![]() |
SYSTEM ADMINISTRATOR GUIDE 69/1543-CRA 119 1170/1-V1 Uen B1 | ![]() |
Copyright
© Ericsson AB 2009–2010. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.
Disclaimer
The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.
Trademark List
SmartEdge | is a registered trademark of Telefonaktiebolaget LM Ericsson. | |
NetOp | is a trademark of Telefonaktiebolaget LM Ericsson. |
This document shows how to configure, monitor, and administer single-circuit tunnel types which includes IP-in-IP, overlay, and single-circuit Generic Routing Encapsulation (GRE) tunnels.
The term tunnel refers to the tunnel encapsulation and its circuit.
GRE is a simple, stateless protocol that allows for the tunneling of IP in IP. The SmartEdge router implementation of GRE over IPv4 is based on these IETF documents:
GRE tunnels allow you to connect remote sites using IPv6 addresses over a public network that uses publicly routable IPv4 addresses. IPv6 packets traveling through the tunnel are encapsulated with a GRE header and then with an IPv4 header using addresses from the public IPv4 address as shown in Figure 1.
GRE tunnels also allow you to connect remote sites using private IP addresses over a public network that uses publicly routable IP addresses. IP packets traveling through the tunnel are encapsulated with an IP header from the public address space as shown in Figure 2.
IP-in-IP tunnels transport IP payload packets encapsulated inside an outer IP header. This tunneling mode has been introduced to support Mobile IP services, which use IP-in-IP tunnels to transport packets from a mobile node (MN) when the packets are forwarded from the foreign agent (FA) to the home agent (HA) and, optionally, in the reverse direction.
Overlay tunnels encapsulate IPv6 packets in IPv4 packets for delivery across an IPv4 infrastructure (a core network or the Internet). By using overlay tunnels, you can communicate with isolated IPv6 networks without upgrading the IPv4 infrastructure between them.
An overlay tunnel is used within a site or between sites; it is equivalent to a permanent link between two IPv6 domains over an IPv4 backbone. The primary use is for stable connections that require regular secure communication between two edge routers or between an end system and an edge router, or for connection to remote IPv6 networks. You can configure overlay tunnels between border routers or between a border router and a host. The host or router at each end of a tunnel must support both the IPv4 and IPv6 protocol stacks.
The SmartEdge router implementation of overlay tunnels is based on the RFC 2893, Transition Mechanisms for IPv6 Hosts and Routers. Figure 3 displays encapsulated IPv6 packets traveling through the tunnel.
For information about GRE tunnels that support multiple tunnel circuits, see Configuring GRE Tunnels.
To configure tunnels and perform tunnel and tunnel circuit operations, perform the tasks in the following sections.
To configure a tunnel of any type, perform the tasks described in Table 1.
Step |
Task |
Root Command |
Notes |
---|---|---|---|
1. |
Create or select the context for the tunnel interface and access context configuration mode. |
Enter this command in global configuration mode. | |
Create or select the local tunnel endpoint and access interface configuration mode. This interface becomes the local tunnel endpoint only when, in tunnel configuration mode ( step 6), it is bound. |
Enter this command in the context mode created or selected in the previous step. | ||
Assign an IP address to the interface. |
Enter this command in interface mode. This is an IPv4 address. | ||
4. |
Create the tunnel, specify its type, and access tunnel configuration mode. |
Enter this command in global configuration mode. An alternative method of configuring GRE tunnels is described in Configuring GRE Tunnels. | |
5. |
Assign IP addresses to both the local and remote tunnel endpoints. For the local tunnel endpoint, enter the IP address configured in step 3. |
Enter this command in tunnel configuration mode. You must assign IP addresses to both the local and remote tunnel endpoints unless you are creating an overlay tunnel with a system-generated remote address. | |
Bind the tunnel to the interface you created in step 2. |
Enter this command in tunnel configuration mode. | ||
7. |
Specify optional tunnel attributes. Enter the following commands in tunnel configuration mode: | ||
Clear the IP header DF flag. |
Not available for overlay tunnels. | ||
Associate a description with the tunnel. |
|||
Enable the sending of keepalive packets. |
This command is available only for GRE tunnels. Note: Do not configure your SmartEdge router router so that keepalive packets might be forwarded and received on a tunnel endpoint that is bound to a different context. | ||
Enable the logging of state changes. |
|||
Set the MTU for the tunnel. |
|||
8. |
Enable the tunnel (begin operations on it). |
Use the no form of this command to enable the tunnel. |
To monitor and troubleshoot GRE tunnels and tunnel circuits, perform the appropriate task listed in Table 2. Enter the clear and debug commands in exec mode; enter the show commands in any mode.
