43
Application Note 54 Configuring Dynamic Multipoint VPN (DMVPN) using GRE over IPSec between Cisco routers and Digi TransPort Tech Support 17 June 2014

An 54 DMVPN Cisco Transport

Embed Size (px)

DESCRIPTION

ok

Citation preview

Page 1: An 54 DMVPN Cisco Transport

Application Note 54 Configuring Dynamic Multipoint VPN (DMVPN)

using GRE over IPSec between Cisco routers and Digi TransPort

Tech Support

17 June 2014

Page 2: An 54 DMVPN Cisco Transport

Contents

1 Introduction .......................................................................................................................................... 4

1.1 Outline........................................................................................................................................... 4

1.2 Assumptions .................................................................................................................................. 4

1.3 Corrections .................................................................................................................................... 4

2 Version .................................................................................................................................................. 4

3 Scenario ................................................................................................................................................. 5

4 Cisco Configuration sv9-2...................................................................................................................... 6

4.1 Configure the Ethernet interfaces, Console port and hostname .................................................. 6

4.2 Configure IPSec phase 1 parameters and pre-shared key ............................................................ 7

4.3 Configure IPSec phase 2 parameters ............................................................................................ 8

4.4 Configure the Tunnel 0 interface .................................................................................................. 9

4.5 Add a route to the remote Digi TransPort LAN subnet via Tunnel 0 .......................................... 10

4.6 Exit global config mode and save the configuration ................................................................... 11

5 Cisco Configuration sv9-3.................................................................................................................... 12

5.1 Configure the Ethernet interfaces, Console port and hostname ................................................ 12

5.2 Configure IPSec phase 1 parameters and pre-shared key .......................................................... 13

5.3 Configure IPSec phase 2 parameters .......................................................................................... 14

5.4 Configure the Tunnel 0 interface ................................................................................................ 15

5.5 Add a route to the remote Digi TransPort LAN subnet via Tunnel 0 .......................................... 16

5.6 Exit global config mode and save the configuration ................................................................... 17

6 Digi TransPort WR44 configuration .................................................................................................... 17

6.1 Configure the Ethernet interfaces .............................................................................................. 17

6.1.1 Ethernet 0 – The WAN interface ......................................................................................... 17

6.1.2 Ethernet 1 – The LAN interface ........................................................................................... 18

6.2 Configure the default route ........................................................................................................ 20

6.3 Configure IPSec phase 1 parameters .......................................................................................... 21

6.4 Configure the Pre-shared key ..................................................................................................... 21

6.5 Configure IPSec phase 2 parameters .......................................................................................... 23

6.5.1 Configure IP Protocols to be used in the tunnel ................................................................. 25

click Apply ........................................................................................................................................... 25

Page 3: An 54 DMVPN Cisco Transport

6.6 Configure the GRE tunnel ........................................................................................................... 25

6.7 Save the configuration ................................................................................................................ 28

7 confirm ipsec & gre is up and ping test the connection ..................................................................... 29

7.1 Using the Digi WR44 ................................................................................................................... 29

7.1.1 Check the IPSec SA status ................................................................................................... 29

7.1.2 Check the GRE tunnel status ............................................................................................... 29

7.1.3 Ping the LAN interface of the Primary Cisco (sv9-2) or the Spoke (sv9-3) .......................... 29

7.2 Using the Primary Cisco 2621 (sv9-2) ......................................................................................... 30

7.2.1 Check the IPSec SA status ................................................................................................... 30

7.2.2 Check the GRE tunnel status ............................................................................................... 31

7.2.3 Ping the Spoke Cisco (sv9-3) ............................................................................................... 31

8 Firmware versions ............................................................................................................................... 32

8.1 Digi TransPort WR44 ................................................................................................................... 32

8.1.1 Cisco 2621 (Primary and Spoke) ......................................................................................... 33

9 Configuration files ............................................................................................................................... 35

9.1 Digi TransPort WR44 ................................................................................................................... 35

9.2 Cisco 2621 Primary (sv9-2) .......................................................................................................... 37

9.3 Cisco 2621 Spoke (sv9-3) ............................................................................................................ 40

Figures

Figure 1-1: Overview Diagram ...................................................................................................................... 5

Page 4: An 54 DMVPN Cisco Transport

Page | 4

1 INTRODUCTION

1.1 Outline

This document describes how to configure a Dynamic Multipoint VPN (DMVPN) using a GRE tunnel

within an IPSec tunnel and Next Hop Resolution Protocol (NHRP). This allows multipoint secure

communications between two Cisco routers and a Digi TransPort with dynamic discovery of tunnel

endpoints.

1.2 Assumptions

This guide has been written for use by technically competent personnel with a good understanding of

the communications technologies used in the product and of the requirements for their specific

application. It also assumes a basic ability to access and navigate a Digi TransPort router and configure it

with basic routing functions.

