Category: Cisco

VRF and OSPFv3

VRF and OSPFv3

Virtual Routing Forwarding used to create virtual routing instances in a router. Configurations: R1 hostname R1 ! ! ip vrf BLUE  description BLUE Virtual Forwarding ! ip vrf RED  description RED Virtual Forwarding ! ! interface Ethernet0/0  description RED Network 10  ip vrf forwarding RED  ip address 10.0.0.1 255.255.255.0  ipv6 enable  ospfv3 1 ipv4 area … Continue reading VRF and OSPFv3

Advertisements
FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

Using the configuration of the previous post we will configure R1 external interface as a Dynamic Virtual Tunnel Interface that will allow the dynamic creation of Virtual-Accesses one per connection. We will also add a new Router R3 to the mix as another peer in the flexVPN topology to get a hub and spoke topology. … Continue reading FlexVPN – DVTI – Dymanic Virtual Tunnel Interface

FlexVPN Site to Site – IKEv2

FlexVPN Site to Site – IKEv2

What is a FlexVPN? Cisco answers: "FlexVPN is Cisco's implementation of the IKEv2 standard featuring a unified paradigm and CLI that combines site to site, remote access, hub and spoke topologies and partial meshes (spoke to spoke direct). FlexVPN offers a simple but modular framework that extensively uses the tunnel interface paradigm while remaining compatible … Continue reading FlexVPN Site to Site – IKEv2

Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

The last post we talk about VTI to establish a connection between to points over the Internet. This connection was secure via IPSec and allowed dynamic routing protocols through it. The challenge in this post is to escalate this topology into multipoints, which is the usual topologies that we can encounter in the real world. … Continue reading Dynamic Virtual Tunnel Interface – Securing a Hub & Spoke Topology

Dynamic Routing Through IPSec Without GRE – Using VTI’s

Dynamic Routing Through IPSec Without GRE – Using VTI’s

On a previous post, we created a GRE tunnel to permit routing protocol through an insecure (Internet) network and protected it with IPSec. As you all should know GRE adds another layer of encapsulation (at least 4 bytes), which means more overhead. One major advantage compared with the traditional method of IPSec is that, since … Continue reading Dynamic Routing Through IPSec Without GRE – Using VTI’s