
Задача: Организовать схему DMVPN Single HUB Single Cloud (NHRP phase 3) с использованием протокола динамической маршрутизации OSPF. Для примера будем использовать адреса Loopback Spoke1 и Spoke2, т.е. при появлении трафика между споками сработает фаза 3 и трафик пойдет напрямую.
При настройке схемы DMVPN Dual HUB Single Cloud необходимо, чтобы HUB являлся DR-маршрутизатором. Локальные подсети SPOKE будут ретранслироваться через HUB с помощью динамической маршрутизации ospf. Укажем на HUB приоритет ip ospf priority 150 |
Пример конфигурации HUB:
router ospf 1 |
Пример конфигурации SPOKE-1:
router ospf 1
router-id 192.0.2.2
area 0.0.0.1
network 198.51.100.1/32
enable
exit
enable
exit
interface gigabitethernet 1/0/1
ip firewall disable
ip address 203.0.113.10/30
exit
interface loopback 1
ip address 198.51.100.1/32
exit
tunnel gre 1
description "To HUB"
ttl 255
mtu 1416
multipoint
ip firewall disable
local address 203.0.113.10
ip address 192.0.2.2/24
ip ospf instance 1
ip ospf area 0.0.0.1
ip ospf
ip tcp adjust-mss 1360
ip nhrp holding-time 300
ip nhrp shortcut - (приведет к созданию туннеля между NHRP-соседями для оптимального прохождения трафика)
ip nhrp map 192.0.2.1 203.0.113.1
ip nhrp nhs 192.0.2.1
ip nhrp ipsec IPSECVPN_FOR_HUB static
ip nhrp ipsec IPSECVPN_FOR_SPOKE dynamic
ip nhrp multicast nhs
ip nhrp enable
enable
exit
security ike proposal IKEPROP_SPOKE
authentication algorithm sha2-512
encryption algorithm aes256
dh-group 16
exit
security ike policy IKEPOLICY_SPOKE
pre-shared-key ascii-text encrypted 8CB5107EA7005AFF
proposal IKEPROP_SPOKE
exit
security ike gateway IKEGW_FOR_HUB
version v2-only
ike-policy IKEPOLICY_SPOKE
local address 203.0.113.10
local network 203.0.113.10/32 protocol gre
remote address 203.0.113.1
remote network 203.0.113.1/32 protocol gre
mode policy-based
exit
security ike gateway IKEGW_FOR_SPOKE
version v2-only
ike-policy IKEPOLICY_SPOKE
local address 203.0.113.10
local network 203.0.113.10/32 protocol gre
remote address any
remote network any protocol gre
mode policy-based
exit
security ipsec proposal IPSECPROP_SPOKE
authentication algorithm sha2-512
encryption algorithm aes256ctr
pfs dh-group 16
exit
security ipsec policy IPSECPOLICY_SPOKE
proposal IPSECPROP_SPOKE
exit
security ipsec vpn IPSECVPN_FOR_HUB
type transport
ike establish-tunnel route
ike gateway IKEGW_FOR_HUB
ike ipsec-policy IPSECPOLICY_SPOKE
enable
exit
security ipsec vpn IPSECVPN_FOR_SPOKE
type transport
ike establish-tunnel route
ike gateway IKEGW_FOR_SPOKE
ike ipsec-policy IPSECPOLICY_SPOKE
enable
exit
ip route 0.0.0.0/0 203.0.113.9 |
Пример конфигурации SPOKE-2:
router ospf 1
router-id 192.0.2.3
area 0.0.0.1
network 198.51.100.2/32
enable
exit
enable
exit
interface gigabitethernet 1/0/1
ip firewall disable
ip address 203.0.113.14/30
exit
interface loopback 1
ip address 198.51.100.2/32
exit
tunnel gre 1
description "To HUB"
ttl 255
mtu 1416
multipoint
ip firewall disable
local address 203.0.113.14
ip address 192.0.2.3/24
ip ospf instance 1
ip ospf area 0.0.0.1
ip ospf
ip tcp adjust-mss 1360
ip nhrp holding-time 300
ip nhrp shortcut - (приведет к созданию туннеля между NHRP-соседями для оптимального прохождения трафика)
ip nhrp map 192.0.2.1 203.0.113.1
ip nhrp nhs 192.0.2.1
ip nhrp ipsec IPSECVPN_FOR_HUB static
ip nhrp ipsec IPSECVPN_FOR_SPOKE dynamic
ip nhrp multicast nhs
ip nhrp enable
enable
exit
security ike proposal IKEPROP_SPOKE
authentication algorithm sha2-512
encryption algorithm aes256
dh-group 16
exit
security ike policy IKEPOLICY_SPOKE
pre-shared-key ascii-text encrypted 8CB5107EA7005AFF
proposal IKEPROP_SPOKE
exit
security ike gateway IKEGW_FOR_HUB
version v2-only
ike-policy IKEPOLICY_SPOKE
local address 203.0.113.14
local network 203.0.113.14/32 protocol gre
remote address 203.0.113.1
remote network 203.0.113.1/32 protocol gre
mode policy-based
exit
security ike gateway IKEGW_FOR_SPOKE
version v2-only
ike-policy IKEPOLICY_SPOKE
local address 203.0.113.14
local network 203.0.113.14/32 protocol gre
remote address any
remote network any protocol gre
mode policy-based
exit
security ipsec proposal IPSECPROP_SPOKE
authentication algorithm sha2-512
encryption algorithm aes256ctr
pfs dh-group 16
exit
security ipsec policy IPSECPOLICY_SPOKE
proposal IPSECPROP_SPOKE
exit
security ipsec vpn IPSECVPN_FOR_HUB
type transport
ike establish-tunnel route
ike gateway IKEGW_FOR_HUB
ike ipsec-policy IPSECPOLICY_SPOKE
enable
exit
security ipsec vpn IPSECVPN_FOR_SPOKE
type transport
ike establish-tunnel route
ike gateway IKEGW_FOR_SPOKE
ike ipsec-policy IPSECPOLICY_SPOKE
enable
exit
ip route 0.0.0.0/0 203.0.113.13 |
После настроек HUB, Spoke1 и Spoke2 и наличие ip связанности между ними поднимется DMVPN.
Вывод диагностической информации с HUB:
HUB# show ip nhrp peers Tunnel address NBMA address Tunnel Expire Created Type Flags HUB# show security ipsec vpn status Name Local host Remote host Initiator spi Responder spi State HUB# show ip ospf neighbors Router ID Pri State DTime Interface Router IP HUB# show ip route ospf |
Вывод информации с SPOKE-1:
Spoke1# show ip nhrp peers Tunnel address NBMA address Tunnel Expire Created Type Flags Spoke1# show security ipsec vpn status Spoke1# show ip ospf neighbors Spoke1# show ip route ospf |
Вывод информации с SPOKE-2:
Spoke2# show ip nhrp peers Tunnel address NBMA address Tunnel Expire Created Type Flags Spoke2# show security ipsec vpn status Spoke2# show ip ospf neighbors Spoke2# show ip route ospf |
Проверка работы фазы 3 DMVPN:
Необходимо пустить трафик, например сo Spoke1 на Spoke2, можно воспользоваться утилитой ping 198.51.100.2
Spoke1# ping 198.51.100.2 source ip 198.51.100.1 Проверяем: Spoke1# show ip nhrp peers Tunnel address NBMA address Tunnel Expire Created Type Flags Spoke1# show ip nhrp shortcut-routes Вывод команды show ip nhrp shortcut-routes показывает, что трафик пошел напрямую со Spoke1 на Spoke2 |