H3c-technologies H3C SecPath F1000-E User Manual

Browse online or download User Manual for Safety H3c-technologies H3C SecPath F1000-E. H3C Technologies H3C SecPath F1000-E User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 80
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
i
Table of Contents
GRE Configuration······················································································································································· 1
GRE Overview···································································································································································1
Introduction to GRE ··················································································································································1
GRE Security Options ··············································································································································3
GRE Applications ·····················································································································································3
Protocols and Standards··········································································································································5
Configuring a GRE over IPv4 Tunnel ······························································································································5
Configuration Prerequisites ·····································································································································5
Configuration Procedure··········································································································································5
Configuring a GRE over IPv6 Tunnel ······························································································································6
Configuration Prerequisites ·····································································································································6
Configuration Procedure··········································································································································7
Displaying and Maintaining GRE ···································································································································8
GRE over IPv4 Tunnel Configuration Example···············································································································8
GRE over IPv6 Tunnel Configuration Example············································································································ 11
Troubleshooting GRE ····················································································································································· 14
Point to Multi-Point GRE Tunnel Configuration··········································································································· 1
P2MP GRE Tunnel Overview ···········································································································································1
Background·······························································································································································1
Operation of a P2MP GRE Tunnel··························································································································2
P2MP GRE Tunnel Backup·······································································································································3
Advantages and Restrictions of the P2MP GRE Tunnel Technology ···································································4
Configuring a P2MP GRE Tunnel ····································································································································5
Configuration Prerequisites ·····································································································································5
Configuring a P2MP GRE Tunnel ···························································································································5
Displaying and Maintaining P2MP GRE Tunnels ··········································································································7
P2MP GRE Tunnel Configuration Examples ···················································································································7
Basic P2MP GRE Tunnel Configuration Example··································································································7
Configuration Example for P2MP GRE Tunnel Backup at the Headquarters ·····················································9
Configuration Example for P2MP GRE Tunnel Backup at a Branch ································································ 13
Page view 0
1 2 3 4 5 6 ... 79 80

Summary of Contents

Page 1 - Table of Contents

i Table of Contents GRE Configuration·················································································································

Page 2 - GRE Configuration

9 Figure 8 Network diagram for a GRE over IPv4 tunnel Configuration procedure NOTE: Before the configuration, make sure that Device A and Device

Page 3 - De-encapsulation process

10 [DeviceB] interface gigabitethernet 2/1 [DeviceB-GigabitEthernet2/1] ip address 2.2.2.2 255.255.255.0 [DeviceB-GigabitEthernet2/1] quit # Create a

Page 4 - GRE Applications

11 Description: Tunnel0 Interface The Maximum Transmit Unit is 1476 Internet Address is 10.1.2.2/24 Primary Encapsulation is TUNNEL, service-loopback

Page 5 - Device B

12 Configuration procedure NOTE: Before the configuration, make sure that Device A and Device B are reachable to each other. Step1 Configure Dev

Page 6 - Configuration Procedure

13 [DeviceB-GigabitEthernet2/1] quit # Create an interface named Tunnel 0. [DeviceB] interface tunnel 0 # Configure an IPv4 address for interface Tun

Page 7

14 Encapsulation is TUNNEL, service-loopback-group ID not set. Tunnel source 2002::2:1, destination 2002::1:1 Tunnel protocol/transport GRE/IPv6

Page 8

15 Solution: • On Device A and Device C, execute the display ip routing-table command in any view respectively. On Device A, observe whether there

Page 9

1 Point to Multi-Point GRE Tunnel Configuration This chapter includes these sections: • P2MP GRE Tunnel Overview • Configuring a P2MP GRE Tunnel • Di

Page 10 - Configuration procedure

2 traditional P2P GRE tunnel mode. Then, a GRE tunnel will be established dynamically between the headquarters and each branch. Operation of a P2MP

Page 11

3 P2MP GRE Tunnel Backup GRE tunnel backup at a branch Figure 13 GRE tunnel backup at a branch Device BDevice C(Backup gateway)IPv4 networkDevice ATu

Page 12 - Network requirements

1 GRE Configuration This chapter includes these sections: • GRE Overview • Configuring a GRE over IPv4 Tunnel • Configuring a GRE over IPv6 Tunnel •

Page 13

4 GRE tunnel backup at the headquarters Figure 14 GRE tunnel backup at the headquarters As shown in Figure 14, for higher network reliability, you

Page 14

5 This not only ensures better cooperation of devices from different vendors, but also helps avoid repetitive investments on branch node devices. •

Page 15 - Troubleshooting GRE

6 To do… Use the command… Remarks Configure the source address or interface for the tunnel interface source { ip-address | interface-type interface

Page 16

7 • When configuring a route through the tunnel, you can configure a static route, using the address of the network segment that the original packet

Page 17 - P2MP GRE Tunnel Overview

8 Figure 15 Network diagram for basic P2MP GRE tunnel configuration Configuration procedure Step1 Configure Device A # Configure an IP address for

Page 18 - GRE tunnel

9 [DeviceB–GigabitEthernet1/1] quit # Configure an IP address for interface GigabitEthernet 1/2. [DeviceB] interface gigabitethernet 1/2 [DeviceB–Gig

Page 19 - P2MP GRE Tunnel Backup

10 NOTE: To avoid looping, do not configure the tunnel interface of the GRE over IPv4 tunnel as the backup interfaceof the P2MP GRE tunnel interfac

Page 20 - Technology

11 # Configure the tunnel encapsulation mode of interface Tunnel 0 as P2MP GRE. [DeviceA-Tunnel0] tunnel-protocol gre p2mp # Configure the mask of th

Page 21 - Configuration Prerequisites

12 [DeviceC-Tunnel0] ip address 172.168.1.3 255.255.255.0 # Configure the tunnel encapsulation mode of interface Tunnel 0 as GRE over IPv4. [DeviceC-

Page 22

13 The output information indicates that on Device A there was a tunnel entry to the branch network, and packets to the branch network were forwarded

Page 23

2 Format of an encapsulated packet Figure 2 shows the format of an encapsulated packet. Figure 2 Format of an encapsulated packet As an example, Fi

Page 24

14 Figure 17 Network diagram for P2MP GRE tunnel backup at a branch GE1/1GE1/1Device BDevice C(Backup gateway)IPv4 networkDevice AGE1/1GE1/2Tunnel0Tu

Page 25 - Headquarters

15 [DeviceB-Tunnel0] tunnel-protocol gre # Configure the source and destination IP addresses of interface Tunnel 0. [DeviceB-Tunnel0] source 11.1.1.2

Page 26

16 # On Host B, specify Device C as the default gateway. After the tunnel entry corresponding to Device B ages out, ping Host A from Host B. The ping

Page 27 - Step3 Configure Device C

i Table of Contents L2TP Configuration················································································································

Page 28 - Verification

1 L2TP Configuration This chapter includes these sections: • L2TP Overview • L2TP Configuration Task List • Displaying and Maintaining L2TP • L2TP Co

Page 29

2 Figure 1 VPDN built by using L2TP PPPoE/ISDNInternetL2TP tunnelRemote userRemote branchLACLNSInternal server A VPDN built by using L2TP comprises

Page 30

3 L2TP architecture Figure 2 shows the relationship between the PPP frame, control channel, and data channel. PPP frames are transferred over unrelia

Page 31

4 same tunnel ID but different session IDs are multiplexed to the same tunnel. The tunnel ID and session ID in a header are the intended receiver’s,

Page 32

5 Figure 6 LAC-auto-initiated tunneling mode L2TP tunnel establishment process Figure 7 shows a typical L2TP network. Figure 7 Typical L2TP network

Page 33

6 Figure 8 L2TP call setup procedure (1) Call setup(2) PPP LCP setup(3) PAP or CHAP authenticaion(4) Access request(5) Access accept(6) Tunnel setup(

Page 34 - L2TP Configuration

3 GRE Security Options For the purpose of tunnel security, GRE provides two options: tunnel interface key and end-to-end checksum. According to RFC 1

Page 35 - Basic Concepts of L2TP

7 14. The RADIUS server authenticates the access request and returns a response if the user passes authentication. 15. The LNS assigns an internal I

Page 36 - Tunnel and session

8 Task Remarks Enable L2TP Create an L2TP group Configuring Basic L2TP Capability Specify the local name of the tunnel Required Configuring an LAC t

Page 37 - L2TP tunnel

9 To do… Use the command… Remarks Specify the local name of the tunnel tunnel name name Optional The system name of the device is used by default.

