DMVPN基礎配置


DMVPN基礎拓撲:

配置步驟:
    1. 基本IP地址配置實現網絡可達
    2. 配置GRE多點隧道(mGRE)和NHRP(下一跳解析協議)
    3. 配置EIGRP路由協議
    4. 配置IPSec

------------------------------------------------------------------------------------------------------------------------------------------
備注:由於這里的IOS(IOU或EVE可以)不能在Hub配置ip nhrp redirect;也不能在Spoke配置ip nhrp shortcut;所以Spoke1到Spoke2的流量都需要經過Hub。
DMVPN中“包治百病”的大招(Hub端):
int tun 0
shut
no shu

------------------------------------------------------------------------------------------------------------------------------------------
R1
!
hostname Hub
!
crypto isakmp policy 10
 authentication pre-share
crypto isakmp key cisco address 0.0.0.0 0.0.0.0
!         
crypto ipsec transform-set Trans esp-des esp-md5-hmac
 mode transport
!
crypto ipsec profile DMVPN
 set transform-set Trans
!
interface Loopback0
 ip address 192.168.1.1 255.255.255.0
!
interface Tunnel0
 ip address 10.1.1.1 255.255.255.0
 no ip redirects
 ip mtu 1400
 ip nhrp authentication cisco
 ip nhrp map multicast dynamic
 ip nhrp network-id 10
 ip summary-address eigrp 10 192.168.0.0 255.255.0.0 5
 tunnel source Ethernet0/0
 tunnel mode gre multipoint
 tunnel key 123
 tunnel protection ipsec profile DMVPN
!
interface Ethernet0/0
 ip address 21.22.12.1 255.255.255.0
 ip ospf network point-to-point
 half-duplex
!
router eigrp 10
 network 10.1.1.0 0.0.0.255
 network 192.168.1.0
 no auto-summary
!
router ospf 10
 router-id 192.168.1.1
 log-adjacency-changes
 network 21.22.12.0 0.0.0.255 area 0
!
R2
hostname R2
!
interface Ethernet0/0
 ip address 21.22.12.2 255.255.255.0
 ip ospf network point-to-point
 half-duplex
!
router ospf 10
 router-id 2.2.2.2
 log-adjacency-changes
 network 21.22.12.0 0.0.0.255 area 0
 network 21.22.23.0 0.0.0.255 area 0
 network 21.22.24.0 0.0.0.255 area 0
R3
hostname Spoke1
!
crypto isakmp policy 10
 authentication pre-share
crypto isakmp key cisco address 0.0.0.0 0.0.0.0
!         
!
crypto ipsec transform-set Trans esp-des esp-md5-hmac
 mode transport
!
crypto ipsec profile DMVPN
 set transform-set Trans
!
interface Loopback0
 ip address 192.168.3.1 255.255.255.0
!
interface Tunnel0
 ip address 10.1.1.3 255.255.255.0
 no ip redirects
 ip mtu 1400
 ip nhrp authentication cisco
 ip nhrp map 10.1.1.1 21.22.12.1
 ip nhrp map multicast 21.22.12.1
 ip nhrp network-id 10
 ip nhrp nhs 10.1.1.1
 tunnel source Ethernet0/0
 tunnel mode gre multipoint
 tunnel key 123
 tunnel protection ipsec profile DMVPN
!
interface Ethernet0/0
 ip address 21.22.23.3 255.255.255.0
 ip ospf network point-to-point
 half-duplex
!
router eigrp 10
 network 10.1.1.0 0.0.0.255
 network 192.168.3.0
 no auto-summary
!
router ospf 10
 router-id 192.168.3.1
 log-adjacency-changes
 network 21.22.23.0 0.0.0.255 area 0
R4
hostname Spoke2
!
crypto isakmp policy 10
 authentication pre-share
crypto isakmp key cisco address 0.0.0.0 0.0.0.0
!         
!
crypto ipsec transform-set Trans esp-des esp-md5-hmac
 mode transport
!
crypto ipsec profile DMVPN
 set transform-set Trans
!
interface Loopback0
 ip address 192.168.4.1 255.255.255.0
!
interface Tunnel0
 ip address 10.1.1.4 255.255.255.0
 no ip redirects
 ip mtu 1400
 ip nhrp authentication cisco
 ip nhrp map 10.1.1.1 21.22.12.1
 ip nhrp map multicast 21.22.12.1
 ip nhrp network-id 10
 ip nhrp nhs 10.1.1.1
 tunnel source Ethernet0/0
 tunnel mode gre multipoint
 tunnel key 123
 tunnel protection ipsec profile DMVPN
!
interface Ethernet0/0
 ip address 21.22.24.4 255.255.255.0
 ip ospf network point-to-point
 half-duplex
!
router eigrp 10
 network 10.1.1.0 0.0.0.255
 network 192.168.4.0
 no auto-summary
!
router ospf 10
 router-id 192.168.4.1
 log-adjacency-changes
 network 21.22.24.0 0.0.0.255 area 0
查看NHRP信息:
Hub#sho ip nhrp
10.1.1.3/32 via 10.1.1.3, Tunnel0 created 00:13:51, expire 01:49:43
  Type: dynamic, Flags: authoritative unique registered
  NBMA address: 21.22.23.3
10.1.1.4/32 via 10.1.1.4, Tunnel0 created 00:13:53, expire 01:50:40
  Type: dynamic, Flags: authoritative unique registered
  NBMA address: 21.22.24.4

Spoke1#sho ip nhrp
10.1.1.1/32 via 10.1.1.1, Tunnel0 created 00:24:26, never expire
  Type: static, Flags: authoritative used
  NBMA address: 21.22.12.1

Spoke2#sho ip nhrp
10.1.1.1/32 via 10.1.1.1, Tunnel0 created 00:22:03, never expire
  Type: static, Flags: authoritative used
  NBMA address: 21.22.12.1
可以看到在Hub上已經有兩個分支的解析,同樣的兩個分支也可以解析到Hub物理接口的地址。
測試聯通性:
Spoke1#ping 192.168.4.1 source 192.168.3.1 repeat 1000

Type escape sequence to abort.
Sending 1000, 100-byte ICMP Echos to 192.168.4.1, timeout is 2 seconds:
Packet sent with a source address of 192.168.3.1
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!.
Success rate is 98 percent (50/51), round-trip min/avg/max = 20/44/88 ms
分支1到分支2的ping包可以通信,那么看是否需要經過Hub進行轉發。
Spoke1#traceroute 192.168.4.1 source 192.168.3.1

Type escape sequence to abort.
Tracing the route to 192.168.4.1

  1 10.1.1.1 20 msec 40 msec 16 msec
  2 10.1.1.4 40 msec 32 msec 52 msec
路由表情況
Hub#sho ip route eigrp
D    192.168.4.0/24 [90/297372416] via 10.1.1.4, 00:13:14, Tunnel0
D    192.168.3.0/24 [90/297372416] via 10.1.1.3, 00:14:09, Tunnel0
D    192.168.0.0/16 is a summary, 00:17:48, Null0

Spoke1#sho ip route eigrp
D    192.168.0.0/16 [90/297372416] via 10.1.1.1, 00:14:02, Tunnel0

Spoke2#sho ip route eigrp
D    192.168.0.0/16 [90/297372416] via 10.1.1.1, 00:13:30, Tunnel0


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM