|
|
Table Of Contents
IPSec Support on Catalyst 6500/7600 with 5 CPUs of MWAM
Home Agent IPSec Configuration
Home Agent Security
Security
This chapter discusses the concepts that comprise the Security features in Cisco IOS Mobile Wireless Home Agent software.
This chapter includes the following sections:
•
IPSec Support on Catalyst 6500/7600 with 5 CPUs of MWAM
3 DES Encryption
The Cisco Home Agent includes 3DES encryption, which supports IPSec on the HA. To accomplish this on the Cisco 7200 Internet router platform, Cisco supplies an SA-ISA card for hardware provided IPsec. On the Cisco 7600 and Cisco 6500 Catalyst switch platforms, the MWAM utilizes the Cisco IPSec Acceleration Card.
The HA requires you to configure the parameters for each PDSN before a mobile IP data traffic tunnel is established between the PDSN and the HA.
Note
This feature is only available with hardware support.
Mobile IP IPSec
The Internet Engineering Task Force (IETF) has developed a framework of open standards called IP Security (IPSec) that provides data confidentiality, data integrity, and data authentication between participating peers. IPSec provides these security services at the IP layer; it uses Internet Key Exchange (IKE) to handle negotiation of protocols and algorithms based on local policy, and to generate the encryption and authentication keys to be used by IPSec. IPSec can be used to protect one or more data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
The HA uses any statically configured shared secret(s) when processing authentication extension(s) present in mobile IP registration messages.
The HA supports IPSec, IKE, Authentication Header (AH) and IP Encapsulating Security Payload (ESP) as required in IS-835-B.
IS835-B specifies three mechanisms for providing IPSec security:
•
Certificates
•
Dynamically distributed pre-shared secret
•
Statically configured pre-shared secret.
Note
IS835B Static IPSec feature is available only on the Cisco 7200 Internet router platform. The Cisco IOS IPSec feature is available on the Cisco 7200 Internet router, Cisco 6500 Catalyst switch, and Cisco 7600 switch platforms. The HA 2.0 (and above) Release only supports statically configured, pre-shared secret for IPSec IKE.
As per IS-835-B, The HA and AAA should be configured with same security level for a PDSN. The PDSN receives a security level from AAA server and initiates IKE, and the HA responds to the IKE request for establishing security policy.
The PDSN receives a security level from the AAA server and initiates IKE, and the HA responds to the IKE request for establishing a security policy. All traffic specified by the access-list of the crypto configuration is protected by the IPSec tunnel. The access-list is configured to protect all traffic between the PDSN and HA, and all bindings belonging to a given PDSN-HA pair are protected.
IPSec is not applicable to mobiles using Co-located COA
Note
Cisco Mobile Wirelesss Home Agent Release 2.0 (and above) on the Cisco 7600 and Cisco 6500 Catalyst platforms requires the support of the Cisco IPSec Services Module (VPNSM), a blade that runs on the Catalyst 6500 or 7600 router. VPNSM does not have any physical WAN or LAN interfaces, and utilizes VLAN selectors for its VPN policy.
For more information on Catalyst 6500 Security Modules visit http://www.cisco.com/en/US/products/hw/switches/ps708/index.html.
For more information on the Cisco 7600 Internet Router visit http://www.cisco.com/en/US/products/hw/routers/ps368/index.html.
IPSec-based security may be applied on tunnels between the PDSN and the HA depending on parameters received from the Home AAA server. A single tunnel may be established between each PDSN-HA pair. It is possible for a single tunnel between the PDSN-HA pair to have three types of traffic streams: Control Messages, Data with IP-in-IP encapsulation, and Data with GRE-in-IP encapsulation. All traffic carried in the tunnel has the same level of protection provided by IPSec.
IS835 defines MobileIP service as described in RFC 2002; the Cisco Mobile Wireless HA provides Mobile IP service and Proxy Mobile IP service.
In Proxy Mobile service, the Mobile-Node is connected to the PDSN/FA through Simple IP, and the PDSN/FA acts as Mobile IP Proxy for the MN to the HA.
Once Security Associations (SAs or tunnels) are established, they remain active until there is traffic on the tunnel, or the lifetime of the SAs expire.
Note
IPSec does not work with HA redundancy, since the IPSec security associations are not replicated to the standby during failover.
Figure 10-1 illustrates the IS835 IPSec network topology.
Figure 10-1 IS835 IPSec Network
IPSec Interoperability Between the PDSN and HA (IS-835-C)
IPSec rules under IS-835C mandates that connections are always initiated from the PDSN to the Home Agent IP address. Certain PDSNs may not be flexible in their approach to IPSec configuration. These PDSNs do not allow any configuration for Remote IPSec termination points, and expect that the remote IPSec termination point is always the Home Agent IP address.
The following section illustrates how to handle IPSec Interoperability between such PDSNs and the HA with Home Agent.
The change in the configuration allows for IPSec connections for the Home Agent IP address that are still terminated by the VPNSM.
Handling Single Home Agent Instance
This solution is achieved by letting SUP IOS own the same Home Agent IP address. Traffic to the Home Agent is then policy routed to the correct Home Agent.
Figure 10-2 illustrates a possible configuration:
Figure 10-2 Single HA Interoperability
Here is a sample configuration for the Supervisor. The PDSN IP Address is 14.0.0.1, HA3 address is 13.0.0.50, and HA4 is 13.0.0.51
Single HA Instance - Interoperability
crypto isakmp policy 1hash md5authentication pre-sharelifetime 60000crypto isakmp key cisco address 10.0.0.0 0.0.0.0!crypto ipsec transform-set mobile-set1 esp-3des# Comment: testmap is used for HA3crypto map testmap local-address Loopback21crypto map testmap 20 ipsec-isakmpset peer 10.0.0.1set transform-set mobile-set1match address 131!interface Loopback21description corresponds to ha-on-proc3ip address 10.0.0.50 255.255.255.255!interface GigabitEthernet4/1description encrypt traffic from vlan 151 to vlan 201& 136 to 139no ip addressflowcontrol receive onflowcontrol send offswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,136,146,151,1002-1005switchport mode trunkcdp enable!interface GigabitEthernet4/2description decrypts traffic from vlan 201 to 151, 139 to 136no ip addressflowcontrol receive onflowcontrol send offswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,139,149,201,1002-1005switchport mode trunkcdp enableinterface Vlan136description secure vlanip address 10.0.0.1 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA3no mop enabledcrypto map testmap!interface Vlan137description internal vlan to HA3ip address 10.0.0.1 255.255.0.0!interface Vlan139no ip addresscrypto connect vlan 136!access-list 131 permit ip host 10.0.0.1 host 10.0.0.50access-list 131 permit ip host 10.0.0.50 host 10.0.0.1access-list 131 permit ip 10.0.0.0 0.0.0.255 10.0.0.0 0.0.0.255access-list 2000 permit udp any any eq mobile-ipaccess-list 2000 permit ipinip any anyroute-map RRQ-HA3 permit 10match ip address 2000set ip next-hop 10.0.0.2!
IPSec Support on Catalyst 6500/7600 with 5 CPUs of MWAM
You may require an IPSec tunnel be established over the mobile IP tunnel between the PDSN and the HA. The PDSN resides in the foreign network and the HA in the home network. As per IS-835B specification, IPSec connections are always initiated from the PDSN towards the HA, so the IPSec tunnel endpoints are the PDSN IP address and the HA IP address.
In Cisco's 6500 Catalyst and 7600 HA solution, IPSec is terminated at the Supervisor (SUP), while the actual HA application resides on the MWAM card(s). Each MWAM card has 5 CPUs, each running one HA instance. Each HA has its own IP address. If different IP addresses are used in the SUP as IPSec endpoints, and in the MWAM for HA endpoints, IKE messages generated from the PDSN with HA IP addresses are dropped at the SUP.
To avoid this issue, the above requirement is achieved by letting the SUP own the same IP address that is configured as the HA IP address on the MWAM. The requirement is to split the IPSec traffic for different HA IP addresses across separate IPSec VLANs so that each PDSN-HA pair is handled appropriately. This configuration allows the SUP to support all 5 CPUs on the MWAM card running the HA application, each owning an IP address that is the IPSec endpoint.
In this case, the VRF IPSec feature on the SUP720 is used. All traffic coming from the PDSN is put on different VLANs based on the HA IP address. Each VLAN corresponds to one VRF and one VRF exists per HA instance on the SUP. In this situation, the VRF mode of IPSec is used to split traffic between the 5 different HA instances present on the MWAM. Once the packets are decrypted by the crypto VLAN, packets are then policy routed using an internal VLAN that corresponds to the particular HA to the correct HA CPU on the MWAM.
IPSec redundancy across chassis and within a single chassis is supported for this environment.
The following call flow describes this behavior:
1.
An IPSec security association (SA) is opened between each PDSN and HA IP address pair on the SUP. IKE messages are sent from the PDSN with its IP address and peer IP address as the particular HA IP address. Based on the PDSN IP address and the HA IP address in the IKE message, the correct ISAKMP profile is selected for the PDSN-HA pair that indicates the VRF for the pair. This establishes different SPIs corresponding to the PDSN-HA pair.
2.
One VLAN per HA IP address is defined, and it belongs to a VRF that is defined for that IP address on the SUP. Thus, the SUP owns the HA IP address, and it is the IPSec terminating point for PDSN.
3.
Once an IPSec SA is established between each PDSN-HA IP address pair, encrypted packets are put on to the correct VRF based on the SPI of the incoming packet.
4.
Once the encrypted packets are decrypted at the IPSec VLAN corresponding to the HA address, the packets are policy routed to the corresponding CPU on the MWAM card that hosts the HA IP address (using the internal VLAN present between SUP and the HA instance on the MWAM).
5.
In the return path, packets from HA instances on the MWAM are placed on the internal VLAN and put on to the corresponding IPSec VLAN for the HA. This enables the packet to be encrypted and sent out to the PDSN using the outgoing interface.
Restrictions
Simultaneous Bindings
The Cisco Home Agent does not support simultaneous bindings. When multiple flows are established for the same NAI, a different IP address is assigned to each flow. This means that simultaneous binding is not required, because it is used to maintain more than one flow to the same IP address.
Security
The HA supports IPSec, IKE, IPSec Authentication Header (AH) and IP Encapsulating Security Payload (ESP) as required in IS-835-B. The Home Agent does not support security for control or user traffic independently. Either both are secured, or neither.
The Home Agent does not support dynamically assigned keys or shared secrets as defined in IS-835-B.
Configuring Mobile IP Security Associations
To configure security associations for mobile hosts, FAs, and HAs, use one of the following commands in global configuration mode:
Configuring IPSec for the HA
To configure IPSec for the HA, use the following commands in global configuration mode:
Creating Active Standby Home Agent Security Associations
The following IOS command displays active standby Home Agent security associations:
Here is an example of the command:
Router# show ip mobile secure home-agentSecurity Associations (algorithm,mode,replay protection,key):30.0.0.30:SPI 100, MD5, Prefix-suffix, Timestamp +/- 7,Key 'red'HA#Configuration Examples
Home Agent IPSec Configuration
Note
Once you permit the hosts/subnets you want encrypted, ensure that you put in an explicit deny statement. The deny statement states do not encrypt any other packets.
Note
The following example is for IPSec on the Cisco 7200 router only. IPSec on the Cisco Catalyst 6500 amd the 7600 is configured on the Supervisor, rather than on the Home Agent.
access-list 101 deny ip any anyaccess-list 103 deny ip any any-------------------------------------------------------!! No configuration change since last restart!version 12.2service timestamps debug datetimeservice timestamps log datetimeservice password-encryption!hostname 7206f1!aaa new-model!!aaa authentication login CONSOLE noneaaa authentication login NO_AUTHENT noneaaa authentication ppp default group radiusaaa authorization config-commandsaaa authorization ipmobile default group radiusaaa authorization network default group radiusaaa session-id commonenable password 7 151E0A0E!username xxx privilege 15 nopasswordip subnet-zeroip cef!!no ip domain-lookup!!crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.4crypto isakmp key cisco address 172.16.60.30!!crypto ipsec transform-set esp-des-sha-transport esp-des esp-sha-hmacmode transport!crypto map tosim 10 ipsec-isakmpset peer 10.1.1.4set transform-set esp-des-sha-transportmatch address 101!crypto map tosim3 10 ipsec-isakmpset peer 172.16.60.30set transform-set esp-des-sha-transportmatch address 103!!interface Loopback0ip address 10.0.0.1 255.0.0.0!interface Loopback1ip address 10.0.0.9 255.0.0.0!interface Loopback10ip address 10.1.1.1 255.255.255.0!interface FastEthernet0/0ip address 10.1.1.9 255.255.255.0load-interval 30duplex fullspeed 100crypto map tosim!interface FastEthernet0/1ip address 10.1.1.1 255.0.0.0load-interval 30duplex fullspeed 100!interface FastEthernet1/0ip address 10.1.1.9 255.255.255.0load-interval 30duplex full!interface FastEthernet2/0ip address 172.16.60.10 255.255.255.0load-interval 30duplex fullcrypto map tosim3!router mobile!ip local pool ispabc-pool1 10.0.0.2 12.1.0.1ip local pool ispabc-pool1 10.1.0.8 12.2.0.1ip local pool ispxyz-pool1 10.0.0.2 9.1.0.1ip local pool ispxyz-pool1 10.1.0.8 9.2.0.1ip classlessip route 172.16.49.48 255.255.255.255 172.16.60.1no ip http serverip pim bidir-enableip mobile home-agent address 10.1.1.1ip mobile host nai @ispabc.com address pool local ispabc-pool1 virtual-network 10.0.0.0 255.0.0.0 aaa load-sa lifetime 65535ip mobile host nai @ispxyz.com address pool local ispxyz-pool1 virtual-network 10.0.0.9 255.0.0.0 aaa load-sa lifetime 65535!!access-list 101 permit ip host 10.1.1.1 host 1.1.1.4access-list 101 deny ip any anyaccess-list 103 permit ip host 10.1.1.1 host 172.16.60.30access-list 103 deny ip any any!!radius-server host 172.16.49.48 auth-port 1645 acct-port 1646 key 7 094F471A1A0Aradius-server retransmit 3radius-server key 7 02050D480809call rsvp-sync!!mgcp profile default!dial-peer cor custom!!gatekeepershutdown!!line con 0exec-timeout 0 0line aux 0line vty 0 4exec-timeout 0 0!exception protocol ftpexception dump 64.102.16.25exception memory minimum 1000000ntp clock-period 17179878ntp server 172.16.60.1!end
Configuration - SUP720 / VRF-IPSec for 5 HA Instances
The following example provides detail of the SUP720 / VRF-IPSec configuration, as illustrated in Figure 10-3.
Figure 10-3 SUP720 / VRF-IPSec Configuration
SUP Configuration - Switch 1:
ip vrf vrf-ha2rd 2000:1route-target export 2000:1route-target import 2000:1!ip vrf vrf-ha3rd 1000:1route-target export 1000:1route-target import 1000:1!ip vrf vrf-ha4rd 4000:1route-target export 4000:1route-target import 4000:1!ip vrf vrf-ha5rd 5000:1route-target export 5000:1route-target import 5000:1!ip vrf vrf-ha6rd 6000:1route-target export 6000:1route-target import 6000:1!ssp group 1remote 13.0.0.31redundancy PDSN-LANredundancy HOME-LANredundancy INTERNAL_VLAN_HA3redundancy HOME-LAN-2redundancy INTERNAL_VLAN_HA2redundancy HOME-LAN-4redundancy HOME-LAN-5redundancy HOME-LAN-6redundancy INTERNAL_VLAN_HA4redundancy INTERNAL_VLAN_HA5redundancy INTERNAL_VLAN_HA6port 4098!crypto keyring key0pre-shared-key address 92.92.92.1 key cisco!crypto isakmp policy 1authentication pre-sharelifetime 60000crypto isakmp ssp 1!crypto isakmp profile prof1vrf vrf-ha2keyring key0match identity address 92.92.92.1 255.255.255.255local-address 12.0.0.30crypto isakmp profile prof2vrf vrf-ha3keyring key0match identity address 92.92.92.1 255.255.255.255local-address 13.0.0.30crypto isakmp profile prof4vrf vrf-ha4keyring key0match identity address 92.92.92.1 255.255.255.255local-address 14.0.0.30crypto isakmp profile prof5vrf vrf-ha5keyring key0match identity address 92.92.92.1 255.255.255.255local-address 15.0.0.30crypto isakmp profile prof6vrf vrf-ha6keyring key0match identity address 92.92.92.1 255.255.255.255local-address 16.0.0.30!crypto ipsec transform-set mobile-set1 esp-des esp-sha-hmac!crypto map testmap local-address FastEthernet4/3crypto map testmap 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof2match address 131!crypto map testmap1 local-address FastEthernet4/4crypto map testmap1 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof1match address 121!crypto map testmap4 local-address FastEthernet4/7crypto map testmap4 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof4match address 141!crypto map testmap5 local-address FastEthernet4/9crypto map testmap5 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof5match address 151!crypto map testmap6 local-address FastEthernet4/11crypto map testmap6 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof6match address 161!crypto engine mode vrf!interface FastEthernet4/2ip address 92.92.92.9 255.255.0.0ip policy route-map RRQ-HA10speed 100duplex halfstandby delay minimum 30 reload 60standby 1 ip 92.92.92.10standby 1 preemptstandby 1 name PDSN-LANstandby 1 track FastEthernet4/2standby 1 track FastEthernet4/3standby 1 track FastEthernet4/4standby 1 track FastEthernet4/7standby 1 track FastEthernet4/9standby 1 track FastEthernet4/11standby 1 track GigabitEthernet6/1standby 1 track Vlan136standby 1 track Vlan137standby 1 track Vlan127standby 1 track Vlan126standby 1 track Vlan146standby 1 track Vlan147standby 1 track Vlan156standby 1 track Vlan157standby 1 track Vlan166standby 1 track Vlan167standby 1 track Vlan200crypto engine slot 6!interface FastEthernet4/3ip address 13.0.0.29 255.255.0.0standby delay minimum 30 reload 60standby 3 ip 13.0.0.30standby 3 preemptstandby 3 name HOME-LANstandby 3 track FastEthernet4/2standby 3 track FastEthernet4/3standby 3 track FastEthernet4/4standby 3 track FastEthernet4/7standby 3 track FastEthernet4/9standby 3 track FastEthernet4/11standby 3 track GigabitEthernet6/1standby 3 track Vlan136standby 3 track Vlan137standby 3 track Vlan127standby 3 track Vlan126standby 3 track Vlan146standby 3 track Vlan147standby 3 track Vlan156standby 3 track Vlan157standby 3 track Vlan166standby 3 track Vlan167standby 3 track Vlan200crypto engine slot 6!interface FastEthernet4/4ip address 12.0.0.29 255.255.255.0duplex halfstandby delay minimum 30 reload 60standby 2 ip 12.0.0.30standby 2 preemptstandby 2 name HOME-LAN-2standby 2 track FastEthernet4/2standby 2 track FastEthernet4/3standby 2 track FastEthernet4/4standby 2 track FastEthernet4/7standby 2 track FastEthernet4/9standby 2 track FastEthernet4/11standby 2 track GigabitEthernet6/1standby 2 track Vlan136standby 2 track Vlan137standby 2 track Vlan127standby 2 track Vlan126standby 2 track Vlan146standby 2 track Vlan147standby 2 track Vlan156standby 2 track Vlan157standby 2 track Vlan166standby 2 track Vlan167standby 2 track Vlan200crypto engine slot 6!interface FastEthernet4/5switchportswitchport access vlan 137switchport mode accessno ip address!interface FastEthernet4/6switchportswitchport access vlan 127switchport mode accessno ip addressspeed 100duplex half!interface FastEthernet4/7ip address 14.0.0.29 255.255.255.0standby delay minimum 30 reload 60standby 4 ip 14.0.0.30standby 4 preemptstandby 4 name HOME-LAN-4standby 4 track FastEthernet4/2standby 4 track FastEthernet4/3standby 4 track FastEthernet4/4standby 4 track FastEthernet4/7standby 4 track FastEthernet4/9standby 4 track FastEthernet4/11standby 4 track Vlan136standby 4 track Vlan137standby 4 track Vlan127standby 4 track Vlan126standby 4 track GigabitEthernet6/1standby 4 track Vlan146standby 4 track Vlan147standby 4 track Vlan156standby 4 track Vlan157standby 4 track Vlan166standby 4 track Vlan167standby 4 track Vlan200crypto engine slot 6!interface FastEthernet4/8switchportswitchport access vlan 147switchport mode accessno ip address!interface FastEthernet4/9ip address 15.0.0.29 255.255.255.0standby delay minimum 30 reload 60standby 5 ip 15.0.0.30standby 5 preemptstandby 5 name HOME-LAN-5standby 5 track FastEthernet4/2standby 5 track FastEthernet4/3standby 5 track FastEthernet4/4standby 5 track FastEthernet4/7standby 5 track FastEthernet4/9standby 5 track FastEthernet4/11standby 5 track Vlan136standby 5 track Vlan137standby 5 track Vlan127standby 5 track Vlan126standby 5 track GigabitEthernet6/1standby 5 track Vlan146standby 5 track Vlan147standby 5 track Vlan156standby 5 track Vlan157standby 5 track Vlan166standby 5 track Vlan167standby 5 track Vlan200crypto engine slot 6!interface FastEthernet4/10switchportswitchport access vlan 157switchport mode accessno ip address!interface FastEthernet4/11ip address 16.0.0.29 255.255.255.0standby delay minimum 30 reload 60standby 6 ip 16.0.0.30standby 6 preemptstandby 6 name HOME-LAN-6standby 6 track FastEthernet4/2standby 6 track FastEthernet4/3standby 6 track FastEthernet4/4standby 6 track FastEthernet4/7standby 6 track FastEthernet4/9standby 6 track FastEthernet4/11standby 6 track Vlan136standby 6 track Vlan137standby 6 track Vlan127standby 6 track Vlan126standby 6 track GigabitEthernet6/1standby 6 track Vlan146standby 6 track Vlan147standby 6 track Vlan156standby 6 track Vlan157standby 6 