Page 38

10 To do… Use the command… Remarks Specify that AVP data be transferred in hidden mode tunnel avp-hidden Optional By default, AVP data is transferr

Page 39

11 Configuring an LAC to Establish an L2TP Tunnel To configure an LAC to establish an L2TP tunnel, you need to: • Create a virtual template interfac

Page 40 - L2TP Configuration Task List

12 NOTE: An L2TP tunnel established in LAC-auto-initiated mode exists until you remove the tunnel by using the undol2tp-auto-client enable command.

Page 41 - system-view

13 To do… Use the command… Remarks Configure the authentication mode for PPP users ppp authentication-mode { chap | pap } [ [ call-in ] domain isp-

Page 42 - Configuring an LAC

14 virtual template interface is PAP. If the authentication type configured on the virtual template interface is CHAP but that configured on the LAC

Page 43 - RADIUS Configuration

15 To do… Use the command… Remarks Enter system view system-view — Enter L2TP group view l2tp-group group-number — Specify the LNS to perform LCP r

Page 44

16 Specifying to Send ACCM According to RFC 2661, the Asynchronous Control Character Map (ACCM) AVP enables an LNS to inform the LAC of the ACCM that

Page 45 - Configuring an LNS

4 Scope enlargement of a hop-limited protocol such as RIP Figure 5 Network scope enlargement When the hop count between two terminals exceeds 15, t

Page 46

17 response packet from the peer within a specified period of time, it retransmits the Hello packet. If it receives no response packet from the peer

Page 47

18 To do… Use the command… Remarks Display information about L2TP sessions display l2tp session Available in any view L2TP Configuration Examples

Page 48 - Enabling L2TP Multi-Instance

19 # Create an L2TP group and configure its attributes. [LAC] l2tp-group 1 [LAC-l2tp1] tunnel name LAC [LAC-l2tp1] start l2tp ip 1.1.2.2 fullusername

Page 49 - Setting the Hello Interval

20 [LNS] dis l2tp tunnel Total tunnel = 1 LocalTID RemoteTID RemoteAddress Port Sessions RemoteName 1 1 1.1.2.1 1701

Page 50 - Enabling Tunnel Flow Control

21 [LNS-isp-system] quit # Enable L2TP. [LNS] l2tp enable # Configure the virtual template interface. [LNS] interface virtual-template 1 [LNS-virtual

Page 51 - L2TP Configuration Examples

22 Configuration Example for LAC-Auto-Initiated VPN Network requirements Create a virtual PPP user on the LAC and configure the LAC to initiate a tun

Page 52 - Step3 User side operation

23 [LNS-l2tp1] tunnel name LNS [LNS-l2tp1] allow l2tp virtual-template 1 remote LAC # Enable tunnel authentication and configure the authentication p

Page 53

24 Step3 Verify the configurations # On the LNS, perform the display l2tp session command to view the established L2TP session. [LNS] display l2tp se

Page 54

25 Figure 12 Network diagram for L2TP multi-domain application WANCorporate network 1L2TP tunnelEth1/21.1.2.1/24GE1/11.1.2.2/24LNSLACHost ACorporate

Page 55 - Configuraton procedure

26 # Create the virtual template interfaces and configure CHAP authentication. [LAC] interface virtual-template 100 [LAC-Virtual-Template100] ppp aut

Page 56 - Step2 Configure the LAC

5 Protocols and Standards • RFC 1701 Generic Routing Encapsulation (GRE) • RFC 1702 Generic Routing Encapsulation over IPv4 networks • RFC 2784

Page 57

27 [LNS-isp-aaa.net] ip pool 1 10.0.1.10 10.0.1.100 [LNS-isp-aaa.net] quit [LNS] domain bbb.net [LNS-isp-bbb.net] authentication ppp local [LNS-isp-b

