-CLIENT_internet-list interface Ethernet0/0 refcount 0 [Id: 105] access-list EZVPN-CLIENT_enterprise-list pool EZVPN-CLIENT refcount 0 pool EZVPN-CLIENT: netmask 255.255.255.0 start 172.16.40.49 end 172.16.40.49 type generic, total addresses 1, allocated 0 (0%), misses 0 |
VPN_Client#sh access-lists EZVPN-CLIENT_internet-list ( ) Extended IP access list EZVPN-CLIENT_internet-list 10 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255 20 deny ip 192.168.2.0 0.0.0.255 2.2.2.0 0.0.0.255 30 permit ip 192.168.2.0 0.0.0.255 any ! VPN_Client #sh access-lists EZVPN-CLIENT_enterprise-list ( IP) Extended IP access list EZVPN-CLIENT_enterprise-list 10 permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255 20 permit ip 192.168.2.0 0.0.0.255 2.2.2.0 0.0.0.255 |
LNS# interface Tunnel1 ip address 10.3.7.3 255.255.255.0 tunnel source Ethernet0/1 tunnel destination 77.1.1.7 | LAC# interface Tunnel1 ip address 10.3.7.7 255.255.255.0 tunnel source Ethernet0/0 tunnel destination 55.1.1.3 |
GRE, OSFP | |
LNS# router ospf 1 network 10.3.9.0 0.0.0.255 area 0 network 10.3.7.0 0.0.0.255 area 0 network 192.168.1.0 0.0.0.255 area 0 | LAC# router ospf 1 network 10.3.7.0 0.0.0.255 area 0 network 172.30.1.0 0.0.0.255 area 0 |
LAC #sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 3.3.3.3 0 FULL/ - 00:00:30 10.3.7.3 Tunnel1 , OSPF, . LAC #sh ip route ospf 10.3.9.0/8 is variably subnetted, 3 subnets, 2 masks O 10.3.9.0/24 [110/2000] via 10.3.7.3, 00:19:02, Tunnel1 < — R3 <-> R9 99.0.0.0/32 is subnetted, 1 subnets O 99.99.99.99 [110/2001] via 10.3.7.3, 00:19:02, Tunnel1 < — loopback R9 O 192.168.1.0/24 [110/1010] via 10.3.7.3, 00:19:02, Tunnel1 < — HQ LAC#ping 192.168.1.1 source 172.30.1.7 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: Packet sent with a source address of 172.30.1.7 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms |
LNS# crypto isakmp policy 10 encr 3des authentication pre-share group 2 ! crypto isakmp key ipseckey123 address 77.1.1.7 ! crypto ipsec transform-set ESP-AES256-SHA1 esp-aes 256 esp-sha-hmac mode transport ! crypto map GREoverIPSec 5 ipsec-isakmp set peer 77.1.1.7 set transform-set ESP-AES256-SHA1 match address GRE ! ! GRE 47, 47 ip access-list extended GRE permit gre any any ! interface Ethernet0/1 ip address 55.1.1.3 255.255.255.0 crypto map GREoverIPSec | LAC# crypto isakmp policy 10 encr 3des authentication pre-share group 2 ! crypto isakmp key ipseckey123 address 55.1.1.3 ! crypto ipsec transform-set ESP-AES256-SHA1 esp-aes 256 esp-sha-hmac mode transport ! crypto map GREoverIPSec 5 ipsec-isakmp set peer 55.1.1.3 set transform-set ESP-AES256-SHA1 match address GRE ! ! ip access-list extended GRE permit gre any any ! interface Ethernet0/0 ip address 77.1.1.7 255.255.255.0 crypto map GREoverIPSec ! ! |
LAC #ping 192.168.1.1 source 172.30.1.7 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: Packet sent with a source address of 172.30.1.7 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/5/6 ms IPSec LAC #sh crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id status 55.1.1.3 77.1.1.7 QM_IDLE 1001 ACTIVE (SA) LAC #sh crypto ipsec sa interface: Ethernet0/0 Crypto map tag: GREoverIPSec , local addr 77.1.1.7 protected vrf: (none) local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/47/0) remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/47/0) current_peer 55.1.1.3 port 500 PERMIT, flags={origin_is_acl,} # pkts encaps : 109, #pkts encrypt: 28559, #pkts digest: 28559 # pkts decaps : 184, #pkts decrypt: 28784, #pkts verify: 28784 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 77.1.1.7, remote crypto endpt.: 55.1.1.3 path mtu 1500, ip mtu 1500, ip mtu idb Ethernet0/0 current outbound spi: 0xBCF71DA2(3170311586) PFS (Y/N): N, DH group: none |
LAC #sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 3.3.3.3 0 FULL/ - 00:00:31 10.3.7.3 Tunnel1 |
HUB # interface Tunnel1 description DMVPN_HUB /// mGRE setup ip address 10.5.5.1 255.255.255.0 tunnel source FastEthernet0 / 0 tunnel mode gre multipoint tunnel key 111001 no ip redirects ip mtu 1416 /// NHRP setup ip nhrp map multicast dynamic ip nhrp network-id 101 ip nhrp server-only ip tcp adjust-mss 1376 end | Spoke # interface Tunnel1 ip address 10.5.5.3 255.255.255.0 no ip redirects ip mtu 1416 ip nhrp map multicast dynamic ip nhrp map multicast 192.168.1.1 (address) ip nhrp map 10.5.5.1 192.168.1.1 ip nhrp network-id 101 ip nhrp nhs 10.5.5.1 (tunnel address) ip tcp adjust-mss 1380 keepalive 10 3 tunnel source FastEthernet0 / 0 tunnel mode gre multipoint tunnel key 111001 end |
Spoke #sh dmvpn Legend: Attrb -> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent -> Number of NHRP entries with same NBMA peer NHS Status: E -> Expecting Replies, R -> Responding, W -> Waiting UpDn Time -> Up or Down Time for a Tunnel ================================================= ======================== Interface: Tunnel1, IPv4 NHRP Details Type: Spoke, NHRP Peers: 1, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb - - - - - ----- 1 192.168.1.1 10.5.5.254 UP 00:02:59 S Two connected remote offices are visible on HUBe: Hub #sh dmvpn Legend: Attrb -> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent -> Number of NHRP entries with same NBMA peer NHS Status: E -> Expecting Replies, R -> Responding, W -> Waiting UpDn Time -> Up or Down Time for a Tunnel ================================================= ======================== Interface: Tunnel1, IPv4 NHRP Details Type: Hub, NHRP Peers: 2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb - - - - - ----- 1 172.16.1.2 10.5.5.1 UP 00:04:08 D 1 172.16.2.3 10.5.5.2 UP 00:02:57 D A bunch of tunnel address and real (physical) Hub # sh ip nhrp brief Target Via NBMA Mode Intfc Claimed 10.5.5.1/32 10.5.5.1 172.16.1.2 dynamic Tu1 <> 10.5.5.2/32 10.5.5.2 172.16.2.3 dynamic Tu1 <> |
Router # ping 10.5.5.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.5.5.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min / avg / max = 1/4/5 ms We look at the established tunnels at the moment: Router # sh dmvpn Legend: Attrb -> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent -> Number of NHRP entries with same NBMA peer NHS Status: E -> Expecting Replies, R -> Responding, W -> Waiting UpDn Time -> Up or Down Time for a Tunnel ================================================= ======================== Interface: Tunnel1, IPv4 NHRP Details Type: Spoke, NHRP Peers: 2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb - - - - - ----- 1 172.16.2.3 10.5.5.2 UP 00:04:04 D 1 192.168.1.1 10.5.5.254 UP 00:09:31 S |
Hub | Spoke 1 | Spoke 2 |
BROADCAST | BROADCAST | BROADCAST |
Hub # sh ip opf neighbor Neighbor I Pri State Dead Time Address Interface 1.1.1.1 0 FULL / DROTHER 00:00:34 10.5.5.1 Tunnel1 2.2.2.2 0 FULL / DROTHER 00:00:31 10.5.5.2 Tunnel1 Spoke_1 # sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 10.0.0.1 1 FULL / DR 00:00:36 10.5.5.254 Tunnel1 Spoke_1 # sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 10.0.0.1 1 FULL / DR 00:00:36 10.5.5.254 Tunnel1 Known routes to Spoke 1 via OSPF Spoke_1 # sh ip route Gateway of last resort is 172.16.1.5 to network 0.0.0.0 S * 0.0.0.0/0 [1/0] via 172.16.1.5 1.0.0.0/32 is subnetted, 1 subnets C 1.1.1.1 is directly connected, Loopback1 2.0.0.0/32 is subnetted, 1 subnets O 2.2.2.2 [110/1001] via 10.5.5.3, 00:00:07, Tunnel1 <- Spoke2 internal network 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks O 10.0.0.0/24 [110/1001] via 10.5.5.254, 00:05:19, Tunnel1 <- internal network of the Central Office C 10.5.5.0/24 is directly connected, Tunnel1 L 10.5.5.1/32 is directly connected, Tunnel1 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks C 172.16.1.0/24 is directly connected, GigabitEthernet0 / 0 L 172.16.1.2/32 is directly connected, GigabitEthernet0 / 0 Connectivity between Spoke 1 and Spoke 2 is done directly: Spoke_1 # traceroute 2.2.2.2 source 1.1.1.1 Type escape sequence to abort. Tracing the route to 2.2.2.2 VRF info: (vrf in name / id, vrf out name / id) 1 10.5.5.3 216 msec 256 msec 216 msec |
HUB (R1) | Spoke (R3) | Spoke (R4) |
By default, routes on Spoke are only HUB (due to the split-horizon, Spoke 2 routes are not visible) | ||