track Vlan166standby 6 track Vlan167standby 6 track Vlan200crypto engine slot 6!interface FastEthernet4/12switchportswitchport access vlan 167switchport mode accessno ip address!interface GigabitEthernet6/1switchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 126,136,146,156,166switchport mode trunkno ip addressflowcontrol receive onflowcontrol send offspanning-tree portfast trunk!interface GigabitEthernet6/2switchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan noneswitchport mode trunkno ip addressflowcontrol receive onflowcontrol send offspanning-tree portfast trunk!interface Vlan126description secure vlanethernet point-to-pointip vrf forwarding vrf-ha2ip address 126.0.0.1 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA2no mop enabledcrypto map testmap1 ssp 1crypto engine slot 6!interface Vlan127description internal vlan to HA2ip vrf forwarding vrf-ha2ip address 6.0.0.1 255.255.0.0standby 12 ip 6.0.0.5standby 12 preemptstandby 12 name INTERNAL_VLAN_HA2standby 12 track FastEthernet4/2standby 12 track FastEthernet4/3standby 12 track FastEthernet4/4standby 12 track FastEthernet4/7standby 12 track FastEthernet4/9standby 12 track FastEthernet4/11standby 12 track Vlan136standby 12 track Vlan137standby 12 track Vlan127standby 12 track Vlan126standby 12 track GigabitEthernet6/1standby 12 track Vlan146standby 12 track Vlan147standby 12 track Vlan156standby 12 track Vlan157standby 12 track Vlan166standby 12 track Vlan167standby 12 track Vlan200!interface Vlan136description secure vlanethernet point-to-pointip vrf forwarding vrf-ha3ip address 136.0.0.1 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA3no mop enabledcrypto map testmap ssp 1crypto engine slot 6!interface Vlan137description internal vlan to HA3ip vrf forwarding vrf-ha3ip address 7.0.0.1 255.255.0.0standby 13 ip 7.0.0.5standby 13 preemptstandby 13 name INTERNAL_VLAN_HA3standby 13 track FastEthernet4/2standby 13 track FastEthernet4/3standby 13 track FastEthernet4/4standby 13 track FastEthernet4/7standby 13 track FastEthernet4/9standby 13 track FastEthernet4/11standby 13 track Vlan136standby 13 track Vlan137standby 13 track Vlan127standby 13 track Vlan126standby 13 track GigabitEthernet6/1standby 13 track Vlan146standby 13 track Vlan147standby 13 track Vlan156standby 13 track Vlan157standby 13 track Vlan166standby 13 track Vlan167standby 13 track Vlan200!interface Vlan146description secure vlanethernet point-to-pointip vrf forwarding vrf-ha4ip address 146.0.0.1 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA4no mop enabledcrypto map testmap4 ssp 1crypto engine slot 6!interface Vlan147description internal vlan to HA4ip vrf forwarding vrf-ha4ip address 8.0.0.1 255.255.0.0standby 14 ip 8.0.0.5standby 14 preemptstandby 14 name INTERNAL_VLAN_HA4standby 14 track FastEthernet4/2standby 14 track FastEthernet4/3standby 14 track FastEthernet4/4standby 14 track FastEthernet4/7standby 14 track FastEthernet4/9standby 14 track FastEthernet4/11standby 14 track Vlan136standby 14 track Vlan137standby 14 track Vlan127standby 14 track Vlan126standby 14 track GigabitEthernet6/1standby 14 track Vlan146standby 14 track Vlan147standby 14 track Vlan156standby 14 track Vlan157standby 14 track Vlan166standby 14 track Vlan167standby 14 track Vlan200!interface Vlan156description secure vlanethernet point-to-pointip vrf forwarding vrf-ha5ip address 156.0.0.1 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA5no mop enabledcrypto map testmap5 ssp 1crypto engine slot 6!interface Vlan157description internal vlan to HA5ip vrf forwarding vrf-ha5ip address 9.0.0.1 255.255.0.0standby 15 ip 9.0.0.5standby 15 preemptstandby 15 name INTERNAL_VLAN_HA5standby 15 track FastEthernet4/2standby 15 track FastEthernet4/3standby 15 track FastEthernet4/4standby 15 track FastEthernet4/7standby 15 track FastEthernet4/9standby 15 track FastEthernet4/11standby 15 track Vlan136standby 15 track Vlan137standby 15 track Vlan127standby 15 track Vlan126standby 15 track GigabitEthernet6/1standby 15 track Vlan146standby 15 track Vlan147standby 15 track Vlan156standby 15 track Vlan157standby 15 track Vlan166standby 15 track Vlan167standby 15 track Vlan200!interface Vlan166description secure vlanethernet point-to-pointip vrf forwarding vrf-ha6ip address 166.0.0.1 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA6no mop enabledcrypto map testmap6 ssp 1crypto engine slot 6!interface Vlan167description internal vlan to HA6ip vrf forwarding vrf-ha6ip address 10.0.0.1 255.255.0.0standby 16 ip 10.0.0.5standby 16 preemptstandby 16 name INTERNAL_VLAN_HA6standby 16 track FastEthernet4/2standby 16 track FastEthernet4/3standby 16 track FastEthernet4/4standby 16 track FastEthernet4/7standby 16 track FastEthernet4/9standby 16 track FastEthernet4/11standby 16 track Vlan136standby 16 track Vlan137standby 16 track Vlan127standby 16 track Vlan126standby 16 track GigabitEthernet6/1standby 16 track Vlan146standby 16 track Vlan147standby 16 track Vlan156standby 16 track Vlan157standby 16 track Vlan166standby 16 track Vlan167standby 16 track Vlan200!interface vlan 200ip address 200.0.0.2 255.0.0.0standby 250 ip 200.0.0.3standby 250 preemptstandby 250 name NON_IPSEC_VLANstandby 250 track FastEthernet4/2standby 250 track FastEthernet4/3standby 250 track FastEthernet4/4standby 250 track FastEthernet4/7standby 250 track FastEthernet4/9standby 250 track FastEthernet4/11standby 250 track Vlan136standby 250 track Vlan137standby 250 track Vlan127standby 250 track Vlan126standby 250 track GigabitEthernet6/1standby 250 track Vlan146standby 250 track Vlan147standby 250 track Vlan156standby 250 track Vlan157standby 250 track Vlan166standby 250 track Vlan167!ip route vrf vrf-ha2 92.92.92.0 255.255.255.0 Vlan126 92.92.92.1 globalip route vrf vrf-ha3 92.92.92.0 255.255.255.0 Vlan136 92.92.92.1 globalip route vrf vrf-ha4 92.92.92.0 255.255.255.0 Vlan146 92.92.92.1 globalip route vrf vrf-ha5 92.92.92.0 255.255.255.0 Vlan156 92.92.92.1 globalip route vrf vrf-ha6 92.92.92.0 255.255.255.0 Vlan166 92.92.92.1 global!access-list 121 permit ip host 12.0.0.30 host 92.92.92.1access-list 121 remark Access List for HA2access-list 131 permit ip host 13.0.0.30 host 92.92.92.1access-list 131 remark Access List for HA3access-list 141 permit ip host 14.0.0.30 host 92.92.92.1access-list 141 remark Access List for HA4access-list 151 permit ip host 15.0.0.30 host 92.92.92.1access-list 151 remark Access List for HA5access-list 161 permit ip host 16.0.0.30 host 92.92.92.1access-list 161 remark Access List for HA6access-list 2000 permit udp any any eq mobile-ipaccess-list 2000 permit ipinip any anyaccess-list 2001 permit ip 95.95.95.0 0.0.0.255 host 120.0.0.30access-list 2002 permit ip 96.96.96.0 0.0.0.255 host 130.0.0.30access-list 2003 permit ip 97.97.97.0 0.0.0.255 host 140.0.0.30access-list 2004 permit ip 98.98.98.0 0.0.0.255 host 150.0.0.30access-list 2005 permit ip 99.99.99.0 0.0.0.255 host 160.0.0.30!arp vrf vrf-ha6 10.0.0.10 0000.0c07.ac32 ARPAarp vrf vrf-ha4 8.0.0.10 0000.0c07.ac1e ARPAarp vrf vrf-ha5 9.0.0.10 0000.0c07.ac28 ARPAarp vrf vrf-ha2 6.0.0.10 0000.0c07.ac0a ARPAarp vrf vrf-ha3 7.0.0.10 0000.0c07.ac14 ARPA!route-map RRQ-HA5 permit 10match ip address 2000set ip next-hop 9.0.0.10!route-map RRQ-HA4 permit 10match ip address 2000set ip next-hop 8.0.0.10!route-map RRQ-HA6 permit 10match ip address 2000set ip next-hop 10.0.0.10!route-map RRQ-HA3 permit 10match ip address 2000set ip next-hop 7.0.0.10!route-map RRQ-HA2 permit 10match ip address 2000set ip next-hop 6.0.0.10!route-map RRQ-HA10 permit 10match ip address 2001continue 11set ip next-hop 200.0.0.5!route-map RRQ-HA10 permit 11match ip address 2002continue 12set ip next-hop 200.0.0.15!route-map RRQ-HA10 permit 12match ip address 2003continue 13set ip next-hop 200.0.0.25!route-map RRQ-HA10 permit 13match ip address 2004continue 14set ip next-hop 200.0.0.35!route-map RRQ-HA10 permit 14match ip address 2005set ip next-hop 200.0.0.45SUP Configuration - Switch 2:
ip vrf vrf-ha2rd 2000:1route-target export 2000:1route-target import 2000:1!ip vrf vrf-ha3rd 1000:1route-target export 1000:1route-target import 1000:1!ip vrf vrf-ha4rd 4000:1route-target export 4000:1route-target import 4000:1!ip vrf vrf-ha5rd 5000:1route-target export 5000:1route-target import 5000:1!ip vrf vrf-ha6rd 6000:1route-target export 6000:1route-target import 6000:1!ssp group 1remote 13.0.0.29redundancy PDSN-LANredundancy HOME-LANredundancy INTERNAL_VLAN_HA3redundancy HOME-LAN-2redundancy INTERNAL_VLAN_HA2redundancy HOME-LAN-4redundancy HOME-LAN-5redundancy HOME-LAN-6redundancy INTERNAL_VLAN_HA4redundancy INTERNAL_VLAN_HA5redundancy INTERNAL_VLAN_HA6port 4098!crypto keyring key0pre-shared-key address 92.92.92.1 key cisco!crypto isakmp policy 1authentication pre-sharelifetime 60000crypto isakmp ssp 1!crypto isakmp profile prof1vrf vrf-ha2keyring key0match identity address 92.92.92.1 255.255.255.255local-address 12.0.0.30crypto isakmp profile prof2vrf vrf-ha3keyring key0match identity address 92.92.92.1 255.255.255.255local-address 13.0.0.30crypto isakmp profile prof4vrf vrf-ha4keyring key0match identity address 92.92.92.1 255.255.255.255local-address 14.0.0.30crypto isakmp profile prof5vrf vrf-ha5keyring key0match identity address 92.92.92.1 255.255.255.255local-address 15.0.0.30crypto isakmp profile prof6vrf vrf-ha6keyring key0match identity address 92.92.92.1 255.255.255.255local-address 16.0.0.30!crypto ipsec transform-set mobile-set1 esp-des esp-sha-hmac!crypto map testmap local-address FastEthernet2/3crypto map testmap 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof2match address 131!crypto map testmap1 local-address FastEthernet2/5crypto map testmap1 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof1match address 121!crypto map testmap4 local-address FastEthernet2/7crypto map testmap4 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof4match address 141!crypto map testmap5 local-address FastEthernet2/9crypto map testmap5 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof5match address 151!crypto map testmap6 local-address FastEthernet2/11crypto map testmap6 20 ipsec-isakmpset peer 92.92.92.1set transform-set mobile-set1set isakmp-profile prof6match address 161!crypto engine mode vrf!interface FastEthernet2/2ip address 92.92.92.11 255.255.0.0ip policy route-map RRQ-HA10speed 100duplex fullstandby delay minimum 30 reload 60standby 1 ip 92.92.92.10standby 1 preemptstandby 1 name PDSN-LANstandby 1 track FastEthernet2/2standby 1 track FastEthernet2/3standby 1 track FastEthernet2/5standby 1 track FastEthernet2/7standby 1 track FastEthernet2/9standby 1 track FastEthernet2/11standby 1 track GigabitEthernet4/1standby 1 track Vlan136standby 1 track Vlan137standby 1 track Vlan127standby 1 track Vlan126standby 1 track Vlan146standby 1 track Vlan156standby 1 track Vlan157standby 1 track Vlan166standby 1 track Vlan167standby 1 track Vlan147standby 1 track Vlan200crypto engine slot 4!interface FastEthernet2/3ip address 13.0.0.31 255.255.0.0standby delay minimum 30 reload 60standby 3 ip 13.0.0.30standby 3 preemptstandby 3 name HOME-LANstandby 3 track FastEthernet2/2standby 3 track FastEthernet2/3standby 3 track FastEthernet2/5standby 3 track FastEthernet2/7standby 3 track FastEthernet2/9standby 3 track FastEthernet2/11standby 3 track GigabitEthernet4/1standby 3 track Vlan136standby 3 track Vlan137standby 3 track Vlan127standby 3 track Vlan126standby 3 track Vlan146standby 3 track Vlan156standby 3 track Vlan157standby 3 track Vlan166standby 3 track Vlan167standby 3 track Vlan147standby 3 track Vlan200crypto engine slot 4!interface FastEthernet2/4switchportswitchport access vlan 137switchport mode accessno ip address!interface FastEthernet2/5ip address 12.0.0.31 255.255.0.0standby delay minimum 30 reload 60standby 2 ip 12.0.0.30standby 2 preemptstandby 2 name HOME-LAN-2standby 2 track FastEthernet2/2standby 2 track FastEthernet2/3standby 2 track FastEthernet2/5standby 2 track FastEthernet2/7standby 2 track FastEthernet2/9standby 2 track FastEthernet2/11standby 2 track GigabitEthernet4/1standby 2 track Vlan136standby 2 track Vlan137standby 2 track Vlan127standby 2 track Vlan126standby 2 track Vlan146standby 2 track Vlan156standby 2 track Vlan157standby 2 track Vlan166standby 2 track Vlan167standby 2 track Vlan147standby 2 track Vlan200crypto engine slot 4!interface FastEthernet2/6switchportswitchport access vlan 127switchport mode accessno ip address!interface FastEthernet2/7ip address 14.0.0.31 255.255.0.0standby delay minimum 30 reload 60standby 4 ip 14.0.0.30standby 4 preemptstandby 4 name HOME-LAN-4standby 4 track FastEthernet2/2standby 4 track FastEthernet2/3standby 4 track FastEthernet2/5standby 4 track FastEthernet2/7standby 4 track FastEthernet2/9standby 4 track FastEthernet2/11standby 4 track Vlan136standby 4 track Vlan137standby 4 track Vlan127standby 4 track Vlan126standby 4 track GigabitEthernet4/1standby 4 track Vlan146standby 4 track Vlan156standby 4 track Vlan157standby 4 track Vlan166standby 4 track Vlan167standby 4 track Vlan147standby 4 track Vlan200crypto engine slot 4!interface FastEthernet2/8switchportswitchport access vlan 147switchport mode accessno ip address!interface FastEthernet2/9ip address 15.0.0.31 