sfsdf |
Posted: 27 Nov 2011 10:00 AM PST |
VPN with HSRP High Availability Posted: 27 Nov 2011 08:46 AM PST The purpose of HSRP (Hot Standby Routing Protocol) is to check interfaces and other connectivity parameters, and if the interface is down then a failover takes place from Active HSRP Router to standby HSRP router. There is no direct correlation between HSRP and IPSEC. However, we can use HSRP to provide VPN tunnel failover, as we will explain in the example diagram below. For example assume the following scenario: A site-to-site IPSEC VPN is terminated on a router which happens to be the active HSRP router on a failover pair. If this router fails, then IPSEC must be immediately switched to HSRP standby Router. On diagram below, VIP means HSRP Virtual IP address. Equipment used in This lab: LAB Scenario: We've got HQ with two HSRP routers, and two Remote Offices. The PCs in Branches must have access to servers located in HQ. Therefore the connection must be using high availability and be secured, that's why two routers are located in HQ, which provide high availability and VPN Termination. First of all I've started EIGRP on external interfaces of Branches (Fa0/0) and on all interfaces of WAN Router. I'll not talk about how I did that. That step was only necessary to establish full routing connectivity for my lab scenario. HQ Routers Configuration: The Command "preempt" gives opportunity to router to become active if this router has higher priority than an existing one. For example: in our case when the lost interfaces on HQ1 come up again, the preempt command will bring HQ1 as active again. hq1#show running-config interface fastEthernet 0/1 hq2#show running-config interface fastEthernet 0/1 ! Configuration on WAN side is the same as on LAN. HSRP with the same priorities is on this interface as well. hq2#show running-config interface fastEthernet 0/0 interface FastEthernet0/0 ! Verify HSRP Configuration. Now active router for Group 1 and 2 are HQ1 and HQ2 is Standby. hq1#show standby brief hq2#show standby brief ! Now lets configure Crypto isakmp policy on HQ1 and HQ2 . Let's use the most light policy and also indicate KEY as well. crypto isakmp policy 10 ! Create access list, by which the traffic, going through the VPN Tunnel, will be matched. In this case traffic going from 192.168.1.0/24 to 192.168.4.0/24 and 192.168.5.0/24 networks. ! Create IPSEC Transform-set and dynamic crypto map. crypto dynamic-map vpn 10 crypto map dynmap 10 ipsec-isakmp dynamic vpn ! Let's consider the most interesting part, where we must do correlation between HSRP and IPSEC. Create a name of HSRP group and attach crypto map to HSRP group. After this we must assign HSRP virtual address to Branches in VPN Peer Addresses. When Active HSRP router switches to Standby Router, VPN tunnels will be switched from HSRP active router to HSRP Standby router as well. The above concludes the configuration of HQ Routers. Let's look at configuration of Branches. There is a standard configuration on Branches and in fact nothing is changed. Just remember that the peer address of the VPN tunnel in branches must be the VIP HSRP address of the HQ routers. Branch Routers Configuration: !set remote Peer IP address. In this case this will be the HSRP Virtual ip address. !create IPsec Transform set. !For Branch 2 Create Access-list which matches Interesting Traffic for VPN Tunnel. ! Create crypto map. In peer we indicate HSRP Virtual IP address. All the rest are not changed. Also turn on Reverse route, because when VPN tunnel is established, in Branches' routing table the VPN Tunnel Destination network will be added statically. First check VPN, ping SRV from Host1 and Host2 and see if VPN establishes and the traffic we want is matched. host1#ping 192.168.1.2 branch1#show crypto isakmp sa branch1#show crypto ipsec sa protected vrf: branch1#show access-lists vpn host2#ping 192.168.1.2 branch2#show crypto isakmp sa branch2#show crypto ipsec sa protected vrf: branch2#show access-lists vpn We see that everything is working as we want. Now let's see how High availability is working. Ping SRV from Host1 and at the same time let's switch off Fa0/1 on HQ1 and see how this switching will be done. host1#ping 192.168.1.2 repeat 100000 hq1#show crypto isakmp sa hq1#show standby brief hq2#show crypto isakmp sa hq2#show standby brief High availability is working as we planned. As a result of shutting down, some pings failed and soon switching occurred to HSRP Standby router and connection was established again. |
Template Monster New Mix Collection Posted: 27 Nov 2011 06:41 AM PST Template Monster website templates, Flash templates and other web design products are famous for being top quality solution for a quick, easy and affordable website production. The best part about our templates is the simplicity - you purchase the template package, customize it a little bit and upload it to your hosting... Download Now! |
You are subscribed to email updates from "Cisco" via Ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment