Configuring Traffic Shaping on the Enterasys C2 Switch.
Category Archives: Network
WAVE-276 and the second Virtuale Blade
So finally with WAAS-4.1.3.55 cames out and you can conifigure a second virtual Blade.
Nice;-)
DMVPN with Linux
I know since i discovered the DMVPN in 2004/5 this is a very intelligent combination of IPsec, GRE and NHRP. Many Thanks to the Guys at Cisco, Christoph, Frederick and all other.
This week i discovered “opennhrp” on sourceforge.
It took me a minute or two to have a VM with debian up and the needed tools installed.
I used VMWare with a bridged ethernet interface for testing, installed debian 4.0 netinstall iso and upgraded to sid / testing, so i got Kernel Version 2.6.26-1-686.
Then downloaded ipsec-tools-0.8-alpha20090126.tar.bz2 from the site. you have to install some libs and tools to build ipsec tools, like kernel headers and so on:-) and done some configure and make stuff.
I went to make opennhrp, well all done with out a problem to here.
Next i configured racoon and ipsec-tools and opennhrp like this:
/etc/ipsec-tools.conf #!/usr/sbin/setkey -f spdflush; spdadd 0.0.0.0/0 0.0.0.0/0 gre -P out ipsec esp/transport//require; spdadd 0.0.0.0/0 0.0.0.0/0 gre -P in ipsec esp/transport//require;
/etc/racoon/racoon.conf path pre_shared_key "/etc/racoon/psk.txt"; remote anonymous { exchange_mode main,aggressive; lifetime time 24 hour; # nat_traversal on; script "/etc/opennhrp/racoon-ph1down.sh" phase1_down; proposal { encryption_algorithm 3des; hash_algorithm sha1; authentication_method pre_shared_key; dh_group 5; } } sainfo anonymous { lifetime time 12 hour; encryption_algorithm 3des, blowfish 448, rijndael; authentication_algorithm hmac_sha1, hmac_md5; compression_algorithm deflate; }
/etc/racoon/psk.txt 10.2.0.90 1234
/etc/opennhrp/opennhrp.conf interface gre1 map 172.255.255.1/24 10.2.0.90 register cisco cisco-authentication 1234 shortcut
No get the Tunnel UP:
ip tunnel add gre1 mode gre key 1234 ttl 64 ip addr add 172.255.255.2/24 dev gre1 ip tunnel change gre1 local 10.0.81.115 ip link set gre1 up
Now its time to get on the other side.
We are using a Cisco 1812 with c181x-advsecurityk9-mz.124-15.T7.bin running.
crypto isakmp policy 10 encr 3des authentication pre-share group 5 ! crypto isakmp key 1234 address 0.0.0.0 0.0.0.0 ! crypto ipsec transform-set TRANSFORMSET_3 esp-3des esp-sha-hmac mode transport ! crypto ipsec profile Profile3 set transform-set TRANSFORMSET_3 ! interface Tunnel888 ip address 172.255.255.1 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp ip mtu 1400 ip flow ingress ip nhrp authentication 1234 ip nhrp map multicast dynamic ip nhrp network-id 10064 ip nhrp holdtime 360 ip nhrp max-send 200 every 10 ip route-cache same-interface ip tcp adjust-mss 1350 load-interval 30 tunnel source 10.2.0.90 tunnel mode gre multipoint tunnel key 1234 tunnel protection ipsec profile Profile3
and viola
Router# sh dmvpn interface tunnel 888 Load for five secs: 8%/3%; one minute: 9%; five minutes: 10% Time source is NTP, 22:14:22.148 CET Sat Feb 14 2009 Legend: Attrb --> S - Static, D - Dynamic, I - Incompletea N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer Tunnel888, Type:Hub, NHRP Peers:1, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 10.0.81.115 172.255.255.2 UP never D
Router# ping 172.255.255.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.255.255.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms
this looks great:-)
Many thanks Timo for doing such a impressiv work. I like the cisco for they impressiv boxes and i also like opensource software.
— edit February 15, 2009 at 12:09 am —
I found after a while no packets traveling, the nhrp registration had gone on the cisco side may be holdtimers differ so added “holding-time 360” to the opennhrp.conf , a opennhrpctl purge fixed the problem.
Cisco Visio Icons
Recently i have been asked to hold a presentation about the network design we had developed for our key project. My Company had decided to unify the computing infrastucture and client enviroment for all relateted companies.
So i will do a presentation on Cisco WAAS Platform on Tuesday next week, and i needed uptodate visio stencils for my presentation. Here i found them http://www.cisco.com/web/about/ac50/ac47/2.html .
TCP/IP ISO OSI Layers
ISO OSI | TCP/IP | |||
7 | Application | 4 | Application | |
6 | Presentation | |||
5 | Session | |||
4 | Transport | 3 | Transport | |
3 | Network | 2 | Internet | |
2 | Data | 1 | Network Access | |
1 | Physical |
Cisco IOS CLI Modes
EXEC Prompt | Router> enable |
Privileged EXEC Prompt | Router# configure terminal |
Gobal Configuration Mode | Router(config)# interface FastEthernet0/0 |
Interface Configuration Mode | Router(config-if)#interface FastEthernet 0/0.1 |
SubInterface Configuration Mode | Router(config-subif)# line console 0 |
Line Configuration Mode | Router(config-line)# |
Controller Configuration Mode | Router(config-controller)# router rip |
Router Configuration Mode | Router(config-router)#end |
Packetcapture auf der WAAS
Kürzlich hab ich entdeckt das man auf der WAAