|
|
Table Of Contents
Applying the Tunnel Template on the Home Agent
Applying the Tunnel Template on the Mobile Router
Applying Tunnel Templates to the IPSec Two-box Solution
Tunnel Templates
Tunnel templates allow a mobile router to carry multicast sessions to mobile networks as it roams. The Tunnel Templates for Multicast feature allows the configuration of multicast sessions on statically created tunnels to be applied to dynamic tunnels brought up on a home agent and a mobile router. A tunnel template is defined and applied to the tunnels between the home agent and the mobile router.
Reverse tunneling must be enabled from the mobile router to the home agent.
The following restrictions apply:
•
Tunnels cannot be removed if they are being used as templates.
•
This feature does not support mobile routers that are acting as mobile nodes.
Applying the Tunnel Template on the Home Agent
To apply the tunnel template to the tunnels brought up at the home agent, use the interface tunnel command. For example:
wd>enablewd>password ! If promptedwd#configure terminalwd(config)#ip multicast-routing ! Enables IP multicast routing.wd(config)#interface tunnel interfacenumber ! Designates a tunnel interface and enters interface configuration mode. This is the tunnel template that will be applied to the mobile networks.wd(config-in)#ip pim sparse-mode ! Enables Protocol Independent Multicast (PIM) on the tunnel interface in sparse mode.wd(config)#exitwd(config)#router mobile ! Enables Mobile IP on the router.wd(config)#ip mobile mobile-networks ! Configures mobile networks for the mobile host and enters mobile networks configuration mode.wd(config)#tunnel template interfacenumber ! Designates the tunnel template to apply during registration. The interfacenumber argument is set to the tunnel template.wd(config)#endUse the show ip mobile tunnel command to display the active tunnels. The following example displays the active Mobile IP tunnels and the template configuration for the tunnel on the home agent:
Router# show ip mobile tunnelMobile Tunnels:Total mobile ip tunnels 2Tunnel1:src 1.1.1.1, dest 20.20.0.1encap IP/IP, mode reverse-allowed, tunnel-users 1IP MTU 1460 bytesPath MTU Discovery, mtu:0, ager:10 mins, expires:neveroutbound interface Tunnel0HA created, fast switching enabled, ICMP unreachable enabled27 packets input, 2919 bytes, 0 drops24 packets output, 2568 bytesRunning template configuration for this tunnel:ip pim sparse-dense-modeTunnel0:src 1.1.1.1, dest 30.30.10.2encap IP/IP, mode reverse-allowed, tunnel-users 1IP MTU 1480 bytesPath MTU Discovery, mtu:0, ager:10 mins, expires:neveroutbound interface Ethernet1/3HA created, fast switching enabled, ICMP unreachable enabled0 packets input, 0 bytes, 0 drops24 packets output, 3048 bytesApplying the Tunnel Template on the Mobile Router
To apply the tunnel template to the tunnels brought up at the mobile router, follow this example:
wd>enablewd>password ! If promptedwd#configure terminalwd(config)#ip multicast-routing ! Enables IP multicast routing.wd(config)#interface tunnel interfacenumber ! Designates a tunnel interface and enters interface configuration mode. This is the tunnel template that will be applied to the mobile networks.wd(config-in)#ip pim sparse-mode ! Enables Protocol Independent Multicast (PIM) on the tunnel interface in sparse mode.wd(config)#exitwd(config)#router mobile ! Enables Mobile IP on the router.wd(config)#ip router mobile ! Enables the mobile router and enters mobile router configuration mode.wd(config)#tunnel template interfacenumber ! Designates the tunnel template to apply during registration. The interfacenumber argument is set to the tunnel template.wd(config)#endUse the show ip mobile tunnel command to display the active tunnels.
Example Configuration
In the following example configuration, a tunnel template is defined and configured to be brought up at the home agent and mobile router. The foreign agent does not require any additional configuration to support the Cisco Mobile Networks—Tunnel Templates for Multicast feature.
Home Agent
ip multicast-routing!interface Loopback0ip address 1.1.1.1 255.255.255.255ip pim sparse-mode!! Tunnel template to be applied to mobile networksinterface tunnel100ip address 13.0.0.1 255.0.0.0ip pim sparse-mode!router mobileip mobile mobile-networks 11.1.0.1description jetnetwork 11.1.2.0 255.255.255.0network 11.1.1.0 255.255.255.0! Select tunnel template to apply during registrationtemplate tunnel100!ip mobile secure host 11.1.0.1 spi 101 key hex 12345678123456781234567812345678 algorithm md5 mode prefix-suffix!no ip mobile tunnel route-cacheMobile Router
ip multicast-routing!interface Loopback0ip address 11.1.0.1 255.255.255.255ip pim sparse-mode!! Tunnel template to be applied to mobile networksinterface tunnel 100no ip addressip pim sparse-mode!interface Ethernet1/1ip address 20.0.0.1 255.0.0.0ip pim sparse-modeip mobile router-service roam!router mobileip pim rp-address 7.7.7.7ip mobile secure home-agent 1.1.1.1 spi 102 key hex 23456781234567812345678123456781 algorithm md5 mode prefix-suffixip mobile routeraddress 11.2.0.1 255.255.0.0home-agent 1.1.1.1! Select tunnel template to apply during registrationtemplate tunnel 100register extend expire 5 retry 2 interval 15register lifetime 10000reverse-tunnelApplying Tunnel Templates to the IPSec Two-box Solution
Configuring IPSec in conjunction with Cisco IOS Mobile Network software requires special attention because the egress interface of the traffic can change and IPSec is typically configured on the egress interface. The previous recommendation had been to configure the crypto map on the loopback interface and to use policy routing to set next hop loopback for all traffic that needed encryption.
Note
Applying a crypto map on a loopback interface is not a supported configuration (as documented in CSCdx79795).
Tunnel templates, introduced in Cisco IOS Release 12.2(15)T, add multicast support, but can be used to apply other parameters to the inner tunnel interface. Applying the crypto map to the tunnel template requires the crypto map local-address commands as shown in the following example configuration. The local address should be set to the home address interface. This recommendation eliminates the need for policy routing and allows for all traffic to be Cisco Express Forwarding (CEF) switched (which is not supported on loopback interfaces).
To be encrypted, all traffic from the mobile router must be reverse tunneled; the reverse tunnel becomes the egress interface at which the crypto map is applied.
Example Configuration
hostname MN!crypto isakmp policy 10encr aesauthentication pre-sharegroup 2lifetime 900crypto isakmp key skeleton!address 192.168.1.1crypto ipsec transform-set aes esp-aes 256 esp-sha-hmac!! Local-address must point to the Home Address!crypto map MAR_VPN local-address Loopback 0crypto map MAR_VPN 1 ipsec-isakmpset peer 192.168.1.1set transform-set aesmatch address 110!interface Tunnel99description Mobile Networks Tunnel Templateno ip addresscrypto map MAR_VPN!interface LoopbackOip address 192.168.100.10 255.255.255.255!interface EthernetO/Oip address 169.254.255.1 255.255.255.255ip mobile router-service roam!interface Ethernet1/0description Mobile Networkip address 192.168.124.1 255.255.255.0!router mobile!ip mobile secure home-agent 192.168.1.2 spi 100 key hex 1234567890abcdef1234567890abcdef algorithm md5 mode prefix-suffixip mobile routeraddress 192.168.100.10 255.255.255.0home-agent 192.168.1.2mobile-network Ethernet1/0!! Tunnel Template where the crypto map is applied!template Tunnel99!! Reverse tunneling must be enabled or traffic will not exit via the tunnel!reverse-tunnel!access-list 110 permit ip any host 192.168.2.2!endValidating the Configuration
The configuration can be validated by using the show ip mobile router command to identify the tunnel interface that is being used by the mobile router, Then use the show crypto ipsec sa interface tunnel n command to verify that the relevant SAs are active. The important sections have been emphasized in the following sample output.
MN#show ip mobile routerMobile RouterEnabled 10/18/05 18:50:54Last redundancy state transition NEVERConfiguration:Home Address 192.168.100.10 Mask 255.255.255.0Home Agent 192.168.1.2 Priority 100 (best) (current)Registration lifetime 65534 secRetransmit Init 1000, Max 5000 msec, Limit 3Extend Expire 120, Retry 3, Interval 10Reverse tunnel requiredMobile Networks: Loopback2 (192.168.123.0/255.255.255.0)Ethernet1/0 (192.168.124.0/255.255.255.0)Monitor:Status -RegisteredActive foreign agent 192.168.6.1, Care-of 192.168.6.1 On interface EthernetO/OTunnelO mode IP/IPMN#show crypto ipsec sa interface tunnel 0interface: Tunnel 0Crypto map tag: MAR_VPN, local addr 192.168.100.10protected vrf: (none)local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)remote ident (addr/mask/prot/port): (192.168.2.2/255.255.255.255/0/0)current-peer 192.168.1.1 port 500PERMIT, flags={)#pkts encaps: 5, #pkts encrypt: 5, #pkts digest: 5#pkts decaps: 9, #pkts decrypt: 9, #pkts verify: 9#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0#pkts not decompressed: 0, #pkts decompress failed: 0#send errors 0, #recv errors 0local crypto endpt.: 192.168.100.10, remote crypto endpt.: 192.168.1.1path mtu 1514, ip mtu 1514current outbound spi: OxC8D41EOA(336934452~)inbound esp sas:spi: OxB7BClB29 (3082558249)transfor.m: esp-256-aes esp-sha-hmac ,in use settings ={Tunnel, }conn id: 1, flow_id: SW:l, crypto map: MAR_VPNsa timdng: remaining key lifetime (k/sec): (4602927/3584) IV size: 16 bytesreplay detection support: YStatus: ACTIVEinbound ah sas:inbound pcp sas:outbound esp sas:spi: OxC8D41EOA(3369344522)transfor.m: esp-256-aes esp-sha-hmac ,in use settings ={Tunnel, }conn id: 2, flow_id: SW:2, crypto map: MAR VPNsa timdng: remaining key lifetime (k/sec): (4602928/3582) IV size: 16 bytesreplay detection support: YStatus: ACTIVEoutbound ah sas:outbound pcp sas:protected vrf: (none) .local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)remote ident (addr/mask/prot/port): (192.168.2.2,255.255.255.255/0/0) current-peer 192.168.1.1 port 500PERMIT, flags={origin_is_acl,ipsec_sa_request_sent}#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0#pkts not decompressed: 0, #pkts decompress failed: 0#send errors 8, #recv errors 0local crypto endpt,:192.168.100.10, remote crypto endpt.: 192.168.1.1path mtu 1514, ip mtu 1514current outbound spi: 0x0(0)inbound esp sas:inbound ah sas:inbound pcp sas:outbound esp sas:outbound ah sas:outbound pcp sas:Related Documents
Cisco Mobile Networks Tunnel Templates for Multicast
http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_chapter09186a0080455164.html
Other Configuration Tasks in the Cisco Mobile Wireless Home Agent Feature Guide
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
©2006 Cisco Systems, Inc. All rights reserved.
Printed in the USA on recycled paper containing 10% postconsumer waste.
Posted: Fri Sep 22 17:30:04 PDT 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.