Featured Article
Latest Post

Friday 22 November 2013

Router as a Remote VPN Server using SDM Configuration

In this section, to provide you with the information to configure easy VPN server feature, allowing end users, you can use IPsec to communicate with any of the Cisco IOS ® VPN gateway.

Note: use the command lookup tool (for registered customers only) for more information about the commands used in this section.

Network Diagram:

This document uses this network setup:


Configuration Procedure:

Complete these steps in order to configure the Cisco router using SDM to a remote VPN server.

Select configuration >VPN> easy VPN server from home easy VPN Server Wizard window and then click Start.


Easy configuration of the VPN server must be enabled on the router before you begin AAA level. Click Yes to continue with the configuration.

'AAA displayed in the window has been enabled on the router successfully ' message. Click OK to start the easy VPN server configuration.


Click Next to start the Easy VPN Server Wizard.


Select the interface on which the client connections terminate and the authentication type.


Click next to configure the Internet key exchange (IKE) policy and use the Add button to create a new policy.

Configuration on both sides of the tunnel must match. However, the Cisco VPN client will automatically select the correct configuration for themselves. Therefore, no need any IKE configuration on the client PC.


Click next to select the default conversion settings or add new conversion settings for encryption and authentication algorithm specified. In this case, use the default set of conversions.


Click next to create a new authentication, authorization, and accounting (AAA) authorization network group policy list to find the network list is used to group or select an existing authorization.


Very easy to configure user authentication on the VPN server.

You can store more information on user authentication, such as a RADIUS server or native database located on an external server, or both. AAA login authentication method list is used to determine in which to search for the order in which user authentication for more information.


This window allows you to add, edit, clone, or delete user group policies on the local database.


Enter the tunnel group name name. Provides a pre-shared key for authentication information.

Creates a new pool or choose an existing pool used to assign IP addresses to VPN clients.


This window shows a summary of the actions you have taken. If you believe that your configuration, click Finish.


After completion, you can edit and modify the changes in the configuration, if needed.



Configure Asynchronous Transfer Mode (ATM)

 ATM's structures are mostly from the X.25 and frame relay, but the objective is to run at a higher speed. However, with different frame relay is for 7,000 and 7,500 series routers specifically designed to work with ATM network adapter. It is also possible to configure an ATM using a serial interface (Federal information/HSSI) or serial interface (4000) NMP. This configuration details, please refer to the configuration guide, chapter 7th.

Configure the ATM interfaces specified at the beginning of the interface IP address (as shown earlier in this document). Frame relay ATM needs on the part of every host on the same subnet. Next configure the Pvc. There are two parts. First create a PVC "maps" on the interface. Second Protocol address images to each create a PVC. Pvc is described by the virtual circuit (VCD) is assigned to the given virtual path identifier (VPI) and virtual circuit identifier (VCI) is created. With a frame relay Dlci, for a given link, VCI assigned by the carrier. Creates a PVC on the General form of a given interface is the command

atm pvc <vcd> <vpi> <vci> <aal-encapsulation> [[<midlow> <midhigh>]
    [<peak> <avg> <burst> [oam <seconds>]]


VCD is specific to the router and use a router to match VPI/VCI and determines VPI and VCI numbers are different. It is also needs to be specified for ATM datagram encapsulated in the VCI. This is the ATM adaptation layer (AAL). Peak and average values used to specify where the PVC will be allowed connection bandwidth. When these values are ignored, and are assumed to be the highest possible connection rate.

Next, you need an image on an interface to create a protocol for each PVC. This is achieved by creating a list of maps. Each entry in this list have "<protocol> <address> ATM-VC <vcd> [radio]" where the IP or IPX protocol, or for example, AppleTalk. The address is on the Protocol address of the remote router is transmitting through a virtual connection.

Once the map is created, it needs to be associated with a given ATM interface, use the interface command "map-group < map names >

An example configuration might look as follows

 interface ATM1/0
 ip address 1.2.3.4 255.255.255.224
 ipx network 121
 atm pvc 32 0 3 aal5snap
 atm pvc 33 0 4 aal5snap
 map-group atm-map-1

 map-list atm-map-1
 ip 1.2.3.5 atm-vc 3 broadcast
 ipx 121.0000.0c7e.a45.546 atm-vc 4


Two principles AAL package suitable for use with data. First, as has already been shown is aal5snap. This package allows multiprotocol routing on a virtual circuit. Second package AAL5MUX. This encapsulation, a single agreement are committed to a virtual circuit. It has slightly less overhead than AAL5SNAP and may be useful, when you are connected to the network set up each datagram use fees.

