CiscoDataCenterCertificatione Guide 2017
CiscoDataCenterCertificatione Guide 2017
CiscoDataCenterCertificatione Guide 2017
Part 3 - Routing
DMVPN - BGP
iBGP and eBGP scenarios
Dual HUB scenario
DMVPN EIGRP
DMVPN OSPF
Questions and Answers
What is DMVPN
Begin
NO
Create IPsec
Fix it
Parameters
Apply IPsec on
Tunnel
Interfaces
END
DMVPN Implementation Steps (Tunnel)
Underlay
Interface
1.1.1.1
ISP or MPLS or
SPOKE-A
Underlay
3rd Party Transit Underlay
SPOKE-D
Interface Cloud Interface
2.2.2.2 5.5.5.5
Underlay
Underlay
Interface
Interface
4.4.4.4
3.3.3.3
SPOKE-B SPOKE-C
Back to
Flowchart
DMVPN Implementation Steps
2nd Create the Tunnel Interface on the HUB and SPOKE routers;
3rd Apply IP MTU to avoid fragmentation;
4th Apply the OVERLAY address;
5th Specify the Tunnel Source (Underlay Interface);
6th Specify the tunnel mode as GRE Multipoint;
HUB SPOKE
With the IP MTU setted to 1400 when adding the IPsec and GRE overhead, it will not exceed the 1500 MTU of
the interface, preventing additional fragmentation.
* The TCP Maximum Segment Size (MSS) defines the maximum amount of data that a host is willing to accept
in a single TCP/IP datagram. To avoid truncation, should be 40 bytes less than IP MTU command on interface.
DMVPN Implementation Steps
NHRP is a resolution protocol that allows one NHC client (spoke) to dynamically discover the logical
VPN IP to physical NBMA IP mapping for another NHC client (spoke) within the same NBMA network.
NHRP is used to facilitate building a VPN. In this context, a VPN consists of a virtual Layer 3 network
that is built on top of an actual Layer 3 network. The topology you use over the VPN is largely
independent of the underlying network, and the protocols you run over it are completely
independent of it. The VPN network (DMVPN) is based on GRE IP logical tunnels that can be
protected by adding in IPsec to encrypt the GRE IP tunnels.
Connected to the NBMA network are one or more stations that implement NHRP, and are known as
NHSs and NHCs.
DMVPN Implementation Steps
Underlay IP
Overlay IP
HUB SPOKE
HUB(config)#interface tunnel 10 SPOKE(config)#interface tunnel 10
HUB(config-if)#ip nhrp network-id 123 [1 to 4294967295] SPOKE(config-if)#ip nhrp network-id 123 [1 to 4294967295]
HUB(config-if)#ip nhrp server-only SPOKE(config-if)#ip nhrp nhs 192.168.1.1 nbma 1.1.1.1 multicast
HUB(config-if)# SPOKE(config-if)#
HUB(config-if)# it will not initiate or respond to SPOKE(config-if)#
an attempt to establish an NHRP
shortcut SVCs.
or or
HUB(config-if)#ip nhrp nhs 192.168.1.1 1.1.1.1/32 SPOKE(config-if)#ip nhrp nhs 192.168.1.1 1.1.1.1/32
HUB(config-if)#ip nhrp map 192.168.1.1 1.1.1.1 SPOKE(config-if)#ip nhrp map 192.168.1.1 1.1.1.1
The HUB routers will dynamically populate the dmvpn map The SPOKE routers will statically populate the dmvpn map
table with the IP overlay and IP underlay addresses of each table with the IP overlay and IP underlay addresses of the hub
spoke router. Use the commad show dmvpn to see the router. With this entry the spoke will use the HUB as a
result. server/database to learn the IP overlay and IP underlay of
others spokes routers. Use the commad show dmvpn to see
the result.
DMVPN Implementation Steps
* How long the Cisco IOS software tells other routers to keep the
address mappings it is providing in NHRP responses. This controls
how long a spoke-to-spoke shortcut path will stay up after it is
no longer used or how often the spoke-to-spoke short-cut path
mapping entry will be refreshed if it is still being used. We
HUB recommend that a value from 300 to 600 seconds be used.
SPOKE
RT(config)#interface tunnel 10
* If not configured, the default is one-third of the holdtime. It is
RT(config-if)#ip nhrp holdtime 600
the time frequency that a routers should refresh the registration
with the NHS router via NHRP registrations requests.
RT(config-if)#ip nhrp registration timeout 200
HUB SPOKE
* Tell to spoke routers when there is a better path to use. * Make the spoke router choose the best path shortcut to
somewhere.
Permitting a spoke-to-spoke temporary connection.
DMVPN Implementation Steps
HUB SPOKE
Overlay Interface
Overlay Interface
192.168.1.12
192.168.1.11
SPOKE-B SPOKE-C
DMVPN Implementation Steps
Dual HUB with Front VRF scenario and example;
AS 65001 AS 65002
HUB1 HUB2
interface Tunnel10
ip address 192.168.1.11 255.255.255.0
if-state nhrp
ip mtu 1400
ip nhrp authentication 54321
ip nhrp map multicast dynamic
ip nhrp network-id 12345
ip nhrp holdtime 600
ip nhrp nhs 192.168.1.1 nbma 1.0.0.1 multicast
SPOKE-B ip nhrp nhs 192.168.1.2 nbma 2.0.0.2 multicast
ip nhrp shortcut
AS 65001 ip tcp adjust-mss 1360
tunnel source Ethernet0/0
tunnel mode gre multipoint
Questions and Answers
Agenda
Part 3 - Routing
DMVPN - BGP
iBGP and eBGP scenarios
Dual HUB scenario
DMVPN EIGRP
DMVPN OSPF
Questions and Answers
Security Acronyms
?
MD5
HA HMAC SHA
? ?
ESP IPsec DES
DH
?
What is IPsec, ISAKMP and IKE
HA (Hash Algorithm)
ISAKMP SHA MD5
SHA MD5
Cryptography Algorithm
Authen
IKEv1 Header DES AES
Key Points
3DES HMAC
Diffie-Hellman Group
Reliability
1 2 5
Diffie-Hellman Group Integrity
1 2 5
Privacy
is a specific method of securely
exchanging cryptographic keys
IPsec Negotiation Steps
Step 1 Step 2 Step 3 Step 4 Step 5
"Interesting traffic" initiates the IPSec process. Traffic is deemed interesting when the
IPSec security policy configured in the IPSec peers starts the IKE process.
IPsec Negotiation Steps
Step 1 Step 2 Step 3 Step 4 Step 5
Phase 1 Finished
IPsec Negotiation Steps
Step 1 Step 2 Step 3 Step 4 Step 5
IKE phase 1. IKE authenticates IPSec peers and negotiates IKE SAs during this phase,
setting up a secure channel for negotiating IPSec SAs in phase 2.
IKEv1 IKEv2
Keyring Policy Profile Keyring Policy Profile
SPOKE
Name of Keyring For fVRF scenarios. If the fVRF is not
specified the keyring will be part of
global vrf.
!
crypto keyring DMVPN-KEYRING vrf DMVPN-Internet-Transport-V1
pre-shared-key address 0.0.0.0 0.0.0.0 key STRINGKEY
!
!
crypto ikev2 proposal DMVPN-PROPOSAL
encryption aes-cbc-256
integrity sha256 sha384 sha512
group 2
!
SPOKE
!
crypto isakmp profile DMVPN-Profile Profile Name
inside VRF
vrf <iVRF> * used with crypto maps only
keyring DMVPN-KEYRING Keyring Name
match identity address 0.0.0.0 <fVRF> front VRF
* Used when target underlay addresses
isakmp authorization list default are hosted on a front VRF
local-address Ethernet1/0
! Permitted peers, where 0.0.0.0
means any IP
IKE phase 2. IKE negotiates IPSec SA parameters and sets up matching IPSec SAs in the
peers.
IKEv1 IKEv2
Transform-Set Profile Apply Transform-Set Profile Apply
crypto ipsec transform-set DMVPN-TRANSFORMSET-V1 esp-aes 256 esp- crypto ipsec transform-set DMVPN-TRANSFORMSET-V2 esp-aes 256 esp-
sha-hmac sha256-hmac
mode transport mode transport
SPOKE
Transport Mode Encapsulate the Payload Only. Cryptography and Hash Algorithms
Tunnel Mode Encapsulate the Datagram IP
DMVPN Implementation Steps (Security)
SPOKE
SPOKE
! IPsec Profile Name
crypto ipsec profile DMVPN-IPSEC-PROFILE
set transform-set DMVPN-TRANSFORMSET Transform-set Name
!
SPOKE
!
Interface tunnel 10
tunnel protection ipsec profile DMVPN-IPSEC-PROFILE shared
!