HUB # sh ip route eigrp 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks D 1.0.0.0/8 is a summary, 00:04:18, Null0 D 3.0.0.0/8 [90/409600] via 10.5.5.3, 00:04:24, Tunnel1 D 4.0.0.0/8 [90/409600] via 10.5.5.4, 00:03:51, Tunnel1 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks D 10.0.0.0/8 is a summary, 00:04:18, Null0 There is no route to 4.4.4.4 Spoke_1 # sh ip route eigrp D 1.0.0.0/8 [90/324096] via 10.5.5.1, 00:04:04, Tunnel4 3.0.0.0/8 is variably subnetted, 2 subnets, 2 masks D 3.0.0.0/8 is a summary, 00:04:11, Null0 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks D 10.0.0.0/8 is a summary, 00:04:11, Null0 |
HUB (R1) | Spoke (R3) | Spoke (R4) |
HUB (conf) # router eigrp 1 no ip split-horizon eigrp 1 | No additional settings | No additional settings |
HUB # sh ip route eigrp 1.0.0.0/8 is variably subnetted, 2 subnets, 2 masks D 1.0.0.0/8 is a summary, 00:04:18, Null0 D 3.0.0.0/8 [90/409600] via 10.5.5.3, 00:04:24, Tunnel101 D 4.0.0.0/8 [90/409600] via 10.5.5.4, 00:03:51, Tunnel101 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks D 10.0.0.0/8 is a summary, 00:04:18, Null0 The route to Spoke1 appeared, but leads through HUB Spoke_1 # sh ip route eigrp D 1.0.0.0/8 [90/324096] via 10.5.5.1, 00:05:45, Tunnel4 3.0.0.0/8 is variably subnetted, 2 subnets, 2 masks D 3.0.0.0/8 is a summary, 00:00:26, Null0 D 4.0.0.0 / 8 [90/435200] via 10.5.5.1 , 00:00:26, Tunnel4 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks D 10.0.0.0/8 is a summary, 00:05:51, Null0 R3 # traceroute 4.4.4.4 source 3.3.3.3 Type escape sequence to abort. Tracing the route to 4.4.4.4 1 10.5.5.1 88 msec 92 msec 76 msec 2 10.5.5.4 128 msec * 140 msec |
HUB (R1) | Spoke (R3) | Spoke (R4) |
HUB (conf) # router eigrp 1 no ip split-horizon eigrp 1 no ip next-hop-self eigrp 1 | No additional settings | No additional settings |
Now the route to the network Spoke_2 leads directly: R3 # sh ip route eigrp 1 D 1.0.0.0/8 [90/324096] via 10.5.5.1, 00:00:06, Tunnel4 3.0.0.0/8 is variably subnetted, 2 subnets, 2 masks D 3.0.0.0/8 is a summary, 00:00:06, Null0 D 4.0.0.0 / 8 [90/435200] via 10.5.5.4 , 00:00:04, Tunnel4 10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks D 10.0.0.0/8 is a summary, 00:19:55, Null0 R3 # traceroute 4.4.4.4 source 3.3.3.3 Type escape sequence to abort. Tracing the route to 4.4.4.4 1 10.5.5.4 84 msec * 72 msec |
PPTP_HUB # Username cisco2 password cisco2 ! interface Loopback1 ip address 192.168.2.2 255.255.255.0 ! vpdn enable ! vpdn-group 1 ! Default PPTP VPDN group accept-dialin protocol pptp virtual-template 1 ! interface Virtual-Template1 ip unnumbered Loopback1 ip mtu 1400 ip tcp adjust-mss 1360 peer default ip address pool PPTP-Pool ppp encrypt mppe auto ppp authentication ms-chap-v2 chap callin ! ip local pool PPTP-Pool 192.168.2.5 192.168.2.50 ! |
PPTP_HUB #sho vpdn session % No active L2TP tunnels PPTP Session Information Total tunnels 1 sessions 1 LocID RemID TunID Intf Username State Last Chg Uniq ID 55592 0 17168 vi3 cisco2 estabd 00:04:13 6 |
PPTP_HUB # sh ip int br Interface IP Address OK? Method Status Protocol Ethernet0 / 0 unassigned YES NVRAM administratively down down GigabitEthernet0 / 0 192.168.1.3 YES NVRAM up up GigabitEthernet1 / 0 77.1.1.3 YES NVRAM up up Loopback0 3.3.3.3 YES NVRAM up up Loopback1 192.168.2.2 YES NVRAM up up Virtual-Access1 unassigned YES unset down down Virtual-Access2 unassigned YES unset up up Virtual-Access3 192.168.2.5 YES unset up up Virtual-Template1 192.168.2.5 YES unset down down |
ip dhcp pool STATIC import all origin file flash: /static2.txt default-router 192.168.2.2 dns-server 8.8.8.8 8.8.4.4 domain-name lab.local lease 3 ! interface Virtual-Template1 ip unnumbered Loopback1 ip mtu 1400 ip tcp adjust-mss 1360 peer default ip address pool STATIC (PPTP-Pool is no longer needed) ppp encrypt mppe auto ppp authentication ms-chap-v2 chap callin |
* time * Mar 01 2002 12:23 AM * version * 2 ! IP address Type VRF hardware address lease expiration 192.168.2.77 / 25 1000c.2984.4f84 Infinite 192.168.2.17 / 25 1000c.294646.1575 Infinite 192.168.2.18 / 25 10000.0000.1111 Infinite |
IP_add_s_global IP_add_d_global Type 115 |
L2TP_header |
L2_sublayer |
Data |
IP_add_s_global IP_add_d_global |
UDP_s_port UDP_d_port (1701) |
L2TP_header |
PPP_header |
IP_add_s_local IP_add_d_local |
Data |
LAC | L2TP access concentrator | LAC accepts requests from the client and negotiates L2TP tunnel and session parameters with LNS and transmits the LNS request |
Lns | L2TP network server | LNS negotiates L2TP tunnel and session parameters with LAC |
LCCE | L2TP Control Connection Endpoint | This is the LAC that participates in the signal connection. |
R5 # pseudowire-class L2TP_Class encapsulation l2tpv3 protocol none (i.e. dynamic session setup is not used) ip pmtu ip local interface GigabitEthernet1 / 0 ! interface GigabitEthernet0 / 0 no ip address xconnect 44.1.1.9 1 encapsulation l2tpv3 manual pw-class L2TP_Class l2tp id 1 2 l2tp cookie local 4 55111 l2tp cookie remote 44119 | R9 # pseudowire-class L2TP_Class encapsulation l2tpv3 protocol none (i.e. dynamic session setup is not used) ip pmtu ip local interface GigabitEthernet0 / 0 ! interface GigabitEthernet1 / 0 no ip address xconnect 55.1.1.1 1 encapsulation l2tpv3 manual pw-class L2TP_Class l2tp id 2 1 l2tp cookie local 4 44119 l2tp cookie remote 4 55111 |
R5_VPN_HUB_Pr # sh l2tp session L2TP Session Information Total tunnels 0 sessions 1 LocID RemID TunID Username, Intf / State Last Chg Uniq ID Vcid Circuit 1 2 n / a 1, Gi0 / 0 est 00:00:03 1 R5_VPN_HUB_Pr # sh l2tp session all L2TP Session Information Total tunnels 0 sessions 1 Session id 1 is up, logical session id 33356, tunnel id n / a Remote session id is 2, remote tunnel id n / a Locally initiated session Unique ID is 4 Session Layer 2 circuit, type is Ethernet, name is GigabitEthernet0 / 0 Session vcid is 1 Circuit state is UP Local circuit state is UP Remote circuit state is UP Call serial number is 0 Remote tunnel name is Internet address is 44.1.1.9 Local tunnel name is Internet address is 55.1.1.5 IP protocol 115 Session is manually signaled Session state is established, time since change 02:29:58 1130 Packets sent, 1982 received 151213 Bytes sent, 197759 received Last clearing of counters never |
R10 # ping 192.168.1.7 repeat 10 Type escape sequence to abort. Sending 10, 100-byte ICMP Echos to 192.168.1.7, timeout is 2 seconds: !!!!!!!!!! Success rate is 100 percent (10/10), round-trip min / avg / max = 128/142/180 ms |
R7_DATA_Center_Servers # sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 192.168.1.10 1 FULL / DR 00:00:37 192.168.1.10 GigabitEthernet0 / 0 R10 # sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 7.7.7.7 1 FULL / BDR 00:00:35 192.168.1.7 GigabitEthernet0 / 0 |
* Oct 20 19: 52: 55.861: L2X tnl 08287: ________: Create logical tunnel * Oct 20 19: 52: 55.865: L2TP tnl 08287: ________: Create tunnel * Oct 20 19: 52: 55.869: L2TP tnl 08287: ________: version set to V2 ( L2TPv2 protocol ) * Oct 20 19: 52: 55.873: L2TP tnl 08287: ________: remote ip set to 44.1.1.9 * Oct 20 19: 52: 55.873: L2TP tnl 08287: ________: local ip set to 55.1.1.1 * Oct 20 19: 52: 55.877: L2TP tnl 08287: 00003073: FSM-CC ev Rx-SCCRQ ( Start - Control - Connection - Request ) LNS checks the validity of the sender and the availability of its own resources, and the list of supported pseudowire types ( Ethernet , Frame Relay ) is also consistent at this stage * Oct 20 19: 52: 55.877: L2TP tnl 08287: 00003073: FSM-CC Idle-> Proc-SCCRQ * Oct 20 19: 52: 55.877: L2TP tnl 08287: 00003073: FSM-CC do Rx-SCCRQ * Oct 20 19: 52: 55.881: L2X _____: ________: Tunnel author started for LAC * Oct 20 19: 52: 55.901: L2X _____: ________: Tunnel author found * Oct 20 19: 52: 55.905: L2TP tnl 08287: 00003073: Author reply, data source: "VPDN-L2TP" * Oct 20 19: 52: 55.909: L2X _____: ________: class [AAA author, group "VPDN-L2TP"] * Oct 20 19: 52: 55.913: L2X _____: ________: created * Oct 20 19: 52: 55.917: L2TP tnl 08287: 00003073: FSM-CC ev SCCRQ-OK * Oct 20 19: 52: 55.917: L2TP tnl 08287: 00003073: FSM-CC Proc-SCCRQ-> Wt-SCCCN Start-Control-Connection-Connected (SCCCN) wait for the state Connected * Oct 20 19: 52: 55.917: L2TP tnl 08287: 00003073: FSM-CC do Tx-SCCRP Start-Control-Connection-Reply (SCCRP) sent a reply message * Oct 20 19: 52: 55.917: L2X _____: ________: l2x_open_socket: is called * Oct 20 19: 52: 55.921: L2TP tnl 08287: 00003073: Open sock 55.1.1.1: 1701 -> 44.1.1.9: 1701 Uses UDP with port 1701 for service messages * Oct 20 19: 52: 55.925: L2TP tnl 08287: 00003073: FSM-CC ev Sock-Ready * Oct 20 19: 52: 55.929: L2TP tnl 08287: 00003073: FSM-CC in Wt-SCCCN * Oct 20 19: 52: 55.929: L2TP tnl 08287: 00003073: FSM-CC do Ignore-Sock-Up * Oct 20 19: 52: 55.941: L2X _____: ________: Disabled security for VPDN * Oct 20 19: 52: 56.053: L2TP tnl 08287: 00003073: FSM-CC ev Rx-SCCCN * Oct 20 19: 52: 56.053: L2TP tnl 08287: 00003073: FSM-CC Wt-SCCCN-> Proc-SCCCN * Oct 20 19: 52: 56.053: L2TP tnl 08287: 00003073: FSM-CC do Rx-SCCCN * Oct 20 19: 52: 56.053: L2TP tnl 08287: 00003073: Got a response in SCCCN from LAC * Oct 20 19: 52: 56.057: L2TP tnl 08287: 00003073: Tunnel Authentication success * Oct 20 19: 52: 56.061: L2TP tnl 08287: 00003073: FSM-CC ev SCCCN-OK * Oct 20 19: 52: 56.065: L2TP tnl 08287: 00003073: FSM-CC Proc-SCCCN-> established * Oct 20 19: 52: 56.069: L2TP tnl 08287: 00003073: FSM-CC do Established * Oct 20 19: 52: 56.073: L2TP tnl 08287: 00003073: Control channel up * Oct 20 19: 52: 56.077: L2TP tnl 08287: 00003073: 55.1.1.1 <-> 44.1.1.9 |
* Oct 20 19: 52: 56.117: L2X _____: _____: ________: Create logical session * Oct 20 19: 52: 56.121: L2TP _____: _____: ________: Create session * Oct 20 19: 52: 56.121: L2TP _____: _____: ________: Using ICRQ FSM Incoming-Call-Request (ICRQ) The required pseudowire type required for the L2 level is transmitted here * Oct 20 19: 52: 56.125: L2TP _____: _____: ________: remote ip set to 44.1.1.9 * Oct 20 19: 52: 56.125: L2TP _____: _____: ________: local ip set to 55.1.1.1 * Oct 20 19: 52: 56.129: L2TP tnl 08287: 00003073: FSM-CC ev Session-Conn * Oct 20 19: 52: 56.129: L2TP tnl 08287: 00003073: FSM-CC in established * Oct 20 19: 52: 56.129: L2TP tnl 08287: 00003073: FSM-CC do Session-Conn-Est * Oct 20 19: 52: 56.129: L2TP tnl 08287: 00003073: Session count now 1 * Oct 20 19: 52: 56.129: L2TP _____: 08287: 0000754C: Session attached * Oct 20 19: 52: 56.129: L2TP _____: 08287: 0000754C: FSM-Sn ev Rx-ICRQ * Oct 20 19: 52: 56.129: L2TP _____: 08287: 0000754C: FSM-Sn Idle-> Proc-ICRQ * Oct 20 19: 52: 56.129: L2TP _____: 08287: 0000754C: FSM-Sn do Rx-ICRQ * Oct 20 19: 52: 56.129: L2TP _____: 08287: 0000754C: Chose application VPDN * Oct 20 19: 52: 56.133: L2TP _____: 08287: 0000754C: App type set to VPDN * Oct 20 19: 52: 56.133: L2TP tnl 08287: 00003073: VPDN Session count now 1 * Oct 20 19: 52: 56.189: L2TP 00005: 08287: 0000754C: FSM-Sn ev ICRQ-OK * Oct 20 19: 52: 56.193: L2TP 00005: 08287: 0000754C: FSM-Sn Proc-ICRQ-> Wt-Tx-ICRP * Oct 20 19: 52: 56.193: L2TP 00005: 08287: 0000754C: FSM-Sn do Tx-ICRP-Local-Check * Oct 20 19: 52: 56.193: L2TP 00005: 08287: 0000754C: FSM-Sn ev Local-Cont * Oct 20 19: 52: 56.193: L2TP 00005: 08287: 0000754C: FSM-Sn Wt-Tx-ICRP-> Wt-Rx-ICCN * Oct 20 19: 52: 56.193: L2TP 00005: 08287: 0000754C: FSM-Sn do Tx-ICRP Incoming-Call-Reply (ICRP) * Oct 20 19: 52: 56.197: L2TP 00005: 08287: 0000754C: Open sock 55.1.1.1:1701->44.1.1.9.90101 * Oct 20 19: 52: 56.197: L2TP 00005: 08287: 0000754C: FSM-Sn in Wt-Rx-ICCN ( awaiting ICCN) * Oct 20 19: 52: 56.397: L2TP 00005: 08287: 0000754C: FSM-Sn ev Rx-ICCN ( received ICCN ) * Oct 20 19: 52: 56.401: L2TP 00005: 08287: 0000754C: FSM-Sn Wt-Rx-ICCN-> Proc-ICCN * Oct 20 19: 52: 56.405: L2TP 00005: 08287: 0000754C: FSM-Sn do Rx-ICCN * Oct 20 19: 52: 56.437: L2TP 00005: 08287: 0000754C: FSM-Sn ev ICCN-OK * Oct 20 19: 52: 56.441: L2TP 00005: 08287: 0000754C: FSM-Sn Proc-ICCN-> established * Oct 20 19: 52: 56.445: L2TP 00005: 08287: 0000754C: FSM-Sn do Established * Oct 20 19: 52: 56.449: L2TP 00005: 08287: 0000754C: Session up (The session is established for the data) * Oct 20 19: 52: 58.197: L2TP 00005: 08287: 0000754C: FSM-Sn in established * Oct 20 19: 52: 58.241:% LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed state to up * Oct 20 19: 52: 58.273:% LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up |
ISP_NAT # sh l2tun tunnel L2TP Tunnel Information Total tunnels 1 sessions 1 LocTunID RemTunID Remote Name State Remote Address Sessn L2TP Class / Count VPDN Group 30933 12403 LNS est 55.1.1.1 1 1 ISP_NAT # sh l2tp session L2TP Session Information Total tunnels 1 sessions 1 LocID RemID TunID Username, Intf / State Last Chg Uniq ID Vcid Circuit 32700 30028 30933 LNS, Vi1 est 00:51:35 0 |
LNS# aaa new-model aaa authorization network default local ! vpdn enable vpdn-group VPDN-L2TP accept-dialin protocol l2tp virtual-template 2 lcp renegotiation on-mismatch terminate-from hostname LAC l2tp tunnel password 0 cisco123 ip pmtu ! interface Virtual-Template2 ip unnumbered GigabitEthernet0/0 autodetect encapsulation ppp peer default ip address pool L2TP-pool ppp authentication ms-chap-v2 | LAC# vpdn enable ! vpdn-group 1 request-dialin protocol l2tp pool-member 1 initiate-to ip 55.1.1.1 source-ip 44.1.1.9 local name LAC ( terminate-from LNS) l2tp tunnel password 0 cisco123 ! interface Dialer1 ip address negotiated encapsulation ppp dialer pool 1 dialer idle-timeout 0 dialer string 123 dialer vpdn dialer-group 1 ppp authentication chap callin ppp chap hostname LNC ppp chap password 0 cisco123 ! ip route 192.168.1.0 255.255.255.0 Dialer1 |
LNS# aaa new-model ! aaa authorization network default local ! username LAC password 0 cisco123 ! vpdn enable vpdn-group VPDN-L2TP accept-dialin protocol l2tp virtual-template 2 terminate-from hostname LAC l2tp tunnel password 0 cisco123 ! interface Loopback0 ip address 3.3.3.3 255.255.255.255 ! interface Virtual-Template2 ip unnumbered Loopback0 autodetect encapsulation ppp no peer default ip address ppp authentication ms-chap-v2 ! ip route 172.30.1.0 255.255.255.0 7.7.7.7 ! R7 (PS 7.7.7.7 LNS#show ip route 7.0.0.0/32 is subnetted, 1 subnets C 7.7.7.7 is directly connected, Virtual-Access3 ) | LAC# username LNS password 0 cisco123 ! l2tp-class client.init.class authentication password cisco123 ! pseudowire-class pwclass1 encapsulation l2tpv2 protocol l2tpv2 client.init.class ip local interface Ethernet0/0 ! interface Loopback0 ip address 7.7.7.7 255.255.255.255 ! interface Virtual-PPP1 ip unnumbered loopback0 ppp authentication ms-chap-v2 no cdp enable pseudowire 55.1.1.3 1 pw-class pwclass1 ! ip route 192.168.1.0 255.255.255.0 Virtual-PPP1 ! (PS 3.3.3.3 3.0.0.0/32 is subnetted, 1 subnets C 3.3.3.3 is directly connected, Virtual-PPP1 ) |
LNS#show vpdn L2TP Tunnel and Session Information Total tunnels 1 sessions 1 LocTunID RemTunID Remote Name State Remote Address Sessn L2TP Class/ Count VPDN Group 60224 63290 LAC est 77.1.1.7 1 VPDN-L2TP LocID RemID TunID Username, Intf/ State Last Chg Uniq ID Vcid, Circuit 46580 40688 60224 LAC, Vi3 est 00:14:12 102 LAC#sho vpdn L2TP Tunnel and Session Information Total tunnels 1 sessions 1 LocTunID RemTunID Remote Name State Remote Address Sessn L2TP Class/ Count VPDN Group 63290 60224 LNS est 55.1.1.3 1 client.init.cla LocID RemID TunID Username, Intf/ State Last Chg Uniq ID Vcid, Circuit 40688 46580 63290 1, Vp1 est 00:20:54 8 |
LNS#sh caller user LAC User: LAC, line Vi3, service PPPoVPDN Connected for 00:03:34, Idle for 00:00:04 Timeouts: Limit Remaining Timer Type — — - PPP: LCP Open, MS CHAP V2 (<-->), IPCP IP: Local 3.3.3.3, remote 7.7.7.7 Counts: 101 packets input , 2932 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun 78 packets output, 3770 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets < ping- > LNS#sh caller user LAC User: LAC, line Vi3, service PPPoVPDN Connected for 00:03:40, Idle for 00:00:02 Timeouts: Limit Remaining Timer Type — — - PPP: LCP Open, MS CHAP V2 (<-->), IPCP IP: Local 3.3.3.3, remote 7.7.7.7 Counts: 201 packets input , 13332 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun 179 packets output, 15650 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets | ( LNS) R7 LAC# ping 192.168.1.1 source 172.30.1.7 repeat 100 Type escape sequence to abort. Sending 100, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: Packet sent with a source address of 172.30.1.7 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Success rate is 100 percent (100/100), round-trip min/avg/max = 1/4/6 ms |
OSPF broadcast LNS# router ospf 1 network 3.3.3.3 0.0.0.0 area 0 network 192.168.1.0 0.0.0.255 area 0 default-information originate always | 3.3.3.3 ospf area 0 LAC# interface Loopback1 ip address 77.77.77.77 255.255.255.255 ! router ospf 1 network 3.3.3.3 0.0.0.0 area 0 network 77.77.77.77 0.0.0.0 area 0 |
LNS #sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 7.7.7.7 0 FULL/ - 00:00:30 7.7.7.7 Virtual-Access3 LAC #sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 3.3.3.3 0 FULL/ - 00:00:35 3.3.3.3 Virtual-PPP1 |
LNS# username LAC password 0 cisco123 ! pseudowire-class client.init.pw encapsulation l2tpv3 protocol l2tpv3 client.inint.class ip local interface Ethernet0/1 ! interface Virtual-PPP1 ip unnumbered Loopback0 ppp authentication ms-chap-v2 pseudowire 77.1.1.7 1 pw-class client.init.pw ! interface Loopback0 ip address 3.3.3.3 255.255.255.255 ! interface Virtual-PPP1 ip unnumbered Loopback0 ppp authentication ms-chap-v2 pseudowire 77.1.1.7 1 pw-class client.init.pw ! ip route 172.30.1.0 255.255.255.0 Virtual-PPP1 | LAC# username LNS password 0 cisco123 ! pseudowire-class pwclass2 encapsulation l2tpv3 protocol l2tpv3 client.init.class ip local interface Ethernet0/0 ! interface Virtual-PPP1 ip address negotiated ppp authentication ms-chap-v2 no cdp enable pseudowire 55.1.1.3 1 pw-class pwclass2 ! ip route 192.168.1.0 255.255.255.0 Virtual-PPP1 |
LNS#show vpdn L2TP Tunnel and Session Information Total tunnels 1 sessions 1 LocTunID RemTunID Remote Name State Remote Address Sessn L2TP Class/ Count VPDN Group 4168123058 3050381103 LAC est 77.1.1.7 1 client.inint.cl LocID RemID TunID Username, Intf/ State Last Chg Uniq ID Vcid, Circuit 2122433254 2810410257 4168123058 1, Vp1 est 00:16:22 53 est ablished, ID |
LAC #show vpdn L2TP Tunnel and Session Information Total tunnels 1 sessions 1 LocTunID RemTunID Remote Name State Remote Address Sessn L2TP Class/ Count VPDN Group 3050381103 4168123058 LNS est 55.1.1.3 1 client.init.cla LocID RemID TunID Username, Intf/ State Last Chg Uniq ID Vcid, Circuit 2810410257 2122433254 3050381103 1, Vp1 est 00:15:57 5 |
L2 TPv3 LNS# show caller user LAC User: LAC, line Vp1, service PPP Connected for 00:01:52, Idle for 00:01:52 Timeouts: Limit Remaining Timer Type - - - PPP: LCP Open, MS CHAP V2 (<-->), IPCP IP: Local 3.3.3.3, remote 7.7.7.7 Counts: 1241 packets input, 74748 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun 1078 packets output, 78056 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets < ping- > LNS#show caller user LAC User: LAC, line Vp1, service PPP Connected for 00:02:02, Idle for 00:02:02 Timeouts: Limit Remaining Timer Type - - - PPP: LCP Open, MS CHAP V2 (<-->), IPCP IP: Local 3.3.3.3, remote 7.7.7.7 Counts: 1343 packets input, 84976 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun 1180 packets output, 88552 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets | 100 LAC#ping 192.168.1.1 source 172.30.1.7 repeat 100 Type escape sequence to abort. Sending 100, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: Packet sent with a source address of 172.30.1.7 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Success rate is 100 percent (100/100), round-trip min/avg/max = 2/4/29 ms |
LNS# crypto isakmp policy 10 encr 3des authentication pre-share group 2 ! crypto isakmp key ipseckey123 address 77.1.1.7 ! crypto ipsec transform-set ESP-AES256-SHA1 esp-aes 256 esp-sha-hmac mode transport ! crypto map L2TP_VPN 10 ipsec-isakmp set peer 77.1.1.7 set transform-set ESP-AES256-SHA1 match address L2TP_TRAFFIC ! ! L2TPv2, ! UDP ! 1701 ip access-list extended L2TP_TRAFFIC permit udp host 55.1.1.3 eq 1701 host 77.1.1.7 eq 1701 ! interface Ethernet0/1 ip address 55.1.1.3 255.255.255.0 crypto map L2TP_VPN | LAC# crypto isakmp policy 10 encr 3des authentication pre-share group 2 ! crypto isakmp key ipseckey123 address 55.1.1.3 ! crypto ipsec transform-set ESP-AES256-SHA1 esp-aes 256 esp-sha-hmac mode transport ! crypto map L2TP_VPN 10 ipsec-isakmp set peer 55.1.1.3 set transform-set ESP-AES256-SHA1 match address L2TP_TRAFFIC ! ! ip access-list extended L2TP_TRAFFIC permit udp host 77.1.1.7 eq 1701 host 55.1.1.3 eq 1701 ! interface Ethernet0/0 ip address 77.1.1.7 255.255.255.0 crypto map L2TP_VPN ! ! |
L2 TPv3 LNS# sh caller user LAC User: LAC, line Vi3, service PPPoVPDN Connected for 00:04:10, Idle for 00:00:05 Timeouts: Limit Remaining Timer Type - - - PPP: LCP Open, MS CHAP V2 -->), IPCP IP: Local 3.3.3.3, remote 7.7.7.7 Counts: 247 packets input, 16456 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun 129 packets output, 3846 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets < ping- > LNS#sh caller user LAC User: LAC, line Vi3, service PPPoVPDN Connected for 00:04:45, Idle for 00:00:02 Timeouts: Limit Remaining Timer Type - - - PPP: LCP Open, MS CHAP V2 (ß>), IPCP IP: Local 3.3.3.3, remote 7.7.7.7 Counts: 327 packets input , 23288 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun 188 packets output, 4226 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets | 100 LAC#ping 192.168.1.1 repeat 100 source 172.30.1.7 Type escape sequence to abort. Sending 100, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !.!!!!!!!.!!!!!.!!!!!.!!!.!!!!!..!.!!!!!!!!!!!!.!!!!!..!!!!. |
LNS#sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 7.7.7.7 0 FULL/ - 00:00:35 7.7.7.7 Virtual-Access3 192.168.1.1 1 FULL/DR 00:00:33 192.168.1.1 Ethernet0/0 LNS#sh ip route C 7.7.7.7 is directly connected, Virtual-Access3 O 77.77.77.77/32 [110/2] via 7.7.7.7, 21:54:59, Virtual-Access3 172.30.0.0/24 is subnetted, 1 subnets S 172.30.1.0 [1/0] via 7.7.7.7 192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks |
*Nov 9 10:31:35.178: VPDN uid:123 disconnect (AAA) IETF: 17/user-error Ascend: 26/PPP CHAP Fail *Nov 9 10:31:35.178: VPDN uid:123 vpdn shutdown session, result=2, error=6, vendor_err=0, syslog_error_code=8, syslog_key_type=1 |
LNS# username LAC_9 password 0 cisco123 | LAC_9# username LNS password 0 cisco123 ! l2tp-class client.init.class authentication password cisco123 ! pseudowire-class pwclass1 encapsulation l2tpv2 protocol l2tpv2 client.init.class ip local interface Ethernet0/0 ! interface Loopback0 ip address 9.9.9.9 255.255.255.255 ! interface Virtual-PPP1 ip address loopback0 ppp authentication ms-chap-v2 no cdp enable pseudowire 55.1.1.3 1 pw-class pwclass1 ! ip route 192.168.1.0 255.255.255.0 Virtual-PPP1 |
LNS#sh vpdn tunnel L2TP Tunnel Information Total tunnels 2 sessions 2 LocTunID RemTunID Remote Name State Remote Address Sessn L2TP Class/ Count VPDN Group 35949 21672 LAC est 77.1.1.7 1 VPDN-L2TP 49973 18492 LAC_9 est 44.1.1.9 1 VPDN-L2TP |
LNS# interface Loopback0 ip address 3.3.3.3 255.255.255.255 router ospf 1 network 3.3.3.3 0.0.0.0 area 0 | LAC# interface Loopback0 ip address 7.7.7.7 255.255.255.255 ! interface Loopback1 ip address 77.77.77.77 255.255.255.255 ! router ospf 1 router-id 7.7.7.7 network 7.7.7.7 0.0.0.0 area 0 network 77.77.77.77 0.0.0.0 area 0 | LAC_9# interface Loopback0 ip address 9.9.9.9 255.255.255.255 ! interface Loopback1 ip address 99.99.99.99 255.255.255.255 ! router ospf 1 router-id 9.9.9.9 network 9.9.9.9 0.0.0.0 area 0 network 99.99.99.99 0.0.0.0 area 0 |
LNS#sh ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 9.9.9.9 0 FULL/ - 00:00:39 9.9.9.9 Virtual-Access3 7.7.7.7 0 FULL/ - 00:00:39 7.7.7.7 Virtual-Access4 192.168.1.1 1 FULL/DR 00:00:39 192.168.1.1 Ethernet0/0 R3 – L2TPv2 HUB LAC_9# sh ip route ospf ( R7) 7.0.0.0/32 is subnetted, 1 subnets O 7.7.7.7 [110/3] via 3.3.3.3, 00:02:14, Virtual-PPP1 77.0.0.0/32 is subnetted, 1 subnets O 77.77.77.77 [110/3] via 3.3.3.3, 00:02:14, Virtual-PPP1 : LAC_9#traceroute 77.77.77.77 source 99.99.99.99 Type escape sequence to abort. Tracing the route to 77.77.77.77 VRF info: (vrf in name/id, vrf out name/id) 1 3.3.3.3 5 msec 2 msec 4 msec 2 7.7.7.7 5 msec 4 msec * |
C 16.16.16.16 is directly connected, Virtual-Access4) |
Source: https://habr.com/ru/post/246281/
All Articles