The current default for the Cisco IOS is AAL5SNAP. However, earlier versions of operating software AAL5NLPID specified as the default. Turntable is somewhat similar to run ATM over a serial interface (the HSSI) in an external ATM DSU is necessary often using multi-protocol encapsulation of the snap. This package is popular in exchange points such as Ameritech's NAP (AADS).

Add IP Routes and Set a Default Route


Obviously, the Internet is not being around a router. Normally, go to another system will need to be at least one other router (probably more). It could be in a single interface can have more than one network. Cisco Routing order form

ip route <network> <mask> <interface/next-hop> [metric]

 Add a route for 202.123.100.0 (class C) through 204.203.12.1.

  ip route 202.123.100.0 255.255.255.0 204.203.12.1

Add 122.250.0.0 (class B) to ethernet0

  ip route 122.250.0.0 255.255.0.0 Ethernet0











Classless Inter-Domain Routing.
 

With the recent explosive growth of the Internet, addresses are divided into classes a, b, c, and d networks are no longer enough. Cisco IOS support Classless Inter-domain routing, or CIDR entries (often clearly "Apple juice") allows a subset of any type for the given network, given the destination routing concepts. For example, the following example specifies that the router will route 8 the Chief Secretary.

ip route 221.243.242.0 255.255.248.0 128.230.3.1

Please note changes from the above examples are just different screen. This command uses the subnet mask-style split in early August by 221.243.250.0 class c network, and lists as a next hop router 128.230.3.1. Under normal circumstances, 8 routes will be needed to complete this one did. CIDR routing when the objective is to simplify and reduce Internet routing tables (such as Sprint, ANS and Alternet) reaches the point where the old backbone network by just does not have enough memory to accommodate the Internet tables folded they did not work to prevent the entire routing table size. This Internet service interruption caused severe damage around the world.

Often use a practice of subnetting class c network into 64 or 32 IP address blocks for customers all 254 addresses are required to save wasting large numbers. Traditional class c subnetting allows you to be split into blocks of 4, 8, 16, 32, 64, and 128, but only one size. Cisco IOS supports variable-length subnetting, however. This subparagraph allows a class c, which may have some part 4 addresses the length, some on 32, and so on. That allows to eliminate only going to use 6-bit customers sent 32 addresses the need to more effectively address.

Subnet be noted IOS does not generally allow you to specify a class c subnet mask addresses (IP, you cannot route 8 address 203.102.123.0 subnet because this is a class c network number, it wants to be regarded as class c, route). When you view the routing table, this can cause some confusion. To work around this problem, Cisco provides a command to override this behavior:

  ip subnet-zero
Once that has been entered, it will very happily take the subnet route.
 

Configuring the CIP Card and the Virtual Interfaces

CIP cards appear on the router as a controller rather than a standard interface. T1 duct may define, modify, or delete without any external configuration card. CSU cycle may boot and run from the software release and test patterns in these loops from the router. Full management advantages are well known to anyone who has any time at all to perform network operations technician jobs. Reported power outages to the carrier's ability to quickly determine when CSU State, trying to quickly fix and get a complete diagnosis issues and valuable. During the initial report can provide them with more information that often can greatly speed up, diagnose and repair process.

T3 controller, because it is built on a VIP2 technologies introduced into the third level is specified. Rather than simply slot/Port, it does not introduce an adapter port number. Because only one CT3IP per card, ports and port adapter number is always zero. In slot 2 of the interface will be identified as 2/0/0. T1 duct after (number by 28 to tie belcore specify 1) interface identifier is designated by a colon and a channel number. In the preceding example, the 17th T1 channel.
 
The interface configuration of the T3 is the first step. T3 framework, clock source and cable distances (this is used to determine) the settings that you want. Default is 224 feet cable length. This should be acceptable for most applications. Our website supports frame type cbit and the m23. It is possible to configure the router automatically detects frame but in many cases, automatic may cause problems in the future so it is best to use this only if you're not sure is using frames. Once you have determined the framework, it can then set up a static router configuration.

For most of the muxed T3s, frame type the m23. For example, used in clear channel T3 ATM networks, cbit.
 
  controller t3 0/0/0
  framing m23
  clock source line
  cablelength 224
 
Once you have configured T3,T1 pipes may be assigned. T1 duct needs to be configured to use Foundation, framing and coding is in use, speed of DS0s on the T1 slot number (56 k or 64 k), and T1 clock source.
 
controller t3 0/0/0
  t1 1 timeslots 1-24 speed 64
  t1 1 clock source line
  t1 1 framing esf
  t1 1 linecone b8zs
 
Once you have configured the T3,T1 tube may be assigned. T1 tube needs to be configured to use Foundation, framing and coding is in use, the T1 slot number of DS0s (56 k or 64 k) and T1 speed of the clock source.
 
After the T1 configuration, the router will create a virtual serial interface. Until the T1 has been created and determined in the same manner as described above, this interface does not appear. For example, for refference first T1 serial interface, it will be identified as serial 0/0/0:1. This interface can be used as any other serial interface beconfigured.

Levels starting from the interface loopback test. T3 also may be back from the controller configuration cycles. It is important to note the configuration from the controller could not possibly ring T1.
 
 interface Serial0/0/0:1
  loopback network

The loop is removed by specifying "no loopback network" in the interface configuration.  

Cisco Switches Interface Cards

Several cards with Cisco, 4,000, 7,000, 7,500 series routers are used together. 2,500 series is a fixed configuration. This section describes only the cards and 7,000 series routers.

First Federal fast serial interface processor (information). Federal information is available with 4 or 8 serial ports. The connection that is used to synchronize data, such as a T1 wide area network (Wan).

Ethernet interface processor (EIP) cards contain 2, 4 or 6 of 10 Gigabit Ethernet AUI connector type and is used to connect the router to the local area network (LAN) low speed.

Fast Ethernet interface processor (FEIP) card includes two RJ45 modular connector for 100baseT connection.

ATM interface processor (AIP) card is used for asynchronous transfer mode (ATM) connections. There are several varieties of debit cards. Most commonly used is the DS3 interface has two BNC coaxial connectors (one for the transfer), and another for accepting. This interface runs on 45 Mbps. In our Phoenix, pop music, we installed fiber optic fiber optic connection to the LightStream 100 (which are basically ATM exchangers), SONET adapter card. This connect action with OC3c speed (155 Mbps).

There are several cards, 4,000, 7,200, series and Cisco routers are used together. 2,500 series is a fixed configuration. This section describes only the cards and 7,000 series routers.

First Federal fast serial interface processor (information). Federal information is available in 4 or 8 serial ports. Used to synchronize data connection, such as T1 (Wan) in a wide area network.

Ethernet interface processor (EIP) cards contain 2, 4 or 6 of 10 Gigabit Ethernet AUI connector type and is used to connect the router to the local area network (LAN) low speed.

Fast Ethernet interface processor (FEIP) card includes two RJ45 modular connector for 100baseT connection.

ATM (AIP) card interface processor for asynchronous transfer mode (ATM) connections. There are several varieties of debit cards. Most commonly used is the DS3 interface has two BNC coaxial connectors (one for the transfer), and another for accepting. This interface runs on 45 Mbps. In our Phoenix, pop music, we installed fiber optic fiber optic connection to the LightStream 100 (which are basically ATM exchangers), SONET adapter card. This connect action with OC3c speed (155 Mbps).

How to Configure IPSEC Encryption with Site to Site VPN Tunneling

OSPF dynamic routing protocol today is probably the most popular LAN routing protocol. OSPF can scale to the largest of the local area network, but can also start out small. While the configuration of OSPF can be a complex, the basic configuration is not difficult. Let us learn how to configure OSPF in the Cisco IOS.

What is an IPSEC VPN?

IPSec (IP Security) provide a method to authenticate and encrypt IP traffic, if your network transport. By doing this, that traffic can keep a safe transit. Network traffic tunnels through another network, it creates a VPN (virtual private network). In our example, we use IPSec encrypted VPN tunnels.

A site to site VPN a VPN tunnel is the only tunnel is, typically, permanently attached, to another network (usually via Internet) connecting two networks. Cisco IOS routers can be used to create the site to site VPN tunnel using IPSec. You can connect a Cisco IOS router to another router, Cisco PIX, Cisco ASA or other brands of router/firewall. You should be aware of IPSEC/FW version of Cisco IOS performs the required VPN (encrypted) command is shown below.

Our Sample IPSec VPN Configuration in the Cisco IOS:

Here is a sample Cisco IOS site to site VPN configuration using IPSEC for encryption:

interface E0/0


IP address 192.168.1.254 255.255.255.0

interface Fa3/0

IP address 2.2.2.2 255.255.255.0

crypto isakmp policy 1


encryption 3des

authentication pre-share

crypto isakmp key secretpassword address 1.1.1.1

crypto ipsec transform-set mytransformset esp-3des esp-md5-hmac

access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255

crypto map Cryptomap1 10 ipsec-isakmp

set peer 1.1.1.1

set transform-set mytransformset

match address 101

Our Sample IPSec VPN Configuration in the Cisco IOS - Explained:

Let us start from the configuration at the top of, go on.

1. encryption policy-defines the ISAKMP security settings between these two peers. In our example, we set the policy, IPSEC (3DES encryption) and pre-shared authentication settings.

2. encryption key-uses to form the IPSec VPN router between the pre-shared key

Formation of 3.Ipsec-lets you set the transform set IPSec VPN IPSec encryption between the two routers is set

4.-ACL of the list is very important, because it defines what traffic is unencrypted between the two routers. If the traffic is not allowed in the ACL, that traffic is not encrypted.

5. create encryption-encrypted map-this map is what brings the policy, key, and access the transform-set list all together. Encrypted map that you define name, and then using that name, the crypto map is applied to an interface.

6.-you will note that the crypto map command to the crypto map Fa3/0 interface {cryptomap1} statement. This is the last statement should be added to the configuration. This is the actual location of the VPN tunnel. This application can make tunnels. Please note how to encrypt a map has a name (which we named "Cryptomap1"). Encrypted maps can have a lot of line numbers. Notice the "10" above, we are configured to display encrypted map 10. From there, you can add a line to 20,30, and so on.

When the router is started, VPN is down. In an encrypted tunnel was first formed during the datagram matches the ACL.

This router is connected to, on the other side of the tunnel, the router has to have the same settings, except for IP addresses will be reversed.

Also, don't forget to allow you to access a list or a firewall, access your router from the Internet to the following.

Access list 150 permit UDP any EQ host 1.1.1.1 ISAKMP

Any access list 150 ESP host 1.1.1.1

You can use to display encrypted with the encrypt command to view your map.

How to Configure BGP Router Protocol

It is the border Gateway Protocol (BGP) is a distance vector protocol family. However, unlike most viewed routing protocols BGP is different and the path of autonomous systems (ass). Also widely defined as a set of routers under a common management. For example, Primenet is MCI is another, AT &amp; T the third, and so on. These asses have their own AS numbers, BGP is used in the Exchange. Number of Primenet (ASN) as 3549, MCI is 3,561 and so forth.

Router BGP by setting up a peer sessions pair with continuous function. Compared to the other important advantage of TCP that BGP sends update messages and maintain the use of peer to peer sessions. As a result, these sessions are not link health directly to the integrity of the concept of adjacent router but also proposes additional measures. If the router is inaccessible or unresponsive, watching the sessions is reduced, the course received the link will be removed from the BGP table and then inform other routers.

Cette perte de la connexion en raison de la défaillance ou de panne de courant peut provoquer des routeurs et transmission au cours d'une session de lien ou simplement entraîner BGP informations datagrammes ignorés les problèmes de congestion. L'explosion de l'Internet au cours des années, expérience de changements d'état des routeur BGP/EGP voisin deviennent encore plus problématique. Ceci est habituellement causée par plusieurs fois pour redémarrer le routeur ou liaisons intermittentes. Récemment, la cause de ce problème est que le routeur est le message de mise à jour d'overwhelemd ne conserve pas de sessions par les pairs. Mots inventé pour décrire cette annonces dupliquées et Itinéraire supprimé est "flap itinéraire" tête-bashing "routeur. Par conséquent, ces messages avec les routeurs voisins (et très probablement en aval de routeurs deux ou trois liens) overwhelemd recalcule le chemin et passer tout son temps. L'effet est que le service de routeur est dégradé jusqu'au retour de la stabilité. Il peut même cause le routeur commence « volets », aussi bien que plus récents que ce routeur est capable de gérer, créer des pannes en cascade. Travail considérable de recherche et de développement menée par les nombreuses entreprises avec routeur production zèle peut gérer ces mises à jour et nombreux fournisseurs de services à élaborer des politiques visant à réduire pour réduire les volets ou de se protéger contre le rabat « retenue », dans un intervalle de lambeau de peau répétées de la taille de la table de routage pour la route.Border Gateway Protocol (BGP) is a distance vector protocol family. However, unlike most routing protocols, BGP view is different and the path of autonomous systems (ass). As broadly defined as a collection of routers under a common management. For example, Primenet is the MCI is another, AT&T the third, and so on. These asses have their own AS numbers, BGP used in the Exchange. Primenet's number (ASN) as 3549,MCI is 3,561, and so on.

Router BGP capability by setting up a peer to peer sessions with continuous. Compared to other important advantage of TCP protocol BGP sends update messages and maintain the use of peer to peer sessions. Therefore, these sessions are not health link directly to the integrity of the adjacent router concept but also offers additional measures. If the router is inaccessible or has stopped responding, watching sessions will be reduced, the course received the link will be removed from the BGP table and subsequently inform other routers.

This loss of connection due to failure or loss of power can cause routers and transmission over a link session or simply result in BGP information datagrams discarded congestion problems. The explosion of the Internet in the past years, experience of the router BGP/EGP neighbor state changes become even more problematic. This is usually caused by several times to restart the router or intermittent links. Recently, the cause of this problem is the router is overwhelemd update message does not maintain peer sessions. Words coined to describe this duplicate ads and deleted route is "route flap" head-bashing "router. Consequently, these messages with neighboring routers (and quite probably downstream routers two or three links) overwhelemd recalculates the path and spending all of his time. The effect of this is the router service is degraded until stability returns. It may even cause the router begins "flap", as well as newer than this router is able to handle, create cascading failures. Considerable research and development work being done by the many companies with zeal production router can handle these updates and many service providers to develop policies to reduce to reduce flaps or protect themselves from the flap "restraint" in a given interval of repeated skin flap of the size of the routing table for the route.

BGP route contains only a few pieces of information. First is that the network describes the route. Second, as the path needed to reach the destination. Third, the origin of the route (or EBGP external BGP, internal BGP IBGP, another or IGP Interior Gateway Protocol, or is incomplete.) IV, adverts on the router ID of the router and finally, BGP next-hop address.

BGP provides a simple, yet effective method of cycle detection. Simply put, the route was learned AS the router check the path as a number. If this number show up anywhere in the path, a route becomes unavailable, it will be discarded.

There are also several weights and to assist directly in the process of selecting metrics associated with BGP routing. Fucked for the first time called "weight", as only by routers, set it to use. This weight is not propegated to other routers. The second is "local prefference" value. This is belonging to the separate save propegated to all router our website support is the last value of "metric" or "exit Descriminator" (MED). Pill signed to EBGP neighbors and was used to suggest the best route to AS. Eastern Mediterranean is reset route readvertized to third.

BGP direct selection process is straight forward.

  • If you are unable to access the next hop is not considering it
  • More BGP administrative weight are considered first
  • If your router has the same weight, taking into account the higher the priority routes with local
  • If the route has the same local preferences, preferred from the local router's routing
  • If there is no route origin, prefer a short autonomous system paths
  • If all the paths have the same autonomous system path length, prefer minimal source code (IGP<EGP< is not complete)
  • If the source code is the same for all paths out of the same autonomous system, more like multi exit discriminator (MED) minimum hop paths. Missing metric is considered zero
  • If the medicine is the same preferred outside path through internal
  • If the IGP synchronization is disabled, only the internal path still prefer the path of the nearest neighbor.
  • Like route IP address with the lowest BGP router ID value
BGP configuration begins by creating a BGP process and listing the router's local ASN. Next, neighbors are listed with their ASNs. A router with the same ASN is identified as an iBGP peer and those with differing ASNs are eBGP peers. The following configuration establishes a BGP process with ASN 3549 and creates an iBGP session with router 1.2.3.4 and an eBGP session to router 2.3.4.5 with AS number 380. 

   router bgp 3549
   neighbor 1.2.3.4 remote-as 3549
   neighbor 2.3.4.5 remote-as 380


Network 1.0.0.0

Class a network 1.0.0.0 in iBGP routing tables, and become qualified eBGP peer, with source code, "IGP" ads. Under normal circumstances, this is the results of the other protocols into BGP redistribution of information learned by IGP redistribution among these network-related loss and can lead to routing loops preferred method of advertising BGP network.

Popular Posts

Powered by Blogger.