Task |
Root Command |
---|---|
Clear the circuit counters for one or more GRE tunnel circuits in the system. |
|
Enable the generation of debug messages for circuit events. |
|
Enable the generation of debug messages for dynamic tunnel client events. |
|
Display circuit information for one or more tunnel circuits in the system. |
|
Display general counters and counters specific to the GRE tunnel circuit type for one or more GRE tunnel circuits in the system. |
|
Display configuration commands for a GRE tunnel circuit. |
|
Display GRE and IP-IP tunnel, or tunnel circuit information, or the IP Version 6 (IPv6) tunnel. |
|
Display information about dynamic tunnel clients that are registered with the tunnel manager. |
|
Display the bindings for GRE tunnels and the interfaces to which they are bound. |
An example configuration for each type of tunnel is provided in the following sections:
The following example shows how to configure a GRE tunnel to Hartford on the SmartEdge router in New York:
!Create the interface for the GRE tunnel in the local context [local]NewYork(config)#context local [local]NewYork(config-ctx)#interface toHartford !Assign a public IP address to the local tunnel interface [local]NewYork(config-if)#ip address 172.17.1.1/30 [local]NewYork(config-if)#exit [local]NewYork(config-ctx)#exit !Configure the tunnel with the local IP address of its interface [local]NewYork(config)#tunnel gre HartfordTnl [local]NewYork(config-tunnel)#peer-end-point local 172.17.1.1 remote 172.17.1.2 [local]NewYork(config-tunnel)#description Hartford tunnel [local]NewYork(config-tunnel)#no shutdown
The following example shows how to configure an IP-in-IP tunnel, HaTnl, with its interface toHA in the local context:
! Create the interface for the IP-in-IP tunnel interface [local]Redback(config)#context local [local]Redback(config-ctx)#interface toHA [local]Redback(config-if)#ip address 20.2.1.1/16 [local]Redback(config-if)#exit !Configure the IP-in-IP tunnel (bind it to the tunnel interface in the local context) [local]Redback(config)#tunnel ipip HaTnl [local]Redback(config-tunnel)#peer-end-point local 20.1.1.1 remote 20.1.1.2 [local]Redback(config-tunnel)#bind interface toHa local [local]Redback(config-tunnel)#end
The following example shows how to configure an overlay tunnel, DenverTnl, with its interface, toDenver, and the interface for its IPv6 tunnel, IPv6-circuit, in the local context:
!Create the IPv4 interface for the tunnel in the local context [local]Redback(config)#context local [local]Redback(config-ctx)#interface toDenver !Assign an IPv4 public IP address to the local tunnel interface [local]Redback(config-if)#ip address 172.16.1.1/30 [local]Redback(config-if)#exit !Create the interface for the tunnel [local]Redback(config-ctx)#interface IPv6-circuit !Assign an IPv6 public address to the interface for the tunnel [local]Redback(config-if)#ipv6 7001::1/64 [local]Redback(config-if)#exit [local]Redback(config-ctx)#exit !Create the tunnel with IPv4 addresses for its endpoints !The local end uses the IPv4 address of the tunnel’s interface. [local]Redback(config)#tunnel ipv6v4-manual DenverTnl [local]Redback(config-tunnel)#peer-end-point local 172.16.1.1 remote 172.16.1.2 [local]Redback(config-tunnel)#log-state-changes [local]Redback(config-tunnel)#description IPv6 over IPv4 tunnel with a single circuit [local]Redback(config-tunnel)#mtu 1024 !Bind the tunnel to the interface with the IPv6 address, in the local context [local]Redback(config-tunnel)#bind interface IPv6-circuit local [local]Redback(config-tunnel)#end [local]Redback(config-tunnel)#no shutdown [local]Redback(config-tunnel)#exit