This application note applies only to:

Model: Digi TransPort WR44

Other Compatible Models: Digi TransPort VC7400 VPN Concentrator, WR, SR or DR.

Firmware versions: 5.162 or newer. Cisco 12.4 or newer

Configuration: This Application Note assumes the devices are set to their factory default configurations.

Most configuration commands are only shown if they differ from the factory default.

Please note: This application note has been specifically rewritten for firmware release 5.212 and later; earlier versions of firmware will not work. Please contact [email protected] if your require assistance in upgrading the firmware of the TransPort router.

1.3 Corrections

Requests for corrections or amendments to this application note are welcome and should be addressed

to: [email protected]

Requests for new application notes can be sent to the same address.

2 VERSION

Version Number Status

1.0 Published

1.1 Updates

Page 5: An 54 DMVPN Cisco Transport

Page | 5

3 SCENARIO

For the purposes of this application note, the following scenario will be used:

Internet

Cisco 2621

sv9-2

Transport WR44

sv9-4

Cisco 2621

sv9-3

GRE Tunnel

Eth1

3.3.3.3/24

Fa0/1

2.2.2.2/24

Fa0/1

1.1.1.1/24

Fa0/0

10.1.51.92/24

Fa0/0

10.1.51.93/24

Eth0

10.1.100.211/24

Tun0

192.168.1.1/24

Tun0

192.168.1.2/24

Tunnel 0

192.168.1.3/24

Primary

Spoke

Figure 1-1: Overview Diagram

The IP addressing used is as follows: IPSec parameters:

Digi WR44

WAN = Eth0 = 10.1.100.211/24

LAN = Eth1 = 3.3.3.3/24

GRE = Tunnel 0 = 192.168.1.3/24

Cisco 2621 sv9-2

WAN = Fa0/0 = 10.1.51.92/24

LAN = Fa0/1 = 1.1.1.1/24

GRE = Tun0 = 192.168.1.1/24

Cisco 2621 sv9-3

WAN = Fa0/0 = 10.1.51.92/24

LAN = Fa0/1 = 1.1.1.1/24

GRE = Tun0 = 192.168.1.1/24

IPSec Type: Main mode Phase 1 Encryption algorithm: DES Hash algorithm: Message Digest 5 (MD5) Authentication method: Pre-Shared Key Diffie-Hellman group: #1 (768 bit) Lifetime: 86400 seconds, no volume limit Pre-shared key: cisco123 Phase 2 Encryption algorithm: 3DES Hash algorithm: Secure Hash Standard (SHA1) Mode: Tunnel mode DH group: No PFS

Lifetime: 3600 seconds, no volume limit

Page 6: An 54 DMVPN Cisco Transport

Page | 6

4 CISCO CONFIGURATION SV9-2

4.1 Configure the Ethernet interfaces, Console port and hostname

From the Cisco console port, configure the Ethernet interfaces with the addressing shown in Section 2.

Set the Console port exec-timeout and the hostname

The relevant Cisco config from “sh run” should be:

hostname sv9-2

interface FastEthernet0/0

ip address 10.1.51.92 255.255.0.0

speed 100

full-duplex

no shut

interface FastEthernet0/1

ip address 1.1.1.1 255.255.255.0

speed 100

full-duplex

no shut

line con 0

exec-timeout 3000 0

Page 7: An 54 DMVPN Cisco Transport

Page | 7

4.2 Configure IPSec phase 1 parameters and pre-shared key

Create an ISAKMP policy and give it is priority 10

Set DES encryption, the authentication mode as pre-shared keys, DH group is left as default (1)

The relevant Cisco config from “sh run” should be:

crypto isakmp policy 10

hash md5

authentication pre-share

crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0

The phase 1 policy can be confirmed:

Page 8: An 54 DMVPN Cisco Transport

Page | 8

4.3 Configure IPSec phase 2 parameters

Create a transform set and enable 3DES & SHA1 Create an IPSec profile named cisco Link the transform set T1 to the IPSec profile cisco

The relevant Cisco config from “sh run” should be:

crypto ipsec transform-set strong esp-3des esp-md5-hmac

!

crypto ipsec profile cisco

set security-association lifetime seconds 1200

set transform-set strong

The phase 2 transform set can be confirmed:

Page 9: An 54 DMVPN Cisco Transport

Page | 9

4.4 Configure the Tunnel 0 interface

Create tunnel0

Set the IP address

Set nhrp authentication key to cisco123

Set nhrp multicast route discovery to dynamic

Set nhrp network id to 1

Set nhrp holdtime to 600

Tunnel0 source interface will be Fa0/0 (WAN)

Tunnel0 mode is GRE multipoint

Tunnel0 will use the IPSec profile cisco

EIGRP protocol will be used between Cisco’s for automatic route discovery. As this is not supported in

the Digi TransPort, in this example static routes to the Digi TransPort will be used in each Cisco spoke

and in the Digi TransPort itself. It is possible to use other protocols such as OSPF or BGP.

The relevant Cisco config from “sh run” should be:

interface Tunnel0

ip address 192.168.1.1 255.255.255.0

no ip redirects

ip mtu 1440

no ip next-hop-self eigrp 90

ip nhrp authentication cisco123

ip nhrp map multicast dynamic

ip nhrp network-id 1

ip nhrp holdtime 600

no ip split-horizon eigrp 90

Page 10: An 54 DMVPN Cisco Transport

Page | 10

tunnel source FastEthernet0/0

tunnel mode gre multipoint

tunnel key 0

tunnel protection ipsec profile cisco shared

!

!

router eigrp 90

network 1.1.1.0 0.0.0.255

network 192.168.1.0

no auto-summary

!

ip forward-protocol nd

ip route 0.0.0.0 0.0.0.0 10.1.2.100 254

ip route 3.3.3.0 255.255.255.0 Tunnel0 192.168.1.3

!

Confirm the mode of the tunnel is GRE/IP multipoint

If the tunnel is showing anything other than multi-GRE/IP, use the following command to set the tunnel

mode correctly :

interface Tunnel0

tunnel mode gre multipoint

4.5 Add a route to the remote Digi TransPort LAN subnet via Tunnel 0

ip route 3.3.3.0 255.255.255.0 Tunnel0 192.168.1.3

Page 11: An 54 DMVPN Cisco Transport

Page | 11

4.6 Exit global config mode and save the configuration

Page 12: An 54 DMVPN Cisco Transport

Page | 12

5 CISCO CONFIGURATION SV9-3

5.1 Configure the Ethernet interfaces, Console port and hostname

From the Cisco console port, configure the Ethernet interfaces with the addressing shown in Section 2.

Set the Console port exec-timeout and the hostname

The relevant Cisco config from “sh run” should be:

hostname sv9-3

interface FastEthernet0/0

ip address 10.1.51.93 255.255.0.0

speed 100

full-duplex

no shut

interface FastEthernet0/1

ip address 2.2.2.2 255.255.255.0

speed 100

full-duplex

no shut

line con 0

exec-timeout 3000 0

Page 13: An 54 DMVPN Cisco Transport

Page | 13

5.2 Configure IPSec phase 1 parameters and pre-shared key

Create an ISAKMP policy and give it is priority 10

Set DES encryption, the authentication mode as pre-shared keys, DH group is left as default (1)

The relevant Cisco config from “sh run” should be:

crypto isakmp policy 10

hash md5

authentication pre-share

crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0

The phase 1 policy can be confirmed:

Page 14: An 54 DMVPN Cisco Transport

Page | 14

5.3 Configure IPSec phase 2 parameters

Create a transform set and enable 3DES & SHA1 Create an IPSec profile named cisco Link the transform set T1 to the IPSec profile cisco

The relevant Cisco config from “sh run” should be:

crypto ipsec transform-set strong esp-3des esp-md5-hmac

!

crypto ipsec profile cisco

set security-association lifetime seconds 1200

set transform-set strong

The phase 2 transform set can be confirmed:

Page 15: An 54 DMVPN Cisco Transport

Page | 15

5.4 Configure the Tunnel 0 interface

Create tunnel0

Set the IP address

Set nhrp authentication key to cisco123

Set nhrp multicast route discovery to dynamic

Set nhrp network id to 1

Set nhrp holdtime to 600

Tunnel0 source interface will be Fa0/0 (WAN)

Tunnel0 mode is GRE multipoint

Tunnel0 will use the IPSec profile cisco

EIGRP protocol will be used between Cisco’s for automatic route discovery. As this is not supported in

the Digi TransPort, in this example static routes to the Digi TransPort will be used in each Cisco spoke

and in the Digi TransPort itself. It is possible to use other protocols such as OSPF or BGP.

The relevant Cisco config from “sh run” should be:

interface Tunnel0

ip address 192.168.1.2 255.255.255.0

no ip redirects

ip mtu 1440

ip nhrp authentication cisco123

Page 16: An 54 DMVPN Cisco Transport

Page | 16

ip nhrp map multicast dynamic

ip nhrp map 192.168.1.1 10.1.51.92

ip nhrp map multicast 10.1.51.92

ip nhrp network-id 1

ip nhrp holdtime 600

ip nhrp nhs 192.168.1.1

tunnel source FastEthernet0/0

tunnel mode gre multipoint

tunnel key 0

tunnel protection ipsec profile cisco shared

!

!

router eigrp 90

network 2.2.2.0 0.0.0.255

network 192.168.1.0

no auto-summary

!

ip forward-protocol nd

ip route 0.0.0.0 0.0.0.0 10.1.2.100 254

ip route 3.3.3.0 255.255.255.0 Tunnel0

!

Confirm the mode of the tunnel is GRE/IP multipoint

If the tunnel is showing anything other than multi-GRE/IP, use the following command to set the tunnel

mode correctly:

interface Tunnel0

tunnel mode gre multipoint

5.5 Add a route to the remote Digi TransPort LAN subnet via Tunnel 0

ip route 3.3.3.0 255.255.255.0 Tunnel0 192.168.1.3

Page 17: An 54 DMVPN Cisco Transport

Page | 17

5.6 Exit global config mode and save the configuration

6 DIGI TRANSPORT WR44 CONFIGURATION

6.1 Configure the Ethernet interfaces

6.1.1 Ethernet 0 – The WAN interface

Browse to Configuration – Network > Interfaces > Ethernet > ETH0

Set the Description, IP address & Mask.

Click Advanced and enable NAT & IPSec.

Configuration – Network > Interfaces > Ethernet > ETH0 > Advanced

Page 18: An 54 DMVPN Cisco Transport

Page | 18

Parameter Setting Description

Description WAN Friendly name for this interface

IP address 10.100.1.211 IP address

Mask 255.255.255.0 Subnet mask

Enable NAT on this interface Ticked and IP address selected Enables NAT on this interface

Enable IPSec on this interface Ticked Enables IPSec on this interface

6.1.2 Ethernet 1 – The LAN interface

Browse to Configuration – Network > Interfaces > Ethernet > ETH1

Set the Description, IP address. NAT and IPSec should remain disabled.

Page 19: An 54 DMVPN Cisco Transport

Page | 19

Parameter Setting Description

Description INTERNAL Friendly name for this interface

IP address 3.3.3.3 IP address

Mask 255.255.255.0 Subnet mask

Page 20: An 54 DMVPN Cisco Transport

Page | 20

6.2 Configure the default route

Browse to Configuration – Network > IP Routing/Forwarding > Static Routes > Routes 0-9 > Route 0

Set the Description, Destination Network, IP address, Mask, Interface, Metric and exit interface.

Parameter Setting Description

Description Route via ETH0 Friendly name for this interface

Destination Network 1.1.1.1 Destination’s IP network router

Mask 255.255.255.255 Subnet Mask

Interface Tunnel 0 Interface to be used to reach destination network

Metric 1 Metric for the interface

Page 21: An 54 DMVPN Cisco Transport

Page | 21

6.3 Configure IPSec phase 1 parameters

Browse to Configuration – Network > Virtual Private Networking (VPN) > IPsec > IKE > IKE 0

These parameters must match the Cisco phase 1 parameters.

Parameter Setting Description

Encryption DES Use DES encryption

Authentication MD5 Use MD5 authentication

MODP Group for Phase 1 1 (768) Use DH group 1

MODP Group for Phase 2 No PFS No DH group for phase 2

Renegotiate after 8 Phase 1 lifetime in hours

6.4 Configure the Pre-shared key

Browse to the next available unused User in the user table. In this example, this is User 2. The name is the IP address of the IPSec peer. This is what will be sent from the Cisco for its authentication. The Password is the Pre-shared key. Access level should be set to None, so if anyone knows these credentials, they cannot access the router for configuration or management. Browse to Configuration - Security > Users > User 0 - 9 > User 2

Page 22: An 54 DMVPN Cisco Transport

Page | 22

Parameter Setting Description

Username * Blank username

Password cisco123 Pre-shared key

Confirm Password cisco123 Pre-shared key

Access Level None No access to router management for this user

Page 23: An 54 DMVPN Cisco Transport

Page | 23

6.5 Configure IPSec phase 2 parameters

Browse to Configuration – Network > Virtual Private Networking (VPN) > IPsec > IPsec Tunnels > IPsec

0

These parameters must match the Cisco phase 2 parameters

Parameter Setting Description

Description DMVPN Friendly name for this tunnel

Remote unit IP/hostname 10.1.51.92 The IP address or hostname of the remote

unit

Local LAN Use These setting for the

local LAN Use the specified settings below

Page 24: An 54 DMVPN Cisco Transport

Page | 24

IP Address 10.100.1.211 Local IPSec endpoint (WR44 WAN address)

Mask 255.255.255.255 Local IPSec endpoint mask (Must be/32)

Remote LAN Use These setting for the

remote LAN Use the specified settings below

IP Address 10.1.51.92 Remote IPSec endpoint (Cisco sv9-2 WAN

address)

Mask 255.255.255.255 Remote IPSec endpoint mask (Must be /32)

Use the following security on

this tunnel Preshared Keys

Use Preshared keys for authentication

between routers

Our ID 10.100.1.211 Local router IPSec ID (WR44 WAN address)

Our ID type IPv4 Address Type of Ids used. IPv4 addresses

Remote ID 10.1.51.92 IPSec peer ID (Cisco sv9-2 WAN address)

Use X encryption on this

tunnel 3DES Use 3DES encryption

Use X authentication on this

tunnel MD5 Use MD5 authentication

Bring this tunnel up On demand Create SAs, but only if there is a valid route

and interface to create the IPSec tunnel on.

If the tunnel is down and a

packet is ready to be sent Bring the tunnel up

If there is no IPSec SA, use IKE to create

one.

Renew the tunnel after 1hrs/4608000 Kbytes Lifetime of phase 2 SA in seconds /

Lifetime of phase 2 SA in kilobytes

Page 25: An 54 DMVPN Cisco Transport

Page | 25

6.5.1 Configure IP Protocols to be used in the tunnel

Browse to Configuration – Network > Virtual Private Networking (VPN) > IPsec > IPsec Tunnels > IPsec

0 > Advanced

Select GRE under “Allow IP protocol(s) in this tunnel

click Apply

6.6 Configure the GRE tunnel

This is the Digi TransPort end of the point to multipoint GRE tunnel.

Configure the tunnel IP address, and source and destination. Note that the source and destination

addresses are the WAN interface addresses of the primary Cisco router (sv9-2).

Browse to Configuration - Network > Interfaces > GRE > Tunnel 0

Page 26: An 54 DMVPN Cisco Transport

Page | 26

Parameter Setting Description

Description GRE to DMVPN Friendly name for this interface

IP address 192.168.1.3 GRE local endpoint ip address

Mask 255.255.255.252 GRE local endpoint subnet mask

Source IP Address Use IP Address /

10.100.1.211

Source IP address of this tunnel (WR44

WAN interface)

Destination IP Address of Hostname 10.1.51.92 Destination IP address of this tunnel

(Cisco sv9-2 WAN interface)

Enable keepalives on this GRE tunnel Ticked Sends 1 keepalive every 3 seconds

Bring this GRE tunnel down after no

replies to x keepalives 3 If 3 keepalives packets fail, the tunnel is

marked as down

Bring this GRE tunnel up to send

keepalives Ticked Tunnel will be brought up to send

keepalives packets

Browse to Configuration - Network > Interfaces > GRE > Tunnel 0 > Advanced

Click Apply

Page 27: An 54 DMVPN Cisco Transport

Page | 27

Parameter Setting Description

Include Tunnel key Ticked Set tunnel key

Tunnel Key 0 Tunnel key

Enable Multi-GRE mode on this GRE tunnel Ticked Enable Multi-GRE mode

NHRP Holding time 600 Set NHRP holding time

Enable NHRP Spoke to Spoke mode on this GRE tunnel Ticked Enable spoke to spoke mode

Page 28: An 54 DMVPN Cisco Transport

Page | 28

6.7 Save the configuration

Browse to Administration - Save configuration

Save the configuration to profile 0, the default power up config.

Page 29: An 54 DMVPN Cisco Transport

Page | 29

7 CONFIRM IPSEC & GRE IS UP AND PING TEST THE CONNECTION

7.1 Using the Digi WR44

7.1.1 Check the IPSec SA status

Browse to Management - Connections > Virtual Private Networking (VPN) > IPsec > IPsec Tunnels

7.1.2 Check the GRE tunnel status

Browse to Management - Network Status > Interfaces > GRE

7.1.3 Ping the LAN interface of the Primary Cisco (sv9-2) or the Spoke (sv9-3)

Page 30: An 54 DMVPN Cisco Transport

Page | 30

7.2 Using the Primary Cisco 2621 (sv9-2)

7.2.1 Check the IPSec SA status

Page 31: An 54 DMVPN Cisco Transport

Page | 31

7.2.2 Check the GRE tunnel status

7.2.3 Ping the Spoke Cisco (sv9-3)

Wireshark trace on the Fa0/0 side showing ping encapsulated in ESP.

Page 32: An 54 DMVPN Cisco Transport

Page | 32

8 FIRMWARE VERSIONS

8.1 Digi TransPort WR44

Sarian Systems. Sarian WR44U-XXX-A00 Ser#:140000 HW Revision: 7902a

Software Build . Oct 12 2012 13:00:14 SW

ARM Sarian Bios Ver 6.74 v39 400MHz B512-M512-F80-O1,0 MAC:00042d000000

Power Up Profile: 0

Async Driver Revision: 1.19 Int clk

Wi-Fi Revision: 2.0

IX Revision: 1.0

Ethernet Hub Driver Revision: 1.11

Firewall Revision: 1.0

EventEdit Revision: 1.0

Timer Module Revision: 1.1

(B)USBHOST Revision: 1.0

L2TP Revision: 1.10

PPTP Revision: 1.00

TACPLUS Revision: 1.00

MODBUS Revision: 0.00

MySQL Revision: 0.01

RealPort Revision: 0.00

MultiTX Revision: 1.00

LAPB Revision: 1.12

X25 Layer Revision: 1.19

MACRO Revision: 1.0

PAD Revision: 1.4

X25 Switch Revision: 1.7

V120 Revision: 1.16

TPAD Interface Revision: 1.12

GPS Revision: 1.0

SCRIBATSK Revision: 1.0

BASTSK Revision: 1.0

PYTHON Revision: 1.0

ARM Sync Driver Revision: 1.18

TCP (HASH mode) Revision: 1.14

TCP Utils Revision: 1.13

PPP Revision: 1.19

WEB Revision: 1.5

SMTP Revision: 1.1

FTP Client Revision: 1.5

FTP Revision: 1.4

IKE Revision: 1.0

PollANS Revision: 1.2

PPPOE Revision: 1.0

BRIDGE Revision: 1.1

MODEM CC (Ericsson 3G) Revision: 1.4

FLASH Write Revision: 1.2

Command Interpreter Revision: 1.38

SSLCLI Revision: 1.0

OSPF Revision: 1.0

Page 33: An 54 DMVPN Cisco Transport

Page | 33

BGP Revision: 1.0

QOS Revision: 1.0

RADIUS Client Revision: 1.0

SSH Server Revision: 1.0

SCP Revision: 1.0

CERT Revision: 1.0

LowPrio Revision: 1.0

Tunnel Revision: 1.2

OVPN Revision: 1.2

QDL Revision: 1.0

WiMax Revision: 1.0

iDigi Revision: 2.0

OK

8.1.1 Cisco 2621 (Primary and Spoke)

sv9-2#sh ver

Cisco IOS Software, 3700 Software (C3725-ADVENTERPRISEK9-M), Version

12.4(15)T8, RELEASE SOFTWARE (fc3)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2008 by Cisco Systems, Inc.

Compiled Mon 01-Dec-08 19:46 by prod_rel_team

ROM: ROMMON Emulation Microcode

ROM: 3700 Software (C3725-ADVENTERPRISEK9-M), Version 12.4(15)T8, RELEASE

SOFTWARE (fc3)

sv9-2 uptime is 1 day, 23 hours, 52 minutes

System returned to ROM by unknown reload cause - suspect

boot_data[BOOT_COUNT] 0x0, BOOT_COUNT 0, BOOTDATA 19

System image file is "tftp://255.255.255.255/unknown"

This product contains cryptographic features and is subject to United

States and local country laws governing import, export, transfer and

use. Delivery of Cisco cryptographic products does not imply

third-party authority to import, export, distribute or use encryption.

Importers, exporters, distributors and users are responsible for

compliance with U.S. and local country laws. By using this product you

agree to comply with applicable laws and regulations. If you are unable

to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found

at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to

[email protected].

Cisco 3725 (R7000) processor (revision 0.1) with 209920K/10240K bytes of

memory.

Processor board ID FTX0945W0MY

R7000 CPU at 240MHz, Implementation 39, Rev 2.1, 256KB L2, 512KB L3 Cache

2 FastEthernet interfaces

Page 34: An 54 DMVPN Cisco Transport

Page | 34

DRAM configuration is 64 bits wide with parity enabled.

55K bytes of NVRAM.

16384K bytes of ATA System CompactFlash (Read/Write)

Configuration register is 0x2102

Page 35: An 54 DMVPN Cisco Transport

Page | 35

9 CONFIGURATION FILES

9.1 Digi TransPort WR44

ss140000>config c show

eth 0 descr "WAN"

eth 0 IPaddr "10.100.1.211"

eth 0 gateway "10.100.1.1"

eth 0 do_nat 1

eth 0 ipsec 1

eth 0 ipanon ON

eth 1 descr "INTERNAL"

eth 1 IPaddr "3.3.3.3"

addp 0 enable ON

lapb 0 ans OFF

lapb 0 tinact 120

lapb 1 tinact 120

lapb 3 dtemode 0

lapb 4 dtemode 0

lapb 5 dtemode 0

lapb 6 dtemode 0

ip 0 cidr ON

route 0 descr "Route via ETH0"

route 0 IPaddr "1.1.1.1"

route 0 mask "255.255.255.255"

route 0 ll_ent "TUN"

def_route 0 gateway "10.100.1.1"

def_route 0 ll_ent "eth"

eroute 0 descr "DMVPN"

