|
|
Table Of Contents
Configuring Load Balancing on the Home Agent
Configuring Load Balancing on the Home Agent
This chapter discusses concepts and configuration details regarding Server Load Balancing on the Cisco Mobile Wireless Home Agent.
This chapter includes the following sections:
•
Configuring HA Load Balancing
•
Configuring Server Load Balancing
•
HA-SLB Configuration Examples
HA Server Load Balancing
The HA-Server Load Balancing (HA-SLB) feature is built upon the existing IOS Server Load Balancing (SLB) feature. SLB allows users to represent a group of network servers (a server farm) as a single server instance, balance the traffic to the servers, and limit traffic to individual servers. The single server instance that represents a server farm is referred to as a virtual server. The servers that comprise the server farm are referred to as real servers.
SLB can distribute the traffic to real servers through mechanisms like round robin to real servers. Additionally, it can monitor the health of each real server using the Dynamic Feedback Protocol, choose a server that has the least load, and choose a server that is up and running. Please refer to the following URL for more information on SLB architecture:
http://www.cisco.com/en/US/products/hw/routers/ps341/products_white_paper09186a0080108939.shtml.
The HA-SLB feature is available on the 6500 and 7600 series platforms. This feature allows a set of real Home Agents, each running on an MWAM, to be identified by a single virtual server IP address residing on 6500 and 7600 Supervisor.
PDSN/FAs send an initial registration request for a user to the virtual server IP address. HA-SLB running on the SUP intercepts the packets and forwards the registration request to one of the real Home Agents.
A typical call flow would have the following sequence of events:
Step 1
PDSN/FA forwards a Mobile IP RRQ to virtual server IP address (HA-SLB). If the AAA server returns the HA address to the PDSN/FA, the AAA server must be configured to return the address of virtual server IP address.
Step 2
SLB picks one of the real server/HAs from its serverfarm and it delivers Mobile IP RRQ to this server.
Step 3
The real HA responds to MobileIP RRQ with a Reply, the message is sent from the real HA to the PDSN/FA. The HA-SLB does not intercept this packet. The real HA creates a binding and local tunnel endpoint.
Step 4
The PDSN/FA creates a visitor table entry and local tunnel endpoint, and sends/receives traffic through the tunnel directly from the real HA
Step 5
The PDSN/FA sends a Mobile IP RRQ with lifetime of "0" to the real HA to close the binding.
Note
The packet is not sent to virtual IP address (HA-SLB)
Step 6
The Real HA sends Mobile IP RRP to PDSN/FA. The HA-SLB does not intercept this packet. Real HA closes the binding.
Note
The Mobile IP Messages are not compliant with RFC 2002. But they are compliant to draft-kulkarni-mobile-ip-dynamic-ha-assignment-frmwrk-00.txt.
RRQs destined to the HA/SLB virtual IP address, with an HA address of 0.0.0.0 or 255.255.255.255, are forwarded to the actual HA using a weighted "round-robin," load balancing algorithm. The SLB mechanism supports Dynamic Feedback Protocol (DFP) that gives real servers the ability to communicate real server health to the load balancer, thereby adjusting the weight of the reals server in the load balancing algorithms.
Since the MN can send multiple RRQs before it hears a RRP from the HA (either the MN power cycles after sending an initial RRQ, or it is mis-configured to send multiple initial registrations, or RRPs are dropped by the network), it is important to keep track of registrations coming from the same MN. This avoids the case where the same MN is registered at multiple HAs, and wastes IP addresses and other resources at those HAs. To solve this problem, HA-SLB would parse the RRQ and create a session object indexed by the MNs NAI. This session object will store the real HA IP address where the RRQ was forwarded. Subsequent registrations from the same MN will be forwarded to this same real HA. The session object will be stored for a configurable period of time (default to 10 seconds). If the HA-SLB does not see a RRQ from the MN within this period of time, the session object is cleared. If HA-SLB sees a RRQ, the timer associated with the session object is reset.
A retry counter is associated with each session object, and is incremented for each re-transmitted RRQ seen by the load balancer. If the number of retries is greater than the configured "reassign" threshold, the session sending the retransmissions will be re-assigned to another real HA, and a connection failure is recorded for the original real HA. Real servers are assumed to be down and no more RRQs re-directed to them when enough connection failures are seen to reach a configured threshold. HA-SLB will restart directing sessions to that real server after a configurable time interval or if the real server sends a DFP message to HA-SLB.
Load Balancing in HA-SLB
HA-SLB uses a weighted round-robin load-balancing algorithm. This algorithm specifies that the real server used for a new connection to the virtual server is chosen from the server farm in a circular fashion. Each real server is assigned a weight n, that represents its capacity to handle connections, as compared to the other real servers associated with the virtual server. As an example, assume a server farm comprised of real server ServerA with n = 3, ServerB with n = 1, and ServerC with n = 2. The first three RRQs to the virtual server are assigned to ServerA, the fourth RRQ to ServerB, and the fifth and sixth RRQs to ServerC.
It is possible to configure IOS SLB for either static or dynamic load balancing. Static load balancing is achieved by assigning weights statically to each HA in the server farm. Dynamic load balancing is achieved by configuring Dynamic Feedback Protocol (DFP), with the DFP manager on SLB, and the DFP client on each of the real HAs.
HA-SLB Operating Modes
HA-SLB operates in two modes, Dispatched mode and Direct (NAT server) mode.
In Dispatched mode the virtual server address is known to the HAs. HA-SLB will simply redirect packets to the HAs at the MAC layer. This requires the HAs to be layer 2 adjacent to SLB.
In Direct mode, HA-SLB works in NAT server mode and routes the RRQs to the HAs by changing the destination IP address in the RRQ to that of the real server. As a result the HAs need not be layer 2 adjacent to SLB.
To configure your routers for Mobile IP HA redundancy, perform the required tasks described in the following sections:
•
Configuring HA Load Balancing
•
Configuring Server Load Balancing
Configuring HA Load Balancing
To enable the HA Load Balancing feature, perform these tasks:
Configuring Server Load Balancing
To enable the Mobile IP SLB feature on the HA, perform the following task:
HA-SLB Configuration Examples
The following examples illustrate various HA-SLB configurations, including how to verify details of the configurations.
Dispatched MODE WITH STATIC WEIGHTS
Configuration on SLB:
The following commands configure a serverfarm "HAFARM", and associate two real servers (HAs) with the serverfarm. The real servers are configured with a static weight of one.
ip slb serverfarm HAFARMreal 10.1.1.51weight 1inservice!real 10.1.1.52weight 1inserviceThe following commands configure a virtual server with service as "ipmobile" on the SLB and associates the serverfarm "HAFARM" with the virtual server. Optionally, the idle ipmobile request idle-time-val command configures the duration for which the session object exists.
ip slb vserver MIPSLBvirtual 10.1.1.10 udp 434 service ipmobileserverfarm HAFARMidle ipmobile request 300inserviceConfiguration on HA:
The following command configures the virtual server address as a loopback address on the HA. This configuration is required only for Dispatched mode.
interface Loopback1ip address 10.1.1.10 255.255.255.0The following command sets the source address and HA address field in the RRP to that of the real HA's address. This configuration is required only for Dispatched mode.
ip mobile home-agent dynamic-address 10.1.1.51Show Output on SLB:
The following command displays the status of server farm "HAFARM" and, the associated real servers, and their status. It also shows the number of connections assigned to each of the real servers.
The show output below was captured after opening 4 MIP sessions which HA-SLB has load balanced equally across two real HA's (2 connections to each HA).
SLB-6500#show ip slb realsreal farm name weight state conns-------------------------------------------------------------------20.1.1.51 HAFARM 1 OPERATIONAL 220.1.1.52 HAFARM 1 OPERATIONAL 2The following command displays all the sessions during runtime, or as long as the session objects exist.
SLB-6500#show ip slb sessions ipmobilevserver NAI hash client real state------------------------------------------------------------------------------------------ -MIPSLB A984DF0A00000000 15.1.1.51 20.1.1.52 IPMOBILE_ESTABMIPSLB 1DC0E31400000000 15.1.1.51 20.1.1.52 IPMOBILE_ESTABMIPSLB 2BDEE91100000000 15.1.1.51 20.1.1.51 IPMOBILE_ESTABMIPSLB 47E2FD1B00000000 15.1.1.51 20.1.1.51 IPMOBILE_ESTABSLB-6500#Show Output on HAs:
The following command shows that two bindings each were opened on HA1 and HA2.
HA1-7200#show ip mobile binding summaryMobility Binding List:Total 2HA1-7200#HA2-7200#show ip mobile binding summaryMobility Binding List:Total 2HA2-7200#Dispatched mode with DFP
Configuration on SLB:
The following commands configure a serverfarm "HAFAR"" and associates two real servers (HAs) with the serverfarm.
ip slb serverfarm HAFARMreal 10.1.1.51inservice!real 10.1.1.52inservice!The following commands configure a virtual server with service as "ipmobile" on the SLB, and associates the serverfam HAFARM with the virtual server. The optional idle ipmobile request idle-time-val command configures the duration the session object exists.
ip slb vserver MIPSLBvirtual 10.1.1.10 udp 434 service ipmobileserverfarm HAFARMidle ipmobile request 300inserviceThe following command configures the DFP Manager on HA-SLB and assigns two DFP agents (clients) the HA-SLB can connect to.
ip slb dfpagent 10.1.1.51 500agent 10.1.1.52 500!Configuration on HA:
The following command configures the virtual server address as a loopback address on the HA. This configuration is required for dispatched mode.
interface Loopback1ip address 15.1.1.10 255.255.255.0!The following command configures the DFP agent on the real HA. The port number configured must match the port number specified on the DFP Manager.
ip dfp agent ipmobileport 500inservice!The following command sets the source address and HA address field in the RRP to that of the real HA's address. This configuration is required for dispatched mode.
ip mobile home-agent dynamic-address 10.1.1.51Show Output on SLB:
The following command verifies that the HAs report an initial weight of 25 (default weight) when DFP is configured.
SLB-6500#show ip slb dfp weightsReal IP Address: 10.1.1.51 Protocol: UDP Port: 434 Bind_ID: 65535 Weight: 25Set by Agent 10.1.1.51:500 at 14:59:23 UTC 04/21/03Real IP Address: 10.1.1.52 Protocol: UDP Port: 434 Bind_ID: 65535 Weight: 25Set by Agent 10.1.1.52:500 at 14:59:15 UTC 04/21/03SLB-6500#The following show command displays the status of server farm HAFARM and the associated real servers (and their status). It also shows the number of connections assigned to each of the real servers.
This show output was captured after opening 100 MIP sessions which HA-SLB has load balanced equally across two real HAs (50 connections to each HA).
SLB-6500#show ip slb realsreal farm name weight state conns-------------------------------------------------------------------10.1.1.51 HAFARM 24 OPERATIONAL 5010.1.1.52 HAFARM 24 OPERATIONAL 50SLB-6500#Show output on HAs:
The following command verifies that 50 bindings each were opened on HA1 and HA2
HA1-7200#show ip mobile binding summaryMobility Binding List:Total 50HA1-7200#HA2-7200#show ip mobile binding summaryMobility Binding List:Total 50HA2-7200#Direct Mode With Static Weights
Configuration on SLB:
The following commands configure a serverfarm "HAFARM" and associates two real servers (HAs) with the serverfarm. The real servers are configured with a static weight of one. The command nat server configures HA-SLB in Direct (Nat server) mode of operation.
ip slb serverfarm HAFARMnat serverreal 10.1.1.51weight 1inservice!real 10.1.1.52weight 1inserviceip slb vserver MIPSLBvirtual 10.1.1.10 udp 434 service ipmobileserverfarm HAFARMidle ipmobile request 300inserviceShow Output on SLB:
The following show command displays the status of server farm HAFARM and the associated real servers (and their status). It also shows the number of connections assigned to each of the real servers.
This show output was captured after opening 4 MIP sessions which HA-SLB has load balanced equally across two real HAs (2 connections to each HA).
SLB-6500#show ip slb realsreal farm name weight state conns-------------------------------------------------------------------10.1.1.51 HAFARM 1 OPERATIONAL 210.1.1.52 HAFARM 1 OPERATIONAL 2The following command displays all the sessions during runtime, or as long as the session objects exist.
SLB-6500#show ip slb sessions ipmobilevserver NAI hash client real state-----------------------------------------------------------------------------MIPSLB A984DF0A00000000 15.1.1.51 20.1.1.52 IPMOBILE_ESTABMIPSLB 1DC0E31400000000 15.1.1.51 20.1.1.52 IPMOBILE_ESTABMIPSLB 2BDEE91100000000 15.1.1.51 20.1.1.51 IPMOBILE_ESTABMIPSLB 47E2FD1B00000000 15.1.1.51 20.1.1.51 IPMOBILE_ESTABSLB-6500#Show Output on HAs:
The following command shows that 2 bindings each were opened on HA1 and HA2.
HA1-7200#show ip mobile binding summaryMobility Binding List:Total 2HA1-7200#HA2-7200#show ip mobile binding summaryMobility Binding List:Total 2HA2-7200#The following debug command output shows NAT server mode is operational:
SLB-6500#debug ip slb sessions ipmobileSLB-6500#*Apr 21 15:25:58: %SYS-5-CONFIG_I: Configured from console by console*Apr 21 15:26:03: SLB_SESSION_IPMOBILE: client = 15.1.1.51, NAI: mwts-mip-np-user1@ispxyz.com, length: 28*Apr 21 15:26:03: SLB_SESSION_IPMOBILE: event= IPMOBILE_REQ_REQUEST, state= IPMOBILE_INIT -> IPMOBILE_ESTAB*Apr 21 15:26:03: SLB_SESSION: v_ip= 15.1.1.10:434 ( 7), real= 20.1.1.51, NAT= S*Apr 21 15:26:03: SLB_SESSION: client= 15.1.1.51:434 session_key= 47E2FD1B00000000SLB-6500#Direct Mode with DFP
Configuration on SLB:
The following commands configure a serverfarm "HAFARM", and associate two real servers (HAs) with the serverfarm. The nat server command configures HA-SLB in Direct (Nat server) mode of operation.
ip slb serverfarm HAFARMnat serverreal 10.1.1.51inservice!real 10.1.1.52weight 1inservice!The following commands configure a virtual server with service as "ipmobile" on the SLB, and associates the serverfarm HAFARM with the virtual server. The optional idle ipmobile request idle-time-val command configures the duration the session object exists.
ip slb vserver MIPSLBvirtual 10.1.1.10 udp 434 service ipmobileserverfarm HAFARMidle ipmobile request 300inservice!The following command configures the DFP Manager on HA-SLB and assigns two DFP agents (clients) he HA-SLB can connect to.
ip slb dfpagent 10.1.1.51 500agent 10.1.1.52 500Configuration on HA:
The following command configures the DFP agent on the real HA. Configure the port number to match the port number specified on the DFP Manager.
ip dfp agent ipmobileport 500inservice!Show Output on SLB:
The following command verifies that the HAs report an initial weight of 25 (default weight) when DFP is configured.
