|
|
Table Of Contents
Applying the Tunnel Template on the Home Agent
Example of Tunnel Template on the Home Agent
Applying the Tunnel Template on the Mobile Router
Example of Tunnel Templates at the Home Agent and the Mobile Router
Verifying Tunnel Templates on the Mobile Router
Applying Tunnel Templates to the IPSec Two-box Solution
Tunnel Templates
The Tunnel Templates for Multicast feature allows the configuration of multicast on statically created tunnels to be applied to dynamic tunnels brought up on the home agent and mobile router. A tunnel template is defined and applied to the tunnels between the home agent and mobile router. The mobile router can now roam, carrying multicast sessions to its mobile networks.
Reverse tunneling must be enabled from the mobile router to the home agent.
The following restrictions apply:
•
Tunnels cannot be removed if they are being used as templates.
•
This feature does not support mobile routers acting as mobile nodes.
Applying the Tunnel Template on the Home Agent
To apply the tunnel template to the tunnels brought up at the home agent, use these commands:
Command or Action PurposeStep 1
enable
Enables privileged EXEC mode. Enter your password if prompted.
Step 2
configure terminal
Enters global configuration mode.
Step 3
ip multicast-routing
Enables IP multicast routing.
Step 4
interface tunnel interface-number
Designates a tunnel interface and enters interface configuration mode. This is the tunnel template that will be applied to the mobile networks.
Step 5
ip pim sparse-mode
Enables Protocol Independent Multicast (PIM) on the tunnel interface in sparse mode.
Step 6
exit
Returns to global configuration mode.
Step 7
router mobile
Enables Mobile IP on the router.
Step 8
exit
Returns to global configuration mode.
Step 9
ip mobile mobile-networks
Configures mobile networks for the mobile host and enters mobile networks configuration mode.
Step 10
template tunnel interface-number
Designates the tunnel template to apply during registration. The interface-number argument is set to the tunnel template defined in Step 4. To remove the tunnel template, use the no form of this command.
Step 11
end
Exits to privileged EXEC mode.
Step 12
show ip mobile tunnel
Displays active tunnels. Use this command to verify the configuration. See the display output in the "Example of Tunnel Template on the Home Agent" section.
Example of Tunnel Template on the Home Agent
The following example displays the active Mobile IP tunnels and the template configuration for the tunnel on the home agent:
Router# show ip mobile tunnelMobile Tunnels:Total mobile ip tunnels 2Tunnel1:src 1.1.1.1, dest 20.20.0.1encap IP/IP, mode reverse-allowed, tunnel-users 1IP MTU 1460 bytesPath MTU Discovery, mtu:0, ager:10 mins, expires:neveroutbound interface Tunnel0HA created, fast switching enabled, ICMP unreachable enabled27 packets input, 2919 bytes, 0 drops24 packets output, 2568 bytesRunning template configuration for this tunnel:ip pim sparse-dense-modeTunnel0:src 1.1.1.1, dest 30.30.10.2encap IP/IP, mode reverse-allowed, tunnel-users 1IP MTU 1480 bytesPath MTU Discovery, mtu:0, ager:10 mins, expires:neveroutbound interface Ethernet1/3HA created, fast switching enabled, ICMP unreachable enabled0 packets input, 0 bytes, 0 drops24 packets output, 3048 bytesApplying the Tunnel Template on the Mobile Router
To apply the tunnel template to the tunnels brought up at the mobile router, use these commands:
Command or Action PurposeStep 1
enable
Enables privileged EXEC mode. Enter your password if prompted.
Step 2
configure terminal
Enters global configuration mode.
Step 3
ip multicast-routing
Enables IP multicast routing.
Step 4
interface tunnel interface-number
Designates a tunnel interface and enters interface configuration mode. This is the tunnel template that will be applied to the mobile networks.
Step 5
ip pim sparse-mode
Enables PIM on the tunnel interface in sparse mode.
Step 6
exit
Returns to global configuration mode.
Step 7
router mobile
Enables Mobile IP on the router.
Step 8
exit
Returns to global configuration mode.
Step 9
ip mobile router
Enables the mobile router and enters mobile router configuration mode.