eroute 0 peerip "10.1.51.92"

eroute 0 peerid "10.1.51.92"

eroute 0 ourid "10.100.1.211"

eroute 0 ouridtype 3

eroute 0 locip "10.100.1.211"

eroute 0 locmsk "255.255.255.255"

eroute 0 remip "10.1.51.92"

eroute 0 remmsk "255.255.255.255"

eroute 0 ESPauth "MD5"

eroute 0 ESPenc "3DES"

eroute 0 proto "gre"

eroute 0 ltime 1200

eroute 0 lkbytes 4608000

eroute 0 authmeth "PRESHARED"

eroute 0 nosa "TRY"

eroute 0 debug ON

eroute 0 proto to GRE

eroute 1 peerip "NHRP"

eroute 1 peerid "*"

eroute 1 ourid "10.100.1.211"

eroute 1 locip "10.100.1.211"

eroute 1 locmsk "255.255.255.255"

eroute 1 remip "0.0.0.0"

eroute 1 remmsk "0.0.0.0"

Page 36: An 54 DMVPN Cisco Transport

Page | 36

eroute 1 ESPauth "md5"

eroute 1 ESPenc "3des"

eroute 1 proto "gre"

eroute 1 authmeth "preshared"

eroute 1 nosa "try"

eroute 1 debug ON

dhcp 0 respdelms 500

dhcp 0 mask "255.255.255.0"

dhcp 0 gateway "192.168.1.1"

dhcp 0 DNS "192.168.1.1"

sockopt 0 sock_inact 9000

ppp 0 timeout 300

ppp 1 name "W-WAN (HSPA 3G)"

ppp 1 phonenum "*98*1#"

ppp 1 IPaddr "0.0.0.0"

ppp 1 timeout 0

ppp 1 use_modem 1

ppp 1 r_chap OFF

ppp 3 defpak 16

ppp 4 defpak 16

modemcc 0 info_asy_add 6

modemcc 0 init_str "+CGQREQ=1"

modemcc 0 init_str1 "+CGQMIN=1"

modemcc 0 apn "Your.APN.goes.here"

modemcc 0 link_retries 10

modemcc 0 stat_retries 30

modemcc 0 sms_interval 1

modemcc 0 sms_access 1

modemcc 0 sms_concat 0

modemcc 0 init_str_2 "+CGQREQ=1"

modemcc 0 init_str1_2 "+CGQMIN=1"

modemcc 0 apn_2 "Your.APN.goes.here"

modemcc 0 link_retries_2 10

modemcc 0 stat_retries_2 30

ana 0 anon ON

ana 0 l1on ON

ana 0 xoton OFF

ana 0 lapdon 0

ana 0 lapbon 0

ana 0 logsize 45

cmd 0 unitid "ss%s>"

cmd 0 cmdnua "99"

cmd 0 hostname "digi.router"

cmd 0 asyled_mode 1

cmd 0 tremto 1200

user 0 access 0

user 1 name "username"

user 1 epassword "KD5lSVJDVVg="

user 1 access 0

user 2 name "*"

user 2 epassword "OzZlWUodFQ8="

user 2 access 4

user 3 access 0

user 4 access 0

user 5 access 0

user 6 access 0

Page 37: An 54 DMVPN Cisco Transport

Page | 37

user 7 access 0

user 8 access 0

user 9 access 0

local 0 transaccess 2

sslsvr 0 certfile "cert01.pem"

sslsvr 0 keyfile "privrsa.pem"

ssh 0 hostkey1 "privSSH.pem"

ssh 0 nb_listen 5

ssh 0 v1 OFF

tun 0 descr "GRE to DMVPN"

tun 0 IPaddr "192.168.1.3"

tun 0 source "10.100.1.211"

tun 0 dest "10.1.51.92"

tun 0 kadelay 3

tun 0 usekey ON

tun 0 ipanon ON

tun 0 tunanon ON

tun 0 mgre ON

tun 0 nhs "192.168.1.1"

tun 0 nhrp_auth "cisco123"

tun 0 nhrp_holdtime to 600

idigi 0 ssl ON

idigi 0 sms_optin ON

Power Up Profile: 0

OK

9.2 Cisco 2621 Primary (sv9-2)

sv9-2#sh run

Building configuration...

Current configuration : 1882 bytes

!

version 12.4

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname sv9-2

!

boot-start-marker

boot-end-marker

!

enable password cisco

!

no aaa new-model

memory-size iomem 5

ip cef

!

!

!

!

no ip domain lookup

Page 38: An 54 DMVPN Cisco Transport

Page | 38

ip domain name lab.local

!

multilink bundle-name authenticated

!

!

!

!

!

!

!

!

!

!

!

!

!

!

!

!

!

!

!

!

!

archive

log config

hidekeys

!

