For more details on other types of virtual interfaces, see the "Configuring Virtual Interfaces" module. have a global scope and do not have an associated location. Router A has Ethernet interface 0/0 configured as the source for tunnel interface 0 with an IPv4 address of 10.0.0.1 and an IPv6 prefix of 2001:0DB8:1111:2222::1/64. Router(config-if)# tunnel destination 10.5.5.5. session without exiting or committing the configuration changes. So let's configure the Network Interfaces on Router R1. In 12.0(23)S, this feature was introduced. Use the ip-address and mask arguments to specify the IP address and mask for the interface. When IPSec is used, there is no need to use Secure Shell (SSH) or Secure Socket Layer (SSL). Configuring AAA Services on CiscoIOS (Optional) Enables Path MTU Discovery (PMTUD) on a GRE or IP-in-IP tunnel interface. Specifies the tunnel source IP address or Configuration details and examples are provided for the tunnel types that use physical or virtual interfaces. The traffic destined for the MN is forwarded in a triangular manner. RFC2784 also covers the use of GRE with IPv4 as the transport protocol and the passenger protocol. GRE keepalive packets may be sent from both sides of a tunnel or from just one side. For more information, see the "Configuring IP Tunnels" section on page 7-4. . If a packet that enters the tunnel encounters a link with a smaller MTU, the packet is dropped and an ICMP message is sent back to the sender of the packet. What is IPsec IPsec is a standard based security architecture for IP hence IP-sec. . This task explains how to configure a 6to4 overlay tunnel. and dynamic profiles. The following section provides information about this feature: The following command was introduced by this feature: keepalive (tunnel interfaces). IPSec is a good choice for a user who has multiple applications that require Substitute the sample IP addresses, hostnames, and other parameters for the appropriate values on the second router. Note PMTUD on a tunnel interface requires that the tunnel endpoint be able to receive ICMP messages generated by routers in the path of the tunnel. Cisco IOS software supports GRE as the carrier protocol with many combinations of passenger and transport protocols. Specifies the destination NSAP address of the CTunnel, where the packets exit the tunnel. <> ISATAP is designed for transporting IPv6 packets within a site where a native IPv6 infrastructure is not yet available; for example, when sparse IPv6 hosts are deployed for testing. CLNS Support for GRE Tunneling of IPv4 and IPv6 Packets in CLNS Networks. ipv6 route ipv6-prefix/prefix-length tunnel tunnel-number, Router(config)# ipv6 route 2002::/16 tunnel 0. Simple point-to-point tunnels that can be used within a site or between sites. XRSoftware Optional steps can be performed to customize the tunnel. Window StuffingClear-text TCP and SCTP traffic can benefit from the RBSCP window stuffing feature. Configuring a PC as a PPPoA Client Using L3 SSG/SSD. 2. show rbscp [all | state | statistics] [tunnel tunnel-number], Step2 show rbscp [all | state | statistics] [tunnel tunnel-number]. Figure2 illustrates IP tunneling terminology and concepts. Step 4. The host or router at each end of a configured tunnel must support both the IPv4 and IPv6 protocol stacks. Router, interface The most noticeable difference is the explicit specification of the tunnel destination. Table7 lists the features in this module and provides links to specific configuration information. IPSec peers set up a secure tunnel and encrypt the packets that traverse the tunnel to the remote peer. In some cases the retransmission can be completed by RBSCP without inserting the delay. The default CTunnel mode continues to use the standard Cisco encapsulation, which will tunnel only IPv4 packets. The tunnel destination is automatically determined by the IPv4 address in the low-order 32 bits of an IPv4-compatible IPv6 address. command, you must be in a user group associated with a task group that includes Long RTT keeps TCP in a slow start mode, which increases the time before the satellite link bandwidth is fully used. Option A: NAT configuration. Security includes confidentiality, message integrity, and authentication. Router(config-if)# ctunnel destination 49.0001.2222.2222.2222.00. R2 (config)# interface Tunnel 1 R2 (config-if)# ip address 50.50.50.2 255.255.255. You must be in a user group associated with a task group that includes the proper task IDs. Router(config-if)# ipv6 address 2001:0DB8:6301::/64 eui-64, Router(config-if)# no ipv6 nd suppress-ra. Creates a virtual interface to transport IP over a CLNS tunnel and enters interface configuration mode. 172.16.1.2 R2 (config)# ip route 192.168.1. The use of IPv6 as a carrier protocol is described in RFC 2473, Generic Packet Tunneling in IPv6 Specification. The configurations of Router A and Router B follow Figure11. Configuration Example Configuring a GRE tunnel involves creating a tunnel interface and defining the tunnel source and destination. This module describes the various types of tunneling techniques available using Cisco IOS software. like bandwidth shaping and QoS The router always performs PMTUD processing on the original data IP packets that enter the tunnel. Router B has Ethernet interface 0/0 configured as the source for tunnel interface 1 with an IPv4 address of 10.0.0.2 and an IPv6 prefix of 2001:0DB8:1111:2222::2/64. The