Data Transfer. Data is transferred between IPSec peers based on the IPSec parameters and
keys stored in the SA database.
Tunnel IPsec
IPsec Negotiation Steps
Step 1 Step 2 Step 3 Step 4 Step 5
IPSec tunnel termination. IPSec SAs terminate through deletion or by timing out.
Tunnel IPsec
Timing Out
IPsec for Front VRF IKEv1
Dual HUB with Front VRF scenario and example;
AS 65001 AS 65002
HUB1 HUB2
Commands Function
show dmvpn Display dmvpn map
show crypto isakmp sa To display current Internet Key Exchange (IKE) security associations (SAs)
show crypto ipsec sa To display the settings used by IPsec security associations (SAs)
show crypto ikev2 sa To display an Internet Key Exchange Version 2 (IKEv2) security associations
(SAs)
show crypto session To display status information for active crypto sessions
PS: IKEv1 and IKEv2 can not share the same underlay interface.
Part 3 - Routing
DMVPN - BGP
iBGP and eBGP scenarios
Dual HUB scenario
DMVPN EIGRP
DMVPN OSPF
Questions and Answers
BGP Implementation
Dynamic neighbours
HUB SPOKE
Step 1
Under router bgp command, add the command bellow Normal ibgp neighbour configuration
bgp listen range 192.168.1.0/24 peer-group iBGP-ACME
Associates a subnet range with a BGP peer group and activates the BGP dynamic
neighbors feature.
Step 2
Under router bgp command, add the command bellow
bgp listen limit 254
Sets a global limit of BGP dynamic subnet range neighbors.
Use the optional limit keyword and max-number argument to define the
maximum number of BGP dynamic subnet range neighbors that can be created.
Step 3
Under address-family ipv4, add the commands bellow
neighbor iBGP-ACME peer-group
neighbor iBGP-ACME remote-as 65001
neighbor iBGP-ACME route-reflector-client
BGP Implementation
iBGP Scenario using dynamic neighbours
HUB
router bgp 65001
Permanent Tunnel bgp router-id 192.168.1.1
bgp log-neighbor-changes
bgp listen range 192.168.1.0/24 peer-group iBGP-ACME
Tunnel 0 bgp listen limit 254
192.168.1.1 !
address-family ipv4
network 10.0.0.0 mask 255.255.255.0
network 20.0.0.0 mask 255.255.255.0
neighbor iBGP-ACME peer-group
neighbor iBGP-ACME remote-as 65001
neighbor iBGP-ACME route-reflector-client
exit-address-family
Unsecured
Cloud
HUB
router bgp 65001
Permanent Tunnel bgp router-id 192.168.1.1
bgp log-neighbor-changes
!
Tunnel 0 address-family ipv4
192.168.1.1 network 10.0.0.0 mask 255.255.255.0
network 20.0.0.0 mask 255.255.255.0
neighbor 192.168.1.11 remote-as 65011
neighbor 192.168.1.11 description SPOKE-B
neighbor 192.168.1.11 activate
neighbor 192.168.1.11 next-hop-self
neighbor 192.168.1.12 remote-as 65012
neighbor 192.168.1.12 description SPOKE-C
neighbor 192.168.1.12 activate
neighbor 192.168.1.12 next-hop-self
Unsecured exit-address-family
Cloud
AS 65001 AS 65002
HUB1 Permanent Tunnel HUB2
Tunnel 0 Tunnel 0
router bgp 65001 192.168.1.1 192.168.1.2 router bgp 65002
bgp router-id 192.168.1.1 bgp router-id 192.168.1.2
bgp log-neighbor-changes bgp log-neighbor-changes
bgp listen range 192.168.1.0/24 peer-group iBGP-ACME bgp listen range 192.168.1.0/24 peer-group iBGP-ACME
bgp listen limit 254 bgp listen limit 254
! !
address-family ipv4 vrf ACME address-family ipv4 vrf ACME
network 10.0.0.0 mask 255.255.255.0 network 10.0.0.0 mask 255.255.255.0
network 20.0.0.0 mask 255.255.255.0 network 20.0.0.0 mask 255.255.255.0
neighbor iBGP-ACME peer-group neighbor iBGP-ACME peer-group
neighbor iBGP-ACME remote-as 65001 Unsecured neighbor iBGP-ACME remote-as 65001
neighbor iBGP-ACME timers 2 6 neighbor iBGP-ACME local-as 65001
neighbor iBGP-ACME route-reflector-client Cloud exit-address-family
exit-address-family