!

crypto isakmp policy 10

hash md5

authentication pre-share

crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0

!

!

crypto ipsec transform-set strong esp-3des esp-md5-hmac

!

crypto ipsec profile cisco

set security-association lifetime seconds 1200

set transform-set strong

!

!

!

!

!

!

!

!

interface Tunnel0

ip address 192.168.1.1 255.255.255.0

no ip redirects

ip mtu 1440

no ip next-hop-self eigrp 90

ip nhrp authentication cisco123

ip nhrp map multicast dynamic

ip nhrp network-id 1

Page 39: An 54 DMVPN Cisco Transport

Page | 39

ip nhrp holdtime 600

no ip split-horizon eigrp 90

tunnel source FastEthernet0/0

tunnel mode gre multipoint

tunnel key 0

tunnel protection ipsec profile cisco

!

interface FastEthernet0/0

ip address 10.1.51.92 255.255.0.0

speed 100

full-duplex

no shut

!

interface FastEthernet0/1

ip address 1.1.1.1 255.255.255.0

speed 100

full-duplex

no shut

!

router eigrp 90

network 1.1.1.0 0.0.0.255

network 192.168.1.0

no auto-summary

!

ip forward-protocol nd

ip route 0.0.0.0 0.0.0.0 10.1.2.100 254

ip route 3.3.3.0 255.255.255.0 Tunnel0 192.168.1.3

!

!

ip http server

no ip http secure-server

!

!

!

!

!

!

!

control-plane

!

!

!

!

!

!

!

!

!

!

line con 0

exec-timeout 0 0

privilege level 15

logging synchronous

TransPort preferred ssh

TransPort output all

escape-character 27

Page 40: An 54 DMVPN Cisco Transport

Page | 40

line aux 0

exec-timeout 0 0

privilege level 15

logging synchronous

TransPort preferred ssh

TransPort output all

line vty 0 4

password cisco

login

TransPort preferred ssh

TransPort input all

TransPort output all

!

!

end

9.3 Cisco 2621 Spoke (sv9-3)

sv9-3#sh run

Building configuration...

Current configuration : 2008 bytes

!

version 12.4

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname sv9-3

!

boot-start-marker

boot-end-marker

!

enable password cisco

!

no aaa new-model

memory-size iomem 5

ip cef

!

!

!

!

no ip domain lookup

ip domain name lab.local

!

multilink bundle-name authenticated

!

!

!

!

!

!

!

!

Page 41: An 54 DMVPN Cisco Transport

Page | 41

!

!

!

!

!

!

!

!

!

fax interface-type fax-mail

!

!

!

!

archive

log config

hidekeys

!

!

crypto isakmp policy 10

hash md5

authentication pre-share

crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0

!

!

crypto ipsec transform-set strong esp-3des esp-md5-hmac

crypto ipsec profile cisco

set security-association lifetime seconds 120

set transform-set strong

!

!

!

!

!

!

!

!

interface Tunnel0

ip address 192.168.1.2 255.255.255.0

no ip redirects

ip mtu 1440

ip nhrp authentication cisco123

ip nhrp map multicast dynamic

ip nhrp map 192.168.1.1 10.1.51.92

ip nhrp map multicast 10.1.51.92

ip nhrp network-id 1

ip nhrp holdtime 600

ip nhrp nhs 192.168.1.1

tunnel source FastEthernet0/0

tunnel mode gre multipoint

tunnel key 0

tunnel protection ipsec profile cisco

!

interface FastEthernet0/0

ip address 10.1.51.93 255.255.0.0

speed 100

Page 42: An 54 DMVPN Cisco Transport

Page | 42

full-duplex

no shut

interface FastEthernet0/1

ip address 2.2.2.2 255.255.255.0

speed 100

full-duplex

no shut

router eigrp 90

network 2.2.2.0 0.0.0.255

network 192.168.1.0

no auto-summary

!

ip forward-protocol nd

ip route 0.0.0.0 0.0.0.0 10.1.2.100 254

ip route 3.3.3.0 255.255.255.0 Tunnel0

ip route 3.3.3.0 255.255.255.0 Tunnel0 192.168.1.3

!

!

ip http server

no ip http secure-server

!

!

!

!

!

!

!

control-plane

!

!

!

!

!

!

dial-peer cor custom

!

!

!

!

!

!

line con 0

exec-timeout 0 0

privilege level 15

logging synchronous

TransPort preferred ssh

TransPort output all

escape-character 27

line aux 0

exec-timeout 0 0

privilege level 15

logging synchronous

TransPort preferred ssh

TransPort output all

line vty 0 4

Page 43: An 54 DMVPN Cisco Transport

Page | 43

password cisco

login

TransPort preferred ssh

TransPort input all

TransPort output all

!

!

end