255.255.0.0standby delay minimum 30 reload 60standby 5 ip 15.0.0.30standby 5 preemptstandby 5 name HOME-LAN-5standby 5 track FastEthernet2/2standby 5 track FastEthernet2/3standby 5 track FastEthernet2/5standby 5 track FastEthernet2/7standby 5 track FastEthernet2/9standby 5 track FastEthernet2/11standby 5 track Vlan136standby 5 track Vlan137standby 5 track Vlan127standby 5 track Vlan126standby 5 track GigabitEthernet4/1standby 5 track Vlan146standby 5 track Vlan156standby 5 track Vlan157standby 5 track Vlan166standby 5 track Vlan167standby 5 track Vlan147standby 5 track Vlan200crypto engine slot 4!interface FastEthernet2/10switchportswitchport access vlan 157switchport mode accessno ip address!interface FastEthernet2/11ip address 16.0.0.31 255.255.0.0standby delay minimum 30 reload 60standby 6 ip 16.0.0.30standby 6 preemptstandby 6 name HOME-LAN-6standby 6 track FastEthernet2/2standby 6 track FastEthernet2/3standby 6 track FastEthernet2/5standby 6 track FastEthernet2/7standby 6 track FastEthernet2/9standby 6 track FastEthernet2/11standby 6 track Vlan136standby 6 track Vlan137standby 6 track Vlan127standby 6 track Vlan126standby 6 track GigabitEthernet4/1standby 6 track Vlan146standby 6 track Vlan156standby 6 track Vlan157standby 6 track Vlan166standby 6 track Vlan167standby 6 track Vlan147standby 6 track Vlan200crypto engine slot 4!interface FastEthernet2/12switchportswitchport access vlan 167switchport mode accessno ip address!interface GigabitEthernet4/1switchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 126,136,146,156,166switchport mode trunkno ip addressflowcontrol receive onflowcontrol send offspanning-tree portfast trunk!interface GigabitEthernet4/2switchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan noneswitchport mode trunkno ip addressflowcontrol receive onflowcontrol send offspanning-tree portfast trunk!interface Vlan126description secure vlanethernet point-to-pointip vrf forwarding vrf-ha2ip address 126.0.0.2 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA2no mop enabledcrypto map testmap1 ssp 1crypto engine slot 4!interface Vlan127description internal vlan to HA2ip vrf forwarding vrf-ha2ip address 6.0.0.2 255.255.0.0standby 12 ip 6.0.0.5standby 12 preemptstandby 12 name INTERNAL_VLAN_HA2standby 12 track FastEthernet2/2standby 12 track FastEthernet2/3standby 12 track FastEthernet2/5standby 12 track FastEthernet2/7standby 12 track FastEthernet2/9standby 12 track FastEthernet2/11standby 12 track Vlan136standby 12 track Vlan137standby 12 track Vlan127standby 12 track Vlan126standby 12 track GigabitEthernet4/1standby 12 track Vlan146standby 12 track Vlan156standby 12 track Vlan157standby 12 track Vlan166standby 12 track Vlan167standby 12 track Vlan147standby 12 track Vlan200!interface Vlan136description secure vlanethernet point-to-pointip vrf forwarding vrf-ha3ip address 136.0.0.2 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA3no mop enabledcrypto map testmap ssp 1crypto engine slot 4!interface Vlan137description internal vlan to HA3ip vrf forwarding vrf-ha3ip address 7.0.0.2 255.255.0.0standby 13 ip 7.0.0.5standby 13 preemptstandby 13 name INTERNAL_VLAN_HA3standby 13 track FastEthernet2/2standby 13 track FastEthernet2/3standby 13 track FastEthernet2/5standby 13 track FastEthernet2/7standby 13 track FastEthernet2/9standby 13 track FastEthernet2/11standby 13 track Vlan136standby 13 track Vlan137standby 13 track Vlan127standby 13 track Vlan126standby 13 track GigabitEthernet4/1standby 13 track Vlan146standby 13 track Vlan156standby 13 track Vlan157standby 13 track Vlan166standby 13 track Vlan167standby 13 track Vlan147standby 13 track Vlan200!interface Vlan146description secure vlanethernet point-to-pointip vrf forwarding vrf-ha4ip address 146.0.0.2 255.0.0.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA4no mop enabledcrypto map testmap4 ssp 1crypto engine slot 4!interface Vlan147description internal vlan to HA4ip vrf forwarding vrf-ha4ip address 8.0.0.2 255.255.0.0standby 14 ip 8.0.0.5standby 14 preemptstandby 14 name INTERNAL_VLAN_HA4standby 14 track FastEthernet2/2standby 14 track FastEthernet2/3standby 14 track FastEthernet2/5standby 14 track FastEthernet2/7standby 14 track FastEthernet2/9standby 14 track FastEthernet2/11standby 14 track Vlan136standby 14 track Vlan137standby 14 track Vlan127standby 14 track Vlan126standby 14 track GigabitEthernet4/1standby 14 track Vlan146standby 14 track Vlan156standby 14 track Vlan157standby 14 track Vlan166standby 14 track Vlan167standby 14 track Vlan147standby 14 track Vlan200!interface Vlan156description secure vlanethernet point-to-pointip vrf forwarding vrf-ha5ip address 156.0.0.2 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA5no mop enabledcrypto map testmap5 ssp 1crypto engine slot 4!interface Vlan157description internal vlan to HA5ip vrf forwarding vrf-ha5ip address 9.0.0.2 255.255.0.0standby 15 ip 9.0.0.5standby 15 preemptstandby 15 name INTERNAL_VLAN_HA5standby 15 track FastEthernet2/2standby 15 track FastEthernet2/3standby 15 track FastEthernet2/5standby 15 track FastEthernet2/7standby 15 track FastEthernet2/9standby 15 track FastEthernet2/11standby 15 track Vlan136standby 15 track Vlan137standby 15 track Vlan127standby 15 track Vlan126standby 15 track GigabitEthernet4/1standby 15 track Vlan146standby 15 track Vlan156standby 15 track Vlan157standby 15 track Vlan166standby 15 track Vlan167standby 15 track Vlan147standby 15 track Vlan200!interface Vlan166description secure vlanethernet point-to-pointip vrf forwarding vrf-ha6ip address 166.0.0.2 255.255.255.0no ip redirectsno ip unreachablesip policy route-map RRQ-HA6no mop enabledcrypto map testmap6 ssp 1crypto engine slot 4!interface Vlan167description internal vlan to HA2ip vrf forwarding vrf-ha6ip address 10.0.0.2 255.255.0.0standby 16 ip 10.0.0.5standby 16 preemptstandby 16 name INTERNAL_VLAN_HA6standby 16 track FastEthernet2/2standby 16 track FastEthernet2/3standby 16 track FastEthernet2/5standby 16 track FastEthernet2/7standby 16 track FastEthernet2/9standby 16 track FastEthernet2/11standby 16 track Vlan136standby 16 track Vlan137standby 16 track Vlan127standby 16 track Vlan126standby 16 track GigabitEthernet4/1standby 16 track Vlan146standby 16 track Vlan156standby 16 track Vlan157standby 16 track Vlan166standby 16 track Vlan167standby 16 track Vlan147standby 16 track Vlan200!interface vlan 200ip address 200.0.0.1 255.0.0.0standby 250 ip 200.0.0.3standby 250 preemptstandby 250 name NON_IPSEC_VLANstandby 250 track FastEthernet2/2standby 250 track FastEthernet2/3standby 250 track FastEthernet2/5standby 250 track FastEthernet2/7standby 