SLB-6500#show ip slb dfp weightsReal IP Address: 10.1.1.51 Protocol: UDP Port: 434 Bind_ID: 65535 Weight: 25Set by Agent 10.1.1.51:500 at 14:59:23 UTC 04/21/03Real IP Address: 10.1.1.52 Protocol: UDP Port: 434 Bind_ID: 65535 Weight: 25Set by Agent 10.1.1.52:500 at 14:59:15 UTC 04/21/03SLB-6500#The following show command displays the status of server farm "HAFARM", the associated real servers (and their status). It also shows the number of connections assigned to each of the real servers.
This show output below was captured after opening 100 MIP sessions which HA-SLB has load balanced equally across two real HAs (50 connections to each HA).
SLB-6500#show ip slb realsreal farm name weight state conns-------------------------------------------------------------------10.1.1.51 HAFARM 24 OPERATIONAL 5010.1.1.52 HAFARM 24 OPERATIONAL 50SLB-6500#Show Output on HAs:
The following command shows that 50 bindings each were opened on HA1 and HA2.
HA1-7200#show ip mobile binding summaryMobility Binding List:Total 50HA1-7200#HA2-7200#show ip mobile binding summaryMobility Binding List:Total 50HA2-7200#The following debug when enabled shows NAT server mode is operational:
SLB-6500#debug ip slb sessions ipmobileSLB-6500#*Apr 21 15:47:16: SLB_SESSION_IPMOBILE: client = 10.1.1.51, NAI: mwts-mip-np-user1@ispxyz.com, length: 28*Apr 21 15:47:16: SLB_SESSION_IPMOBILE: event= IPMOBILE_REQ_REQUEST, state= IPMOBILE_INIT -> IPMOBILE_ESTAB*Apr 21 15:47:16: SLB_SESSION: v_ip= 10.1.1.10:434 ( 7), real= 20.1.1.51, NAT= S*Apr 21 15:47:16: SLB_SESSION: client= 10.1.1.51:434 session_key= 47E2FD1B00000000*Apr 21 15:47:16: SLB_SESSION_IPMOBILE: client = 15.1.1.51, NAI: mwts-mip-np-user2@ispxyz.com, length: 28*Apr 21 15:47:16: SLB_SESSION_IPMOBILE: event= IPMOBILE_REQ_REQUEST, state= IPMOBILE_INIT -> IPMOBILE_ESTAB*Apr 21 15:47:16: SLB_SESSION: v_ip= 10.1.1.10:434 ( 7), real= 20.1.1.51, NAT= S*Apr 21 15:47:16: SLB_SESSION: client= 10.1.1.51:434 session_key= 1DC0E31400000000Dispatched Mode of Operation and Crypto Transform Mode is Tunnel
The following command verifies the status of the IPSEC VPN module:
SLB1-6500#show moduleMod Ports Card Type Model Serial No.--- ----- -------------------------------------- ------------------ -----------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 SAD070701KR3 48 SFM-capable 48-port 10/100 Mbps RJ45 WS-X6548-RJ-45 SAL0706CVFQ5 3 MWAM Module WS-SVC-MWAM-1 SAD064201886 2 IPSec VPN Accelerator WS-SVC-IPSEC-1 SAD064902NTMod MAC addresses Hw Fw Sw Status--- ---------------------------------- ------ ------------ ------------ -------1 0001.6416.4ffe to 0001.6416.4fff 4.2 6.1(3) 7.5(0.94) Ok3 0009.11f4.9b60 to 0009.11f4.9b8f 5.2 6.3(1) 7.5(0.94) Ok5 0008.7ca8.17d8 to 0008.7ca8.17df 0.302 7.2(1) 1.0(0.1) Ok6 0002.7ee4.c34e to 0002.7ee4.c351 1.0 7.2(1) 7.5(0.94) OkMod Sub-Module Model Serial Hw Status--- --------------------------- --------------- --------------- ------- -------1 Policy Feature Card 2 WS-F6K-PFC2 SAD07060047 3.3 Ok1 Cat6k MSFC 2 daughterboard WS-F6K-MSFC2 SAD070701FS 2.5 OkMod Online Diag Status--- -------------------1 Pass3 Pass5 Pass6 PassSLB1-6500#Configuration on SLB:
ip slb serverfarm FARM1real 10.99.11.11inservice!real 10.99.11.12inservice!ip slb vserver IPSECSLBvirtual 10.1.1.10 udp 434 service ipmobileserverfarm FARM1inserviceThe following commands configure IPSEC on HA-SLB:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.51!!crypto ipsec transform-set esp-des-sha-transport ah-sha-hmac esp-des!crypto map l2tpmap 10 ipsec-isakmpset peer 10.1.1.51set transform-set esp-des-sha-transportmatch address 101!interface GigabitEthernet6/1 (inside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,15,1002-1005switchport mode trunkcdp enable!interface GigabitEthernet6/2 (outside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,16,1002-1005switchport mode trunkcdp enable!interface FastEthernet3/15no ip addressduplex fullspeed 100crypto connect vlan 15!!interface Vlan15ip address 10.1.1.15 255.0.0.0no ip redirectsno ip unreachablesno mop enabledcrypto map l2tpmap!!access-list 101 permit ip host 10.1.1.10 host 10.1.1.51Configuration on PDSN:
The following commands configure IPSEC on PDSN:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.15!!crypto ipsec transform-set esp-des-sha-transport esp-des esp-sha-hmac!crypto map l2tpmap 10 ipsec-isakmpset peer 10.1.1.15set transform-set esp-des-sha-transportmatch address 101interface FastEthernet1/0ip address 10.1.1.51 255.0.0.0duplex fullcrypto map l2tpmapaccess-list 101 permit ip host 15.1.1.51 host 15.1.1.10Configuration on HA:
interface Loopback1ip address 10.1.1.10 255.0.0.0ip mobile home-agent dynamic-address 10.99.11.11Execute the clear crypto isakmp and clear crypto sa commands on the PDSN and SLB, and open multiple MIP flows.
Show Output on PDSN (FA):
The following command verifies that packets sent out of the PDSN are encrypted:
PDSN-7200#show crypto ipsec sainterface: FastEthernet1/0Crypto map tag: l2tpmap, local addr. 10.1.1.51local ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)current_peer: 10.1.1.15PERMIT, flags={origin_is_acl,}#pkts encaps: 4, #pkts encrypt: 4, #pkts digest 4#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 16, #recv errors 0local crypto endpt.: 10.1.1.51, remote crypto endpt.: 10.1.1.15path mtu 1500, media mtu 1500current outbound spi: FD2E19D2inbound esp sas:spi: 0x2AEF7930(720337200)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2002, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3454)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0xE12F5466(3777975398)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2000, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3454)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0xFD2E19D2(4247656914)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2003, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3454)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0x87E60F74(2280001396)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2001, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3445)replay detection support: Youtbound pcp sas:PDSN-7200#Show Output on SLB:
SLB1-6500#sh ip slb realsreal farm name weight state conns-------------------------------------------------------------------10.99.11.11 FARM1 1 OPERATIONAL 210.99.11.12 FARM1 1 OPERATIONAL 2SLB1-6500#sh ip slb sessions ipmobilevserver NAI hash client real state-----------------------------------------------------------------------------IPSECSLB A984DF0A00000000 10.1.1.51 10.99.11.12 IPMOBILE_ESTABIPSECSLB 1DC0E31400000000 10.1.1.51 10.99.11.12 IPMOBILE_ESTABIPSECSLB 2BDEE91100000000 10.1.1.51 10.99.11.11 IPMOBILE_ESTABIPSECSLB 47E2FD1B00000000 10.1.1.51 10.99.11.11 IPMOBILE_ESTABSLB1-6500#The following command verifies that packets received by the HA-SLB are decrypted:
SLB1-6500#show crypto ipsec sainterface: Vlan15Crypto map tag: l2tpmap, local addr. 15.1.1.15local ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)current_peer: 10.1.1.51PERMIT, flags={origin_is_acl,}#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0#pkts decaps: 4, #pkts decrypt: 4, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 0, #recv errors 0local crypto endpt.: 10.1.1.15, remote crypto endpt.: 10.1.1.51path mtu 1500, media mtu 1500current outbound spi: 2AEF7930inbound esp sas:spi: 0xFD2E19D2(4247656914)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 10999, flow_id: 49, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3488)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0x87E60F74(2280001396)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 10997, flow_id: 49, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3488)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0x2AEF7930(720337200)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 11000, flow_id: 50, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3488)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0xE12F5466(3777975398)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 10998, flow_id: 50, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3488)replay detection support: Youtbound pcp sas:SLB1-6500#Show Output on HAs:
HA1-7200#show ip mobile binding summaryMobility Binding List:Total 2HA1-7200#HA2-7200#show ip mobile binding summaryMobility Binding List:Total 2HA2-7200#Dispatched Mode of Operation and Crypto Transform Mode is Transport
Configuration on SLB:
ip slb serverfarm FARM1real 10.99.11.11inservice!real 10.99.11.12inservice!ip slb vserver IPSECSLBvirtual 10.1.1.10 udp 434 service ipmobileserverfarm FARM1inserviceThe following commands configure IPSEC on HA-SLB:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.51!!crypto ipsec transform-set esp-des-sha-transport ah-sha-hmac esp-desmode transport (The crypto mode is configured as transport )!crypto map l2tpmap 10 ipsec-isakmpset peer 15.1.1.51set transform-set esp-des-sha-transportmatch address 101!interface GigabitEthernet6/1 (inside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,15,1002-1005switchport mode trunkcdp enable!interface GigabitEthernet6/2 (outside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,16,1002-1005switchport mode trunkcdp enable!interface FastEthernet3/15no ip addressduplex fullspeed 100crypto connect vlan 15!!interface Vlan15ip address 10.1.1.15 255.0.0.0no ip redirectsno ip unreachablesno mop enabledcrypto map l2tpmap!!access-list 101 permit ip host 10.1.1.10 host 10.1.1.51Configuration on PDSN:
The following commands configure IPSEC on PDSN:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.15!!crypto ipsec transform-set esp-des-sha-transport esp-des esp-sha-hmacmode transport (The crypto mode is configured as transport )!crypto map l2tpmap 10 ipsec-isakmpset peer 10.1.1.15set transform-set esp-des-sha-transportmatch address 101interface FastEthernet1/0ip address 10.1.1.51 255.0.0.0duplex fullcrypto map l2tpmapaccess-list 101 permit ip host 10.1.1.51 host 10.1.1.10Configuration on HA:
interface Loopback1ip address 10.1.1.10 255.0.0.0ip mobile home-agent dynamic-address 10.99.11.11Execute the clear crypto isakmp and clear crypto sa commands on the PDSN and SLB, and open multiple MIP flows.