Step 10
template tunnel interface-number
Designates the tunnel template to apply during registration. The interface-number argument is set to the tunnel template defined in Step 4. To remove the tunnel template, use the no form of this command.
Step 11
end
Exits to privileged EXEC mode.
Step 12
show ip mobile tunnel
Displays active tunnels. Use this command to verify the configuration. See the display output in the "Verifying Tunnel Templates on the Mobile Router" section.
Example of Tunnel Templates at the Home Agent and the Mobile Router
In the following example, a tunnel template is defined and configured to be brought up at the home agent and mobile router. The foreign agent does not require any additional configuration to support the Cisco Mobile Networks—Tunnel Templates for Multicast feature.
Home Agent Configuration
ip multicast-routing!interface Loopback0ip address 1.1.1.1 255.255.255.255ip pim sparse-mode!! Tunnel template to be applied to mobile networksinterface tunnel100ip address 13.0.0.1 255.0.0.0ip pim sparse-mode!router mobileip mobile mobile-networks 11.1.0.1description jetnetwork 11.1.2.0 255.255.255.0network 11.1.1.0 255.255.255.0! Select tunnel template to apply during registrationtemplate tunnel100!ip mobile secure host 11.1.0.1 spi 101 key hex 12345678123456781234567812345678 algorithm md5 mode prefix-suffix!no ip mobile tunnel route-cacheMobile Router Configuration
ip multicast-routing!interface Loopback0ip address 11.1.0.1 255.255.255.255ip pim sparse-mode!! Tunnel template to be applied to mobile networksinterface tunnel 100no ip addressip pim sparse-mode!interface Ethernet1/1ip address 20.0.0.1 255.0.0.0ip pim sparse-modeip mobile router-service roam!router mobileip pim rp-address 7.7.7.7ip mobile secure home-agent 1.1.1.1 spi 102 key hex 23456781234567812345678123456781 algorithm md5 mode prefix-suffixip mobile routeraddress 11.2.0.1 255.255.0.0home-agent 1.1.1.1! Select tunnel template to apply during registrationtemplate tunnel 100register extend expire 5 retry 2 interval 15register lifetime 10000reverse-tunnelVerifying Tunnel Templates on the Mobile Router
The following example displays the active Mobile IP tunnels and the template configuration for the tunnel on the mobile router:
Router# show ip mobile tunnelMobile Tunnels:Total mobile ip tunnels 1Tunnel0:src 20.20.0.1, dest 1.1.1.1encap IP/IP, mode reverse-allowed, tunnel-users 1IP MTU 1480 bytesPath MTU Discovery, mtu:0, ager:10 mins, expires:neveroutbound interface Ethernet4/2MR created, fast switching enabled, ICMP unreachable enabled22 packets input, 2468 bytes, 0 drops27 packets output, 2892 bytesRunning template configuration for this tunnel:ip pim sparse-modeApplying Tunnel Templates to the IPSec Two-box Solution
Configuring IPSec in conjunction with IOS Mobile Networks requires special attention because the egress interface of the traffic can change and IPSec is typically configured on the egress interface. The previous recommendation had been to configure the crypto map on the loopback interface and use policy routing to set next hop loopback for all traffic that needed to be encrypted. Applying a crypto map on a loopback interface is not and will not be a supported configuration (as documented in CSCdx79795.)
Tunnel templates, introduced in 12.2(15)T, add multicast support, but can be used to apply other parameters to the inner tunnel interface. Applying the crypto map to the tunnel template requires the crypto map local-address command as shown in the example configuration. The local-address should be set to the home address interface, typically configured as loopback 0. This recommendation eliminates the need for policy routing and allows for all traffic to be Cisco Express Forwarding (CEF) switched, which is not supported on loopback interfaces.
To be encrypted, all traffic from the mobile router must be reverse tunneled; the reverse tunnel becomes the egress interface where the crypto map is applied.