following example configures an IPv4-compatible IPv6 tunnel that allows BGP to run between a number of routers without having to configure a mesh of manual tunnels. Note The interface number must be unique for each CTunnel interface. CEF-switching over mGRE tunnels enables CEF switching of IP traffic to and from multipoint GRE tunnels. Entry into the IPSec tunnel Each VRF table comprises an IP routing table, a derived Cisco Express Forwarding (CEF) table, and guidelines and routing protocol parameters that control the information that is included in the routing table. Only features that were introduced or modified in CiscoIOS Releases12.2(1) or 12.0(3)S or later appear in the table. Reporting dropped packets to SCTP provides better bandwidth use because RBSCP tells the SCTP implementation at the end hosts to retransmit the dropped packets and this prevents the end hosts from assuming that the network is congested. As with existing GRE tunnels, the tunnel becomes . As with other tunnel mechanisms, appropriate entries in a Domain Name System (DNS) that map between hostnames and IP addresses for both IPv4 and IPv6 allow the applications to choose the required address. Perform this task to configure an IP over CLNS tunnel (CTunnel). First of all, we need to configure the Network Interfaces on both of the Routers. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Note that Ethernet interface 0/1 is the tunnel source for Router A and the tunnel destination for Router B. A Block Serial Tunnel (BSTUN) enables support for devices using the Bisync data-link protocol. This SCTP drop reporting is on by default and provides a chance to retransmit the packet without affecting the congestion window size. The host or router at each end of a configured tunnel must support both the IPv4 and IPv6 protocol stacks. Two peers that try to establish a security association must each have at least one crypto profile entry that is compatible interfaces. As customers deploy ADSL, they must support PPP-style authentication and authorization over a large installed base of legacy bridging customer premises equipment (CPE). The GRE protocol field is why it is desirable that you tunnel IS-IS and IPv6 inside GRE. There are three necessary steps in configuring a tunnel interface: Specify the tunnel interface interface tunnel-ipsecidentifier. Use the gre ipv6 keywords to specify that GRE encapsulation over IPv6 will be used. In this example the configuration shapes the tunnel interface to an overall output rate of 500kbps. This IPv4 network could be the global Internet or a corporate backbone. IPv6 commands: complete command syntax, command mode, defaults, command history, usage guidelines, and examples, Cisco IOS IPv6 Command Reference, Release 12.4, Cisco IOS IPv6 Configuration Library, Release 12.4, QoS policing and generic traffic shaping configuration, "Policing and Shaping Overview" module in the Cisco IOS Quality of Service Solutions Configuration Guide, Release 12.4, Cisco IOS Quality of Service Solutions Configuration Guide, Release 12.4, "Configuring Virtual Interfaces" module in the Cisco IOS Interface and Hardware Component Configuration Guide, Release 12.4, Configuration example for GRE over IP Security (IPSec) where the GRE/IPSec tunnel is going through a firewall doing Network Address Translation (NAT), "Configuring Multiprotocol Label Switching" chapter of the Cisco IOS Switching Services Configuration Guide, Release12.3. Implementing Tunnels. Not required. Because supported tunnels are point-to-point links, you must configure a You can specify the rate at which keepalives will be sent and the number of times that a device will continue to send keepalive packets without a response before the interface becomes inactive. identifier. p^S{/rZ~NzIUa"jx?v'rm1dGX=1\#Zt3rR#_.jt
bQFL7JF1o@EV=u 7/l-yHb_} }|\L[ (g(%e|wB3A!@t;."q(=
*/ &l*$; v 'mqy]L;pZ*4\%6u'@yp-ytt; Previously, only process switching was available for multipoint GRE tunnels. This feature was introduced on the Any packets received that specify the use of these features will be dropped. 2. show interfaces tunnel number [accounting]. Using Cisco Express Forwarding (CEF), MPLS can efficiently enable the delivery of IP services over an ATM switched network. New devices and business practices, such as PDAs and the next-generation of data-ready cellular phones and services, are driving interest in the ability of a user to roam while maintaining network connectivity. show crypto ipsec sa - Shows the settings, number of encaps and decaps, local and remote proxy identities, and Security Parameter Indexes (SPIs) (inbound and outbound) used by current Security Associations (SAs). cancel leaves the router in the current configuration The following tasks are required for creating endobj Use the ipv6ip keyword to specify that IPv6 will be used as the passenger protocol and IPv4 as both the carrier (encapsulation) and transport protocol. For example, AWS provides sample configuration files for different platforms (see this URL). The tunnel endpoints, tunnel source, and tunnel destination must be defined, and the type of tunnel must be selected. All devices on a physical medium must have the same protocol MTU in order to operate. in different IPSec modes. the following criteria: They must contain compatible crypto access lists. - Entering depending on their parent interface. user group associated with a task group that includes the proper task IDs for R1 (config)# ip route 192.168.2. The implementation of this feature does not include support for GRE services defined in header fields, such as those used to specify checksums, keys, or sequencing. ASA(config)# tunnel-group 2.2.2.2 type ipsec-l2l ASA(config)# tunnel-group 2.2.2.2 ipsec-attributes ASA(config)# ikev1 pre-shared-key {psk} Apply the crypto map to your outside interface. Table2 Suggested Usage of Tunnel Types to Carry IPv6 Packets over an IPv4 Network. Previously, Generic Routing Encapsulation (GRE) IP tunnels required the IP tunnel destination to be in the global routing table. This task describes how to configure an ISATAP overlay tunnel. The router IPSec protocol suite provides a set of standards that are used to provide privacy, integrity, For example: Crypto profile sets must be configured and applied to tunnel interfaces (or to the crypto IPSec transport). Use the kbps argument to set the bandwidth, in kilobits per second (kbps). The following example shows how to use policy-based routing to route some specific protocol types through the tunnel. These are all point-to-multipoint tunneling types. route, interface RP A VRF table stores routing data for each VPN. The IPv4 destination address is calculated, on a per-packet basis, from the IPv6 destination. In order to configure the IKEv1 preshared key, enter the tunnel-group ipsec-attributes configuration mode: tunnel-group 172.17.1.1 type ipsec-l2l tunnel-group 172.17.1.1 ipsec-attributes ikev1 pre-shared-key cisco123 Multipoint tunnels use the Next Hop Resolution Protocol (NHRP) in the same way that a Frame Relay multipoint interface uses information obtained by the reverse ARP mechanism to learn the Layer 3 addresses of the remote data-link connection identifiers (DLCIs). The different carrier protocols can be grouped according to the OSI layer model. The destination IPv6 address of the tunnel is specified directly. Table6 shows how to determine the appropriate keyword to use with the tunnel mode command. To avoid recursive routing problems, keep the control-plane routing separate from the tunnel routing using the following methods: Use a different autonomous system number or tag. profiles, For additional information, refer to these documents: GRE over IPSEC Sending of IPv6 router advertisements is disabled by default on tunnel interfaces. Not required. and, in the event of a We will apply configuration from the Cisco IOS sample . Specifies the IPv6 address assigned to the interface and enables IPv6 processing on the interface. In Cisco IOS Release 12.2(8)T and later releases, CEF-switching over mGRE tunnels was introduced. To control the type of traffic that uses the RBSCP tunnel, you must configure the appropriate routing. Enter your password if prompted. The FA receives the packet from the HA and forwards it locally to the MN. Cisco now recommends that you use a different IPv6 tunneling technique named ISATAP tunnels. Ensure that the physical interface to be used as the tunnel source in this task is up and configured with the appropriate IP address. Building configuration. Configures a static route for the IPv6 6to4 prefix 2002::/16 to the specified tunnel interface. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Feature Information for Implementing Tunnels" section. Even the weather affects satellite links, causing a decrease in available bandwidth and an increase in RTT and packet loss. Note The tunnel mode gre ipv6 command specifies GRE as the encapsulation protocol for the tunnel. Figure12 illustrates the creation of a CTunnel between Router A and Router B, as accomplished in the configuration examples that follow. For more details about UDLR tunneling, see Cisco IOS IP Multicast Configuration Guide, Release 12.4. When an interface becomes congested and packets start to queue, you can apply a queueing method to packets that are waiting to be transmitted. Subinterfaces can be physical or virtual, Router(config-if)# ip address 10.0.0.1 255.255.255.0. This module describes the various types of tunneling techniques available using Cisco IOS software. Tunnel packets can, however, be classified before tunneling and encryption can occur by using the QoS preclassify feature on the tunnel interface or on the crypto map. Configurable MTU is not supported on Single-pass GRE interface, but supported on 2-pass GRE interface. The ToS byte values and Time-to-Live (TTL) hop-count value can be set in the encapsulating IP header of tunnel packets for an IP tunnel interface on a router. The Tunnel ToS feature is supported for Cisco Express Forwarding (CEF), fast switching, and process switching. Note To prevent routing flaps, remember to configure the tunnel interface as passive if dynamic routing protocols are used. . Assigns the crypto profile name to be If you choose to configure both of these tunnel types on the same router, we strongly recommend that they not share the same tunnel source. For detailed information on configuring the Configure the VPN to use its peer IP as its identifier instead of your ASA's hostname. Point-to-multipoint tunnels that can be used to connect systems within a site. IPSec is an optional feature on the router. (Optional) Enables an ID key for a tunnel interface. The IPv6 prefix is subnetted into 2002:c0a8:6301::/64 for the tunnel interface: 2002:c0a8:6301:1::/64 for the first IPv6 network and 2002:c0a8:6301:2::/64 for the second IPv6 network.