250 track FastEthernet2/9standby 250 track FastEthernet2/11standby 250 track Vlan136standby 250 track Vlan137standby 250 track Vlan127standby 250 track Vlan126standby 250 track GigabitEthernet4/1standby 250 track Vlan146standby 250 track Vlan156standby 250 track Vlan157standby 250 track Vlan166standby 250 track Vlan167standby 250 track Vlan147ip route vrf vrf-ha2 92.92.92.0 255.255.255.0 Vlan126 92.92.92.1 globalip route vrf vrf-ha3 92.92.92.0 255.255.255.0 Vlan136 92.92.92.1 globalip route vrf vrf-ha4 92.92.92.0 255.255.255.0 Vlan146 92.92.92.1 globalip route vrf vrf-ha5 92.92.92.0 255.255.255.0 Vlan156 92.92.92.1 globalip route vrf vrf-ha6 92.92.92.0 255.255.255.0 Vlan166 92.92.92.1 global!access-list 121 permit ip host 12.0.0.30 host 92.92.92.1access-list 121 remark Access List for HA2access-list 131 permit ip host 13.0.0.30 host 92.92.92.1access-list 131 remark Access List for HA3access-list 141 permit ip host 14.0.0.30 host 92.92.92.1access-list 141 remark Access List for HA4access-list 151 permit ip host 15.0.0.30 host 92.92.92.1access-list 151 remark Access List for HA5access-list 161 permit ip host 16.0.0.30 host 92.92.92.1access-list 161 remark Access List for HA6access-list 2000 permit udp any any eq mobile-ipaccess-list 2000 permit ipinip any anyaccess-list 2001 permit ip 95.95.95.0 0.0.0.255 host 120.0.0.30access-list 2002 permit ip 96.96.96.0 0.0.0.255 host 130.0.0.30access-list 2003 permit ip 97.97.97.0 0.0.0.255 host 140.0.0.30access-list 2004 permit ip 98.98.98.0 0.0.0.255 host 150.0.0.30access-list 2005 permit ip 99.99.99.0 0.0.0.255 host 160.0.0.30!arp vrf vrf-ha6 10.0.0.10 0000.0c07.ac32 ARPAarp vrf vrf-ha4 8.0.0.10 0000.0c07.ac1e ARPAarp vrf vrf-ha5 9.0.0.10 0000.0c07.ac28 ARPAarp vrf vrf-ha2 6.0.0.10 0000.0c07.ac0a ARPAarp vrf vrf-ha3 7.0.0.10 0000.0c07.ac14 ARPA!route-map RRQ-HA5 permit 10match ip address 2000set ip next-hop 9.0.0.10!route-map RRQ-HA4 permit 10match ip address 2000set ip next-hop 8.0.0.10!route-map RRQ-HA6 permit 10match ip address 2000set ip next-hop 10.0.0.10!route-map RRQ-HA3 permit 10match ip address 2000set ip next-hop 7.0.0.10!route-map RRQ-HA2 permit 10match ip address 2000set ip next-hop 6.0.0.10!route-map RRQ-HA10 permit 10match ip address 2001continue 11set ip next-hop 200.0.0.5!route-map RRQ-HA10 permit 11match ip address 2002continue 12set ip next-hop 200.0.0.15!route-map RRQ-HA10 permit 12match ip address 2003continue 13set ip next-hop 200.0.0.25!route-map RRQ-HA10 permit 13match ip address 2004continue 14set ip next-hop 200.0.0.35!route-map RRQ-HA10 permit 14match ip address 2005set ip next-hop 200.0.0.45HA Configuration - Switch 1:
HA1:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 12.0.0.30 255.255.255.255!interface GigabitEthernet0/0.126encapsulation dot1Q 126ip address 126.0.0.82 255.255.255.0!interface GigabitEthernet0/0.127description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 127ip address 6.0.0.3 255.255.255.0standby 10 ip 6.0.0.10standby 10 preemptstandby 10 name HSRP_HA_HA2standby 10 track GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.4 255.0.0.0no snmp trap link-statusstandby 200 ip 200.0.0.5standby 200 preemptstandby 200 track GigabitEthernet0/0.127!router mobile!ip local pool ha-pool2 10.1.2.1 10.1.2.255ip route 92.92.92.1 255.255.255.255 6.0.0.5ip route 95.95.95.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA2 virtual-network address 12.0.0.30 mode active-standbyip mobile virtual-network 12.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool2 virtual-network 12.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 6.0.0.4 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA2:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 13.0.0.30 255.255.255.255!interface GigabitEthernet0/0.136encapsulation dot1Q 136ip address 136.0.0.83 255.255.255.0!interface GigabitEthernet0/0.137description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 137ip address 7.0.0.3 255.255.255.0standby 20 ip 7.0.0.10standby 20 preemptstandby 20 name HSRP_HA_HA3standby 20 name GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.14 255.0.0.0no snmp trap link-statusstandby 201 ip 200.0.0.15standby 201 preemptstandby 201 track GigabitEthernet0/0.137!router mobile!ip local pool ha-pool3 10.1.3.1 10.1.3.255ip route 92.92.92.1 255.255.255.255 7.0.0.5ip route 96.96.96.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA3 virtual-network address 13.0.0.30 mode active-standbyip mobile virtual-network 13.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool3 virtual-network 13.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 7.0.0.4 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA3:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 14.0.0.30 255.255.255.255!interface GigabitEthernet0/0.146encapsulation dot1Q 146ip address 146.0.0.82 255.255.255.0!interface GigabitEthernet0/0.147description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 147ip address 8.0.0.3 255.255.255.0standby 30 ip 8.0.0.10standby 30 preemptstandby 30 name HSRP_HA_HA4standby 30 name GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.24 255.0.0.0no snmp trap link-statusstandby 202 ip 200.0.0.25standby 202 preemptstandby 202 track GigabitEthernet0/0.147!router mobile!ip local pool ha-pool4 10.1.4.1 10.1.4.255ip route 92.92.92.1 255.255.255.255 8.0.0.5ip route 97.97.97.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA4 virtual-network address 14.0.0.30 mode active-standbyip mobile virtual-network 13.0.0.10 255.255.255.255ip mobile virtual-network 14.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool4 virtual-network 14.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 8.0.0.4 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA4:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 15.0.0.30 255.255.255.255!interface GigabitEthernet0/0.156encapsulation dot1Q 156ip address 156.0.0.82 255.255.255.0!interface GigabitEthernet0/0.157description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 157ip address 9.0.0.3 255.255.255.0standby 40 ip 9.0.0.10standby 40 preemptstandby 40 name HSRP_HA_HA5standby 40 name GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.34 255.0.0.0no snmp trap link-statusstandby 203 ip 200.0.0.35standby 203 preemptstandby 203 track GigabitEthernet0/0.157!router mobile!ip local pool ha-pool5 10.1.5.1 10.1.5.255ip route 92.92.92.1 255.255.255.255 9.0.0.5ip route 98.98.98.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA5 virtual-network address 15.0.0.30 mode active-standbyip mobile virtual-network 15.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool5 virtual-network 15.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 9.0.0.4 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA5:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 16.0.0.30 255.255.255.255!interface GigabitEthernet0/0.166encapsulation dot1Q 166ip address 166.0.0.82 255.255.255.0!interface GigabitEthernet0/0.167description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 167ip address 10.0.0.3 255.255.255.0standby 50 ip 10.0.0.10standby 50 preemptstandby 50 name HSRP_HA_HA6standby 50 GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.44 255.0.0.0no snmp trap link-statusstandby 204 ip 200.0.0.45standby 204 preemptstandby 204 track GigabitEthernet0/0.167!router mobile!ip local pool ha-pool6 10.1.6.1 10.1.6.255ip route 92.92.92.1 255.255.255.255 10.0.0.5ip route 99.99.99.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA6 virtual-network address 16.0.0.30 mode active-standbyip mobile virtual-network 16.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool6 virtual-network 16.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 10.0.0.4 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA Configuration - Switch 2:
HA1:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 12.0.0.30 255.255.255.255!interface GigabitEthernet0/0.126encapsulation dot1Q 126ip address 126.0.0.32 255.255.255.0!interface GigabitEthernet0/0.127description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 127ip address 6.0.0.4 255.255.255.0standby 10 ip 6.0.0.10standby 10 preemptstandby 10 name HSRP_HA_HA2standby 10 GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.6 255.0.0.0no snmp trap link-statusstandby 200 ip 200.0.0.5standby 200 preemptstandby 200 track GigabitEthernet0/0.127!router mobile!ip local pool ha-pool2 10.1.2.1 10.1.2.255ip route 92.92.92.1 255.255.255.255 6.0.0.5ip route 95.95.95.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA2 virtual-network address 12.0.0.30 mode active-standbyip mobile virtual-network 12.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool2 virtual-network 12.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 6.0.0.3 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA2:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 13.0.0.30 255.255.255.255!interface GigabitEthernet0/0.136encapsulation dot1Q 136ip address 136.0.0.33 255.255.255.0!interface GigabitEthernet0/0.137description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 137ip address 7.0.0.4 255.255.255.0standby 20 ip 7.0.0.10standby 20 preemptstandby 20 name HSRP_HA_HA3standby 20 GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.16 255.0.0.0no snmp trap link-statusstandby 201 ip 200.0.0.15standby 201 preemptstandby 201 track GigabitEthernet0/0.137!router mobile!ip local pool ha-pool3 10.1.3.1 10.1.3.255ip route 92.92.92.1 255.255.255.255 7.0.0.5ip route 96.96.96.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA3 virtual-network address 13.0.0.30 mode active-standbyip mobile virtual-network 13.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool3 virtual-network 13.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 7.0.0.3 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA3:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 14.0.0.30 255.255.255.255!interface GigabitEthernet0/0.146encapsulation dot1Q 146ip address 146.0.0.32 255.255.255.0!interface GigabitEthernet0/0.147description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 147ip address 8.0.0.4 255.255.255.0standby 30 ip 8.0.0.10standby 30 preemptstandby 30 name HSRP_HA_HA4standby 30 GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.26 255.0.0.0no snmp trap link-statusstandby 202 ip 200.0.0.25standby 202 preemptstandby 202 track GigabitEthernet0/0.147!router mobile!ip local pool ha-pool4 10.1.4.1 10.1.4.255ip route 92.92.92.1 255.255.255.255 8.0.0.5ip route 97.97.97.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA4 virtual-network address 14.0.0.30 mode active-standbyip mobile virtual-network 14.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool4 virtual-network 14.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 8.0.0.3 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA4:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 15.0.0.30 255.255.255.255!interface GigabitEthernet0/0.156encapsulation dot1Q 156ip address 156.0.0.32 255.255.255.0!interface GigabitEthernet0/0.157description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 157ip address 9.0.0.4 255.255.255.0standby 40 ip 9.0.0.10standby 40 preemptstandby 40 name HSRP_HA_HA5standby 40 GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.36 255.0.0.0no snmp trap link-statusstandby 203 ip 200.0.0.35standby 203 preemptstandby 203 track GigabitEthernet0/0.157!router mobile!ip local pool ha-pool5 10.1.5.1 10.1.5.255ip route 92.92.92.1 255.255.255.255 9.0.0.5ip route 98.98.98.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA5 virtual-network address 15.0.0.30 mode active-standbyip mobile virtual-network 15.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool5 virtual-network 15.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 9.0.0.3 spi 100 key ascii cisco algorithm md5 mode prefix-suffixHA5:
interface Loopback0description Advertised Home Agent Virtual IP Addressip address 16.0.0.30 255.255.255.255!interface GigabitEthernet0/0.166encapsulation dot1Q 166ip address 166.0.0.32 255.255.255.0!interface GigabitEthernet0/0.167description MWAM Processor interface to SUP (Private HSRP VLAN)encapsulation dot1Q 167ip address 10.0.0.4 255.255.255.0standby 50 ip 10.0.0.10standby 50 preemptstandby 50 name HSRP_HA_HA6standby 50 GigabitEthernet0/0.200!interface GigabitEthernet0/0.200description interface for non-ipsec pktsencapsulation dot1Q 200ip address 200.0.0.46 255.0.0.0no snmp trap link-statusstandby 204 ip 200.0.0.45standby 204 preemptstandby 204 track GigabitEthernet0/0.167!router mobile!ip local pool ha-pool6 10.1.6.1 10.1.6.255ip route 92.92.92.1 255.255.255.255 10.0.0.5ip route 98.98.98.0 255.255.255.0 200.0.0.3!ip mobile home-agent unknown-ha acceptip mobile home-agent redundancy HSRP_HA_HA6 virtual-network address 16.0.0.30 mode active-standbyip mobile virtual-network 16.0.0.10 255.255.255.255ip mobile host nai @cisco.com address pool local ha-pool6 virtual-network 16.0.0.10 255.255.255.255ip mobile secure host nai @cisco.com spi 100 key ascii cisco algorithm md5 mode prefix-suffixip mobile secure home-agent 10.0.0.3 spi 100 key ascii cisco algorithm md5 mode prefix-suffix
Posted: Fri Nov 17 00:54:30 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.