Page 58

28 LocalSID RemoteSID LocalTID 17345 4351 1 23914 10923 2 # On the LNS, use the display l2tp tunnel command to check the e

Page 59

29 Symptom 2: Data transmission fails. A connection is setup but data cannot be transmitted. For example, the LAC and LNS cannot ping each other. Ana

Page 60 - Step3 Configure the users

i Table of Contents L3VPN Configuration···············································································································

Page 61 - Troubleshooting L2TP

1 L3VPN Configuration This chapter includes these sections: • L3VPN Overview • L3VPN Configuration Task List • Displaying and Maintaining L3VPN • L3V

Page 62

2 Figure 1 Network diagram for L3VPN model VPN 1CESite 1VPN 2CECECESite 3VPN 2PEVPN 1Site 2Site 4PEPEPPPP CEs and PEs mark the boundary between the

Page 63

3 The address spaces of VPNs may overlap. For example, if both VPN 1 and VPN 2 use the addresses on network segment 10.110.10.0/24, address space ove

Page 64 - L3VPN Configuration

4 In the simplest case, all users in a VPN form a closed user group. They can forward traffic to each other but cannot communicate with any user outs

Page 65 - L3VPN Concepts

5 Figure 3 Network diagram for hub and spoke networking scheme In Figure 3, the spoke sites communicate with each other through the hub site. The a

Page 66 - L3VPN Networking Schemes

6 Figure 4 Network diagram for extranet networking scheme CECEPE 1PE 3Site 2Site 1Site 3VPN 1VPN 1VPN 2VPN 1:Import:100:1Export:100:1CEVPN 2:Import:2

Page 67

6 To do… Use the command… Remarks Configure the key for the GRE tunnel interface gre key key-number Optional By default, no key is configured for a

Page 68 - Extranet networking scheme

7 In the OSPF VPN extension application, the VPN backbone is considered the backbone area (area 0). Since OSPF requires that the backbone area must b

Page 69 - OSPF VPN Extension

8 It is required that each OSPF domain has a configurable domain ID. It is recommended to configure for all OSPF instances in the network related to

Page 70 - 2. BGP/OSPF interaction

9 To do… Use the command… Remarks Enter system view system-view — Create a VPN instance and enter VPN instance view ip vpn-instance vpn-instance-na

Page 71 - Configuring VPN Instances

10 Follow these steps to configure route related attributes of a VPN instance To do… Use the command… Remarks Enter system view system-view — Enter

Page 72

11 To do… Use the command… Remarks Create a VPN instance and enter VPN instance view ip vpn-instance vpn-instance-name Required No VPN instance exi

Page 73 - Configuring Basic L3VPN

12 Follow these steps to configure RIP between PE and CE: To do… Use the command… Remarks Enter system view system-view — Create a RIP instance bet

Page 74 - IP Routing Volume

13 The domain ID of an OSPF process is included in the routes generated by the process. When an OSPF route is injected into BGP, the OSPF domain ID i

Page 75 - IP Routing Volume

14 To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Configure the PE as the peer peer { group-name |

Page 76 - OSPF Configuration

15 To do… Use the command… Remarks Display information about the forwarding table of a VPN instance display fib vpn-instance vpn-instance-name [ |

Page 77 - Resetting BGP Connections

16 To do… Use the command… Remarks Clear route flap history information about a BGP peer of a VPN instance reset bgp vpn-instance vpn-instance-name

Page 78

7 Configuration Procedure Follow these steps to configure a GRE over IPv6 tunnel: To do… Use the command… Remarks Enter system view system-view — E

Page 79 - L3VPN Configuration Example

17 [CE-GigabitEthernet0/0] ip binding vpn-instance CE-VPN1 [CE-GigabitEthernet0/0] ip address 10.1.1.2 255.255.255.0 # Configure interface GigabitEt

Page 80

8 • For information about commands interface tunnel, tunnel-protocol, source, destination, and encapsulation-limit, see Tunneling Commands in the IP

Comments to this Manuals

No comments