Example Configuration
hostname MN!crypto isakmp policy 10encr aesauthentication pre-sharegroup 2lifetime 900crypto isakmp key skeleton!address 192.168.1.1crypto ipsec transform-set aes esp-aes 256 esp-sha-hmac!! Local-address must point to the Home Address!crypto map MAR_VPN local-address LoopbackOcrypto map MAR_VPN 1 ipsec-isakmpset peer 192.168.1.1set transform-set aesmatch address 110!interface Tunnel99description Mobile Networks Tunnel Templateno ip addresscrypto map MAR_VPN!interface LoopbackOip address 192.168.100.10 255.255.255.255!interface EthernetO/Oip address 169.254.255.1 255.255.255.255ip mobile router-service roam!interface Ethernet1/0description Mobile Networkip address 192.168.124.1 255.255.255.0!router mobile!ip mobile secure home-agent 192.168.1.2 spi 100 key hex 1234567890abcdef1234567890abcdef algorithm md5 mode prefix-suffixip mobile routeraddress 192.168.100.10 255.255.255.0home-agent 192.168.1.2mobile-network Ethernet1/0!! Tunnel Template where the crypto map is applied!template Tunnel99!! Reverse tunneling must be enabled or traffic will not exit via the tunnel!reverse-tunnel!access-list 110 permit ip any host 192.168.2.2!endValidating the Configuration
The configuration can be validated using the show ip mobile router command to identify the tunnel interface being used by the mobile router, Then use the show crypto ipsec sa interface tunnel n command to verify that the relevant SAs are active. The important sections have been emphasized in the following sample output.
MN#show ip mobile routerMobile RouterEnabled 10/18/05 18:50:54Last redundancy state transition NEVERConfiguration:Home Address 192.168.100.10 Mask 255.255.255.0Home Agent 192.168.1.2 Priority 100 (best) (current)Registration lifetime 65534 secRetransmit Init 1000, Max 5000 msec, Limit 3Extend Expire 120, Retry 3, Interval 10Reverse tunnel requiredMobile Networks: Loopback2 (192.168.123.0/255.255.255.0)Ethernet1/0 (192.168.124.0/255.255.255.0)Monitor:Status -RegisteredActive foreign agent 192.168.6.1, Care-of 192.168.6.1 On interface EthernetO/OTunnelO mode IP/IPMN#show crypto ipsec sa interface tunnel 0interface: TunnelOCrypto map tag: MAR_VPN, local addr 192.168.100.10protected vrf: (none)local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)remote ident (addr/mask/prot/port): (192.168.2.2/255.255.255.255/0/0)current-peer 192.168.1.1 port 500PERMIT, flags={)#pkts encaps: 5, #pkts encrypt: 5, #pkts digest: 5#pkts decaps: 9, #pkts decrypt: 9, #pkts verify: 9#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0#pkts not decompressed: 0, #pkts decompress failed: 0#send errors 0, #recv errors 0local crypto endpt.: 192.168.100.10, remote crypto endpt.: 192.168.1.1path mtu 1514, ip mtu 1514current outbound spi: OxC8D41EOA(336934452~)inbound esp sas:spi: OxB7BClB29 (3082558249)transfor.m: esp-256-aes esp-sha-hmac ,in use settings ={Tunnel, }conn id: 1, flow_id: SW:l, crypto map: MAR_VPNsa timdng: remaining key lifetime (k/sec): (4602927/3584) IV size: 16 bytesreplay detection support: YStatus: ACTIVEinbound ah sas:inbound pcp sas:outbound esp sas:spi: OxC8D41EOA(3369344522)transfor.m: esp-256-aes esp-sha-hmac ,in use settings ={Tunnel, }conn id: 2, flow_id: SW:2, crypto map: MAR VPNsa timdng: remaining key lifetime (k/sec): (4602928/3582) IV size: 16 bytesreplay detection support: YStatus: ACTIVEoutbound ah sas:outbound pcp sas:protected vrf: (none) .local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)remote ident (addr/mask/prot/port): (192.168.2.2,255.255.255.255/0/0) current-peer 192.168.1.1 port 500PERMIT, flags={origin_is_acl,ipsec_sa_request_sent}#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0#pkts not decompressed: 0, #pkts decompress failed: 0#send errors 8, #recv errors 0local crypto endpt,:192.168.100.10, remote crypto endpt.: 192.168.1.1path mtu 1514, ip mtu 1514current outbound spi: OxO(O)inbound esp sas:inbound ah sas:inbound pcp sas:outbound esp sas:outbound ah sas:outbound pcp sas:
Posted: Wed Nov 1 10:32:35 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.