Show Output on PDSN :
The following command verifies that packets sent out of the PDSN are encrypted:
PDSN-7200#sh crypto ipsec sainterface: FastEthernet1/0Crypto map tag: l2tpmap, local addr. 10.1.1.51local ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)current_peer: 10.1.1.15PERMIT, flags={origin_is_acl,}#pkts encaps: 4, #pkts encrypt: 4, #pkts digest 4#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 4, #recv errors 0local crypto endpt.: 10.1.1.51, remote crypto endpt.: 10.1.1.15path mtu 1500, media mtu 1500current outbound spi: 9DB2749Cinbound esp sas:spi: 0x29960A54(697698900)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2002, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3536)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0x4CB25D79(1286757753)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2000, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3527)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0x9DB2749C(2645718172)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2003, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3527)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0x3F9BDD27(1067179303)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2001, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3527)replay detection support: Youtbound pcp sas:PDSN-7200#Show Output on SLB:
SLB1-6500#sh ip slb sessions ipmobilevserver NAI hash client real state-----------------------------------------------------------------------------IPSECSLB A984DF0A00000000 10.1.1.51 10.99.11.12 IPMOBILE_ESTABIPSECSLB 1DC0E31400000000 10.1.1.51 10.99.11.12 IPMOBILE_ESTABIPSECSLB 2BDEE91100000000 10.1.1.51 10.99.11.11 IPMOBILE_ESTABIPSECSLB 47E2FD1B00000000 10.1.1.51 10.99.11.11 IPMOBILE_ESTABSLB1-6500#SLB1-6500#sh ip slSLB1-6500#sh ip slb reaSLB1-6500#sh ip slb realsreal farm name weight state conns-------------------------------------------------------------------10.99.11.11 FARM1 1 OPERATIONAL 210.99.11.12 FARM1 1 OPERATIONAL 2SLB1-6500#The following command verifies that packets received by the HA-SLB are decrypted:
SLB1-6500#show crypto ipsec sainterface: Vlan15Crypto map tag: l2tpmap, local addr. 10.1.1.15local ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)current_peer: 10.1.1.51PERMIT, flags={origin_is_acl,}#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0#pkts decaps: 4, #pkts decrypt: 4, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 0, #recv errors 0local crypto endpt.: 15.1.1.15, remote crypto endpt.: 10.1.1.51path mtu 1500, media mtu 1500current outbound spi: 29960A54inbound esp sas:spi: 0x9DB2749C(2645718172)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 11011, flow_id: 55, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3540)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0x3F9BDD27(1067179303)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 11009, flow_id: 55, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3540)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0x29960A54(697698900)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 11012, flow_id: 56, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3540)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0x4CB25D79(1286757753)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 11010, flow_id: 56, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3540)replay detection support: Youtbound pcp sas:SLB1-6500#Show Output on HAs:
HA5-2#sh ip mob binding summaryMobility Binding List:Total 2HA5-3#sh ip mob binding summaryMobility Binding List:Total 2HA5-3#Direct Mode of Operation and Crypto Transform Mode is Tunnel
Configuration on SLB:ip slb serverfarm FARM1nat serverreal 10.99.11.11inservice!real 10.99.11.12inservice!ip slb vserver IPSECSLBvirtual 15.1.1.10 udp 434 service ipmobileserverfarm FARM1inserviceThe following commands configure IPSEC on HA-SLB:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.51!!crypto ipsec transform-set esp-des-sha-transport ah-sha-hmac esp-des!crypto map l2tpmap 10 ipsec-isakmpset peer 10.1.1.51set transform-set esp-des-sha-transportmatch address 101!interface GigabitEthernet6/1 (inside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,15,1002-1005switchport mode trunkcdp enable!interface GigabitEthernet6/2 (outside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,16,1002-1005switchport mode trunkcdp enable!interface FastEthernet3/15no ip addressduplex fullspeed 100crypto connect vlan 15!!interface Vlan15ip address 10.1.1.15 255.0.0.0no ip redirectsno ip unreachablesno mop enabledcrypto map l2tpmap!!access-list 101 permit ip host 10.1.1.10 host 10.1.1.51Configuration on PDSN:
The following commands configure IPSEC on PDSN:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.15!!crypto ipsec transform-set esp-des-sha-transport esp-des esp-sha-hmac!crypto map l2tpmap 10 ipsec-isakmpset peer 10.1.1.15set transform-set esp-des-sha-transportmatch address 101interface FastEthernet1/0ip address 10.1.1.51 255.0.0.0duplex fullcrypto map l2tpmapaccess-list 101 permit ip host 10.1.1.51 host 10.1.1.10Execute clear crypto isakmp and clear crypto sa on the PDSN and SLB. Open multiple MIP flows.
Show Output on PDSN:
The following command verifies that packets sent out of the PDSN are encrypted:
PDSN-7200#show crypto ipsec sainterface: FastEthernet1/0Crypto map tag: l2tpmap, local addr. 10.1.1.51local ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)current_peer: 10.1.1.15PERMIT, flags={origin_is_acl,}#pkts encaps: 4, #pkts encrypt: 4, #pkts digest 4#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 4, #recv errors 0local crypto endpt.: 10.1.1.51, remote crypto endpt.: 10.1.1.15path mtu 1500, media mtu 1500current outbound spi: 1A274E9Dinbound esp sas:spi: 0xD3D5F08B(3554013323)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2002, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3026)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0x7FEE86C3(2146338499)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2000, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3026)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0x1A274E9D(438783645)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2003, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3026)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0x5F9A83(6265475)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2001, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3026)replay detection support: Youtbound pcp sas:PDSN-7200#Show Output on SLB:
The following command verifies that packets received by HA-SLB are decrypted:
SLB1-6500#show crypto ipsec sainterface: Vlan15Crypto map tag: l2tpmap, local addr. 10.1.1.15local ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)current_peer: 15.1.1.51PERMIT, flags={origin_is_acl,}#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0#pkts decaps: 4, #pkts decrypt: 4, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 0, #recv errors 0local crypto endpt.: 15.1.1.15, remote crypto endpt.: 10.1.1.51path mtu 1500, media mtu 1500current outbound spi: D6C550E1inbound esp sas:spi: 0x267FCD46(645909830)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 11027, flow_id: 63, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3581)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0xF779A01E(4151943198)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 11025, flow_id: 63, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3581)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0xD6C550E1(3603255521)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 11028, flow_id: 64, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3581)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0x325BEB84(844884868)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 11026, flow_id: 64, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3581)replay detection support: Youtbound pcp sas:SLB1-6500#show ip slb sessions ipmobilevserver NAI hash client real state-----------------------------------------------------------------------------IPSECSLB A984DF0A00000000 10.1.1.51 10.99.11.12 IPMOBILE_ESTABIPSECSLB 1DC0E31400000000 10.1.1.51 10.99.11.12 IPMOBILE_ESTABIPSECSLB 2BDEE91100000000 10.1.1.51 10.99.11.11 IPMOBILE_ESTABIPSECSLB 47E2FD1B00000000 10.1.1.51 10.99.11.11 IPMOBILE_ESTABSLB1-6500#SLB1-6500#sh ip slbSLB1-6500#sh ip slb reaSLB1-6500#sh ip slb realsreal farm name weight state conns-------------------------------------------------------------------10.99.11.11 FARM1 1 OPERATIONAL 210.99.11.12 FARM1 1 OPERATIONAL 2SLB1-6500Show output on SLB:HA5-2#show ip mob binding summaryMobility Binding List:Total 2HA5-2#HA5-3#show ip mob binding summaryMobility Binding List:Total 2HA5-3#Debug Output on SLB:
The following debug command shows that NAT server mode is operational:
SLB1-6500#debug ip slb sessions ipmobile*Jul 1 05:25:25.513: SLB_SESSION_IPMOBILE: event= IPMOBILE_TIMEOUT, state= IPMOBILE_ESTAB -> IPMOBILE_INIT*Jul 1 05:25:25.513: SLB_SESSION: v_ip= 15.1.1.10:434 ( 7), real= 99.99.11.12, NAT= S*Jul 1 05:25:25.513: SLB_SESSION: client= 15.1.1.51:434 session_key= A984DF0A00000000*Jul 1 05:25:25.513: SLB_SESSION_IPMOBILE: event= IPMOBILE_TIMEOUT, state= IPMOBILE_ESTAB -> IPMOBILE_INIT*Jul 1 05:25:25.513: SLB_SESSION: v_ip= 15.1.1.10:434 ( 7), real= 99.99.11.11, NAT= S*Jul 1 05:25:25.513: SLB_SESSION: client= 15.1.1.51:434 session_key= 2BDEE91100000000*Jul 1 05:25:25.513: SLB_SESSION_IPMOBILE: event= IPMOBILE_TIMEOUT, state= IPMOBILE_ESTAB -> IPMOBILE_INITDirect Mode of Operation and Crypto Transform Mode is Transport
Configuration on SLB:
ip slb serverfarm FARM1nat serverreal 10.99.11.11inservice!real 10.99.11.12inservice!ip slb vserver IPSECSLBvirtual 10.1.1.10 udp 434 service ipmobileserverfarm FARM1inserviceThe following commands configure IPSEC on the HA-SLB:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.51!!crypto ipsec transform-set esp-des-sha-transport ah-sha-hmac esp-desmode transport (The crypto mode is configured as transport )!crypto map l2tpmap 10 ipsec-isakmpset peer 10.1.1.51set transform-set esp-des-sha-transportmatch address 101!interface GigabitEthernet6/1 (inside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,15,1002-1005switchport mode trunkcdp enable!interface GigabitEthernet6/2 (outside port of the IPSEC module)no ip addressswitchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,16,1002-1005switchport mode trunkcdp enable!interface FastEthernet3/15no ip addressduplex fullspeed 100crypto connect vlan 15!!interface Vlan15ip address 15.1.1.15 255.0.0.0no ip redirectsno ip unreachablesno mop enabledcrypto map l2tpmap!!access-list 101 permit ip host 15.1.1.10 host 15.1.1.51Configuration on PDSN:
The following commands configure IPSEC on PDSN:
crypto isakmp policy 1authentication pre-sharecrypto isakmp key cisco address 10.1.1.15!!crypto ipsec transform-set esp-des-sha-transport esp-des esp-sha-hmacmode transport (The crypto mode is configured as transport )!crypto map l2tpmap 10 ipsec-isakmpset peer 10.1.1.15set transform-set esp-des-sha-transportmatch address 101interface FastEthernet1/0ip address 10.1.1.51 255.0.0.0duplex fullcrypto map l2tpmapaccess-list 101 permit ip host 15.1.1.51 host 15.1.1.10Execute clear crypto isakmp and clear crypto sa on the PDSN and SLB. Open multiple MIP flows.
Show Output on PDSN :
The following command verifies that packets sent out of the PDSN are encrypted:
PDSN-7200#show crypto ipsec sainterface: FastEthernet1/0Crypto map tag: l2tpmap, local addr. 10.1.1.51local ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)current_peer: 10.1.1.15PERMIT, flags={origin_is_acl,}#pkts encaps: 4, #pkts encrypt: 4, #pkts digest 4#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 4, #recv errors 0local crypto endpt.: 10.1.1.51, remote crypto endpt.: 10.1.1.15path mtu 1500, media mtu 1500current outbound spi: 6A0EBD82inbound esp sas:spi: 0x13E0E556(333505878)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2002, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3535)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0xEFEEE153(4025409875)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2000, flow_id: 1, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3535)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0x6A0EBD82(1779350914)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 2003, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3535)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0x49BE92A3(1237226147)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 2001, flow_id: 2, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3535)replay detection support: Youtbound pcp sas:PDSN-7200#Show Output on SLB:
SLB1-6500#show ip slb sessions ipmobilevserver NAI hash client real state-----------------------------------------------------------------------------IPSECSLB A984DF0A00000000 10.1.1.51 99.99.11.12 IPMOBILE_ESTABIPSECSLB 1DC0E31400000000 10.1.1.51 99.99.11.12 IPMOBILE_ESTABIPSECSLB 2BDEE91100000000 10.1.1.51 99.99.11.11 IPMOBILE_ESTABIPSECSLB 47E2FD1B00000000 10.1.1.51 99.99.11.11 IPMOBILE_ESTABSLB1-6500#SLB1-6500#sh ip slb reaSLB1-6500#sh ip slb realsreal farm name weight state conns-------------------------------------------------------------------99.99.11.11 FARM1 1 OPERATIONAL 299.99.11.12 FARM1 1 OPERATIONAL 2SLB1-6500#SLB1-6500#The following command verifies that packets received by the HA-SLB are decrypted:
SLB1-6500#show crypto ipsec sainterface: Vlan15Crypto map tag: l2tpmap, local addr. 10.1.1.15local ident (addr/mask/prot/port): (10.1.1.10/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (10.1.1.51/255.255.255.255/0/0)current_peer: 10.1.1.51PERMIT, flags={origin_is_acl,}#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0#pkts decaps: 4, #pkts decrypt: 4, #pkts verify 0#pkts compressed: 0, #pkts decompressed: 0#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0#send errors 0, #recv errors 0local crypto endpt.: 15.1.1.15, remote crypto endpt.: 15.1.1.51path mtu 1500, media mtu 1500current outbound spi: 13E0E556inbound esp sas:spi: 0x6A0EBD82(1779350914)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 11031, flow_id: 65, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3527)IV size: 8 bytesreplay detection support: Yinbound ah sas:spi: 0x49BE92A3(1237226147)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 11029, flow_id: 65, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4607999/3527)replay detection support: Yinbound pcp sas:outbound esp sas:spi: 0x13E0E556(333505878)transform: esp-des ,in use settings ={Tunnel, }slot: 0, conn id: 11032, flow_id: 66, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3527)IV size: 8 bytesreplay detection support: Youtbound ah sas:spi: 0xEFEEE153(4025409875)transform: ah-sha-hmac ,in use settings ={Tunnel, }slot: 0, conn id: 11030, flow_id: 66, crypto map: l2tpmapsa timing: remaining key lifetime (k/sec): (4608000/3524)replay detection support: Youtbound pcp sas:SLB1-6500#Show Output on HA:
HA5-2#show ip mob binding summaryMobility Binding List:Total 2HA5-2#HA5-3#show ip mob binding summaryMobility Binding List:Total 2HA5-3#
Posted: Fri Nov 17 00:53:30 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.