H3c-technologies H3C SecPath F1000-E Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Bezpieczeństwo H3c-technologies H3C SecPath F1000-E. H3C Technologies H3C SecPath F1000-E User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 0
i
Table of Contents
GRE Configuration······················································································································································· 1
GRE Overview···································································································································································1
Introduction to GRE ··················································································································································1
GRE Security Options ··············································································································································3
GRE Applications ·····················································································································································3
Protocols and Standards··········································································································································5
Configuring a GRE over IPv4 Tunnel ······························································································································5
Configuration Prerequisites ·····································································································································5
Configuration Procedure··········································································································································5
Configuring a GRE over IPv6 Tunnel ······························································································································6
Configuration Prerequisites ·····································································································································6
Configuration Procedure··········································································································································7
Displaying and Maintaining GRE ···································································································································8
GRE over IPv4 Tunnel Configuration Example···············································································································8
GRE over IPv6 Tunnel Configuration Example············································································································ 11
Troubleshooting GRE ····················································································································································· 14
Point to Multi-Point GRE Tunnel Configuration··········································································································· 1
P2MP GRE Tunnel Overview ···········································································································································1
Background·······························································································································································1
Operation of a P2MP GRE Tunnel··························································································································2
P2MP GRE Tunnel Backup·······································································································································3
Advantages and Restrictions of the P2MP GRE Tunnel Technology ···································································4
Configuring a P2MP GRE Tunnel ····································································································································5
Configuration Prerequisites ·····································································································································5
Configuring a P2MP GRE Tunnel ···························································································································5
Displaying and Maintaining P2MP GRE Tunnels ··········································································································7
P2MP GRE Tunnel Configuration Examples ···················································································································7
Basic P2MP GRE Tunnel Configuration Example··································································································7
Configuration Example for P2MP GRE Tunnel Backup at the Headquarters ·····················································9
Configuration Example for P2MP GRE Tunnel Backup at a Branch ································································ 13
Przeglądanie stron 0
1 2 3 4 5 6 ... 79 80

Podsumowanie treści

Strona 1 - Table of Contents

i Table of Contents GRE Configuration·················································································································

Strona 2 - GRE Configuration

9 Figure 8 Network diagram for a GRE over IPv4 tunnel Configuration procedure NOTE: Before the configuration, make sure that Device A and Device

Strona 3 - De-encapsulation process

10 [DeviceB] interface gigabitethernet 2/1 [DeviceB-GigabitEthernet2/1] ip address 2.2.2.2 255.255.255.0 [DeviceB-GigabitEthernet2/1] quit # Create a

Strona 4 - GRE Applications

11 Description: Tunnel0 Interface The Maximum Transmit Unit is 1476 Internet Address is 10.1.2.2/24 Primary Encapsulation is TUNNEL, service-loopback

Strona 5 - Device B

12 Configuration procedure NOTE: Before the configuration, make sure that Device A and Device B are reachable to each other. Step1 Configure Dev

Strona 6 - Configuration Procedure

13 [DeviceB-GigabitEthernet2/1] quit # Create an interface named Tunnel 0. [DeviceB] interface tunnel 0 # Configure an IPv4 address for interface Tun

Strona 7

14 Encapsulation is TUNNEL, service-loopback-group ID not set. Tunnel source 2002::2:1, destination 2002::1:1 Tunnel protocol/transport GRE/IPv6

Strona 8

15 Solution: • On Device A and Device C, execute the display ip routing-table command in any view respectively. On Device A, observe whether there

Strona 9

1 Point to Multi-Point GRE Tunnel Configuration This chapter includes these sections: • P2MP GRE Tunnel Overview • Configuring a P2MP GRE Tunnel • Di

Strona 10 - Configuration procedure

2 traditional P2P GRE tunnel mode. Then, a GRE tunnel will be established dynamically between the headquarters and each branch. Operation of a P2MP

Strona 11

3 P2MP GRE Tunnel Backup GRE tunnel backup at a branch Figure 13 GRE tunnel backup at a branch Device BDevice C(Backup gateway)IPv4 networkDevice ATu

Strona 12 - Network requirements

1 GRE Configuration This chapter includes these sections: • GRE Overview • Configuring a GRE over IPv4 Tunnel • Configuring a GRE over IPv6 Tunnel •

Strona 13

4 GRE tunnel backup at the headquarters Figure 14 GRE tunnel backup at the headquarters As shown in Figure 14, for higher network reliability, you

Strona 14

5 This not only ensures better cooperation of devices from different vendors, but also helps avoid repetitive investments on branch node devices. •

Strona 15 - Troubleshooting GRE

6 To do… Use the command… Remarks Configure the source address or interface for the tunnel interface source { ip-address | interface-type interface

Strona 16

7 • When configuring a route through the tunnel, you can configure a static route, using the address of the network segment that the original packet

Strona 17 - P2MP GRE Tunnel Overview

8 Figure 15 Network diagram for basic P2MP GRE tunnel configuration Configuration procedure Step1 Configure Device A # Configure an IP address for

Strona 18 - GRE tunnel

9 [DeviceB–GigabitEthernet1/1] quit # Configure an IP address for interface GigabitEthernet 1/2. [DeviceB] interface gigabitethernet 1/2 [DeviceB–Gig

Strona 19 - P2MP GRE Tunnel Backup

10 NOTE: To avoid looping, do not configure the tunnel interface of the GRE over IPv4 tunnel as the backup interfaceof the P2MP GRE tunnel interfac

Strona 20 - Technology

11 # Configure the tunnel encapsulation mode of interface Tunnel 0 as P2MP GRE. [DeviceA-Tunnel0] tunnel-protocol gre p2mp # Configure the mask of th

Strona 21 - Configuration Prerequisites

12 [DeviceC-Tunnel0] ip address 172.168.1.3 255.255.255.0 # Configure the tunnel encapsulation mode of interface Tunnel 0 as GRE over IPv4. [DeviceC-

Strona 22

13 The output information indicates that on Device A there was a tunnel entry to the branch network, and packets to the branch network were forwarded

Strona 23

2 Format of an encapsulated packet Figure 2 shows the format of an encapsulated packet. Figure 2 Format of an encapsulated packet As an example, Fi

Strona 24

14 Figure 17 Network diagram for P2MP GRE tunnel backup at a branch GE1/1GE1/1Device BDevice C(Backup gateway)IPv4 networkDevice AGE1/1GE1/2Tunnel0Tu

Strona 25 - Headquarters

15 [DeviceB-Tunnel0] tunnel-protocol gre # Configure the source and destination IP addresses of interface Tunnel 0. [DeviceB-Tunnel0] source 11.1.1.2

Strona 26

16 # On Host B, specify Device C as the default gateway. After the tunnel entry corresponding to Device B ages out, ping Host A from Host B. The ping

Strona 27 - Step3 Configure Device C

i Table of Contents L2TP Configuration················································································································

Strona 28 - Verification

1 L2TP Configuration This chapter includes these sections: • L2TP Overview • L2TP Configuration Task List • Displaying and Maintaining L2TP • L2TP Co

Strona 29

2 Figure 1 VPDN built by using L2TP PPPoE/ISDNInternetL2TP tunnelRemote userRemote branchLACLNSInternal server A VPDN built by using L2TP comprises

Strona 30

3 L2TP architecture Figure 2 shows the relationship between the PPP frame, control channel, and data channel. PPP frames are transferred over unrelia

Strona 31

4 same tunnel ID but different session IDs are multiplexed to the same tunnel. The tunnel ID and session ID in a header are the intended receiver’s,

Strona 32

5 Figure 6 LAC-auto-initiated tunneling mode L2TP tunnel establishment process Figure 7 shows a typical L2TP network. Figure 7 Typical L2TP network

Strona 33

6 Figure 8 L2TP call setup procedure (1) Call setup(2) PPP LCP setup(3) PAP or CHAP authenticaion(4) Access request(5) Access accept(6) Tunnel setup(

Strona 34 - L2TP Configuration

3 GRE Security Options For the purpose of tunnel security, GRE provides two options: tunnel interface key and end-to-end checksum. According to RFC 1

Strona 35 - Basic Concepts of L2TP

7 14. The RADIUS server authenticates the access request and returns a response if the user passes authentication. 15. The LNS assigns an internal I

Strona 36 - Tunnel and session

8 Task Remarks Enable L2TP Create an L2TP group Configuring Basic L2TP Capability Specify the local name of the tunnel Required Configuring an LAC t

Strona 37 - L2TP tunnel

9 To do… Use the command… Remarks Specify the local name of the tunnel tunnel name name Optional The system name of the device is used by default.

Strona 38

10 To do… Use the command… Remarks Specify that AVP data be transferred in hidden mode tunnel avp-hidden Optional By default, AVP data is transferr

Strona 39

11 Configuring an LAC to Establish an L2TP Tunnel To configure an LAC to establish an L2TP tunnel, you need to: • Create a virtual template interfac

Strona 40 - L2TP Configuration Task List

12 NOTE: An L2TP tunnel established in LAC-auto-initiated mode exists until you remove the tunnel by using the undol2tp-auto-client enable command.

Strona 41 - system-view

13 To do… Use the command… Remarks Configure the authentication mode for PPP users ppp authentication-mode { chap | pap } [ [ call-in ] domain isp-

Strona 42 - Configuring an LAC

14 virtual template interface is PAP. If the authentication type configured on the virtual template interface is CHAP but that configured on the LAC

Strona 43 - RADIUS Configuration

15 To do… Use the command… Remarks Enter system view system-view — Enter L2TP group view l2tp-group group-number — Specify the LNS to perform LCP r

Strona 44

16 Specifying to Send ACCM According to RFC 2661, the Asynchronous Control Character Map (ACCM) AVP enables an LNS to inform the LAC of the ACCM that

Strona 45 - Configuring an LNS

4 Scope enlargement of a hop-limited protocol such as RIP Figure 5 Network scope enlargement When the hop count between two terminals exceeds 15, t

Strona 46

17 response packet from the peer within a specified period of time, it retransmits the Hello packet. If it receives no response packet from the peer

Strona 47

18 To do… Use the command… Remarks Display information about L2TP sessions display l2tp session Available in any view L2TP Configuration Examples

Strona 48 - Enabling L2TP Multi-Instance

19 # Create an L2TP group and configure its attributes. [LAC] l2tp-group 1 [LAC-l2tp1] tunnel name LAC [LAC-l2tp1] start l2tp ip 1.1.2.2 fullusername

Strona 49 - Setting the Hello Interval

20 [LNS] dis l2tp tunnel Total tunnel = 1 LocalTID RemoteTID RemoteAddress Port Sessions RemoteName 1 1 1.1.2.1 1701

Strona 50 - Enabling Tunnel Flow Control

21 [LNS-isp-system] quit # Enable L2TP. [LNS] l2tp enable # Configure the virtual template interface. [LNS] interface virtual-template 1 [LNS-virtual

Strona 51 - L2TP Configuration Examples

22 Configuration Example for LAC-Auto-Initiated VPN Network requirements Create a virtual PPP user on the LAC and configure the LAC to initiate a tun

Strona 52 - Step3 User side operation

23 [LNS-l2tp1] tunnel name LNS [LNS-l2tp1] allow l2tp virtual-template 1 remote LAC # Enable tunnel authentication and configure the authentication p

Strona 53

24 Step3 Verify the configurations # On the LNS, perform the display l2tp session command to view the established L2TP session. [LNS] display l2tp se

Strona 54

25 Figure 12 Network diagram for L2TP multi-domain application WANCorporate network 1L2TP tunnelEth1/21.1.2.1/24GE1/11.1.2.2/24LNSLACHost ACorporate

Strona 55 - Configuraton procedure

26 # Create the virtual template interfaces and configure CHAP authentication. [LAC] interface virtual-template 100 [LAC-Virtual-Template100] ppp aut

Strona 56 - Step2 Configure the LAC

5 Protocols and Standards • RFC 1701 Generic Routing Encapsulation (GRE) • RFC 1702 Generic Routing Encapsulation over IPv4 networks • RFC 2784

Strona 57

27 [LNS-isp-aaa.net] ip pool 1 10.0.1.10 10.0.1.100 [LNS-isp-aaa.net] quit [LNS] domain bbb.net [LNS-isp-bbb.net] authentication ppp local [LNS-isp-b

Strona 58

28 LocalSID RemoteSID LocalTID 17345 4351 1 23914 10923 2 # On the LNS, use the display l2tp tunnel command to check the e

Strona 59

29 Symptom 2: Data transmission fails. A connection is setup but data cannot be transmitted. For example, the LAC and LNS cannot ping each other. Ana

Strona 60 - Step3 Configure the users

i Table of Contents L3VPN Configuration···············································································································

Strona 61 - Troubleshooting L2TP

1 L3VPN Configuration This chapter includes these sections: • L3VPN Overview • L3VPN Configuration Task List • Displaying and Maintaining L3VPN • L3V

Strona 62

2 Figure 1 Network diagram for L3VPN model VPN 1CESite 1VPN 2CECECESite 3VPN 2PEVPN 1Site 2Site 4PEPEPPPP CEs and PEs mark the boundary between the

Strona 63

3 The address spaces of VPNs may overlap. For example, if both VPN 1 and VPN 2 use the addresses on network segment 10.110.10.0/24, address space ove

Strona 64 - L3VPN Configuration

4 In the simplest case, all users in a VPN form a closed user group. They can forward traffic to each other but cannot communicate with any user outs

Strona 65 - L3VPN Concepts

5 Figure 3 Network diagram for hub and spoke networking scheme In Figure 3, the spoke sites communicate with each other through the hub site. The a

Strona 66 - L3VPN Networking Schemes

6 Figure 4 Network diagram for extranet networking scheme CECEPE 1PE 3Site 2Site 1Site 3VPN 1VPN 1VPN 2VPN 1:Import:100:1Export:100:1CEVPN 2:Import:2

Strona 67

6 To do… Use the command… Remarks Configure the key for the GRE tunnel interface gre key key-number Optional By default, no key is configured for a

Strona 68 - Extranet networking scheme

7 In the OSPF VPN extension application, the VPN backbone is considered the backbone area (area 0). Since OSPF requires that the backbone area must b

Strona 69 - OSPF VPN Extension

8 It is required that each OSPF domain has a configurable domain ID. It is recommended to configure for all OSPF instances in the network related to

Strona 70 - 2. BGP/OSPF interaction

9 To do… Use the command… Remarks Enter system view system-view — Create a VPN instance and enter VPN instance view ip vpn-instance vpn-instance-na

Strona 71 - Configuring VPN Instances

10 Follow these steps to configure route related attributes of a VPN instance To do… Use the command… Remarks Enter system view system-view — Enter

Strona 72

11 To do… Use the command… Remarks Create a VPN instance and enter VPN instance view ip vpn-instance vpn-instance-name Required No VPN instance exi

Strona 73 - Configuring Basic L3VPN

12 Follow these steps to configure RIP between PE and CE: To do… Use the command… Remarks Enter system view system-view — Create a RIP instance bet

Strona 74 - IP Routing Volume

13 The domain ID of an OSPF process is included in the routes generated by the process. When an OSPF route is injected into BGP, the OSPF domain ID i

Strona 75 - IP Routing Volume

14 To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Configure the PE as the peer peer { group-name |

Strona 76 - OSPF Configuration

15 To do… Use the command… Remarks Display information about the forwarding table of a VPN instance display fib vpn-instance vpn-instance-name [ |

Strona 77 - Resetting BGP Connections

16 To do… Use the command… Remarks Clear route flap history information about a BGP peer of a VPN instance reset bgp vpn-instance vpn-instance-name

Strona 78

7 Configuration Procedure Follow these steps to configure a GRE over IPv6 tunnel: To do… Use the command… Remarks Enter system view system-view — E

Strona 79 - L3VPN Configuration Example

17 [CE-GigabitEthernet0/0] ip binding vpn-instance CE-VPN1 [CE-GigabitEthernet0/0] ip address 10.1.1.2 255.255.255.0 # Configure interface GigabitEt

Strona 80

8 • For information about commands interface tunnel, tunnel-protocol, source, destination, and encapsulation-limit, see Tunneling Commands in the IP

Komentarze do niniejszej Instrukcji

Brak uwag