[c-nsp] ip local policy route and tunnels
Joe Maimon
jmaimon at ttec.com
Tue May 30 05:21:20 EDT 2006
Thank you.
Denis V. Schapov wrote:
> Hi,
>
> look at CSCef95982, CSCef66719, CSCds24740 and a lot of others similar ..
>
> CSCef95982: GRE: Cant control which exit interface tunnel packets use
>
> Release Notes
>
> Symptom: GRE tunnel packets are getting dropped.
>
> Condition: When configuring GRE tunnels where there are two output
> interfaces via two different ISPs _and_ packets going out each
> interface must use an address from that interface's subnet as the
> source. You can configure the GRE tunnel to have a tunnel source
> of one of the outbound interfaces, but the GRE packets with this
> tunnel source may go out either interface. The GRE packets going
> out the other interface (wrong source IP address) will get dropped
> by the ISP.
>
> Workaround: You must configure the routing so that the
> tunnel destination address is only
> routed via the correct interface. You cannot use Policy Based
> Routing (PBR). This workaround may hamper configuring primary/backup
> redundancy types of configurations.
>
> ----
> Denis V. Schapov
> JSC "DSI"
> Irkutsk, Russia
> dschapov at dsi.ru
> +7 3952 510506
>
>
>
> ----- Original Message -----
> From: "Joe Maimon" <jmaimon at ttec.com>
> To: <cisco-nsp at puck.nether.net>
> Sent: Wednesday, May 24, 2006 9:15 AM
> Subject: [c-nsp] ip local policy route and tunnels
>
>
>
>>Anyone see any issues trying to run gre and or ipsec tunnels on a router
>>through different interfaces by using local policy routing?
>>
>>I can get the tunnels up and ipsec sa are established, but tunnel
>>packets encapsulating payload traffic do not appear to be properly
>>policy routed.
>>
>>In the past I have worked around this, but it is starting to get annoying.
>>
>>(yes I have a tac case open)
>>
>>Here is an example
>>
>>crypto keyring spokes
>> pre-shared-key address 64.xx.xx.212 key <key>
>>!
>>crypto isakmp policy 1
>> hash md5
>> authentication pre-share
>>!
>>crypto isakmp policy 2
>> encr 3des
>> hash md5
>> authentication pre-share
>> group 2
>>!
>>crypto isakmp policy 3
>> encr 3des
>> authentication pre-share
>> group 2
>>
>>!
>>crypto ipsec transform-set stdenc.set ah-md5-hmac esp-3des esp-md5-hmac
>> mode transport
>>crypto ipsec transform-set stdenc.noah.set esp-3des esp-md5-hmac
>> mode transport
>>!
>>crypto ipsec profile encrypted-inet-links
>> set security-association lifetime seconds 120
>> set transform-set stdenc.noah.set stdenc.set
>> set pfs group2
>>!
>>!
>>interface Tunnel0
>> ip address 10.10.36.2 255.255.255.252
>> ip nat inside
>> ip virtual-reassembly
>> keepalive 10 3
>> tunnel source Dialer1
>> tunnel destination 64.xx.xx.212
>>!
>>interface Tunnel1
>> ip address 10.10.37.1 255.255.255.0
>> no ip redirects
>> ip mtu 1400
>> ip nat inside
>> ip nhrp authentication ulthef
>> ip nhrp map multicast dynamic
>> ip nhrp map multicast 64.xx.xx.212
>> ip nhrp map 10.10.37.2 64.xx.xx.212
>> ip nhrp map multicast 67.yy.yy.198
>> ip nhrp network-id 16770544
>> ip nhrp nhs 10.10.37.2
>> ip virtual-reassembly
>> ip tcp adjust-mss 1360
>> no ip split-horizon eigrp 4535
>> delay 1000
>> keepalive 10 3
>> tunnel source Serial0/2/0
>> tunnel mode gre multipoint
>> tunnel key 16770544
>> tunnel path-mtu-discovery
>> tunnel protection ipsec profile encrypted-inet-links
>>!
>>interface Serial0/2/0
>> ip address 67.yy.yy.198 255.255.255.252
>> no ip redirects
>> ip nat outside
>> ip virtual-reassembly
>> no ip mroute-cache
>> service-module t1 timeslots 1-12
>>!
>>interface Dialer1
>> ip address negotiated
>> ip nat outside
>> ip virtual-reassembly
>> encapsulation ppp
>> ip tcp adjust-mss 1452
>> dialer pool 1
>> dialer-group 1
>> no cdp enable
>> ppp authentication pap callin
>> ppp chap hostname user at domain
>> ppp chap password apassword
>> ppp pap sent-username user at domain password apassword
>>!
>>ip local policy route-map local-policy-route
>>ip route 0.0.0.0 0.0.0.0 67.yy.yy.197
>>!
>>ip access-list extended pyyyy-exit
>> permit ip host 67.yy.yy.198 host 64.xx.xx.212
>>!
>>ip access-list extended chl-exit
>> !this is the static ip bound to the Dialer1 interface by the ISP
>> permit ip host 64.xx.xx.44 any
>>!
>>route-map local-policy-route permit 20
>> match ip address pyyyy-exit
>> set interface Serial0/2/0
>> set ip next-hop 67.yy.yy.197
>>!
>>route-map local-policy-route permit 30
>> match ip address cxxxx-exit
>> set interface Dialer1
>> set ip next-hop 69.xx.xx.226
>>!
>>route-map local-policy-route permit 200
>>
>>
>>_______________________________________________
>>cisco-nsp mailing list cisco-nsp at puck.nether.net
>>https://puck.nether.net/mailman/listinfo/cisco-nsp
>>archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>>
>
>
>
More information about the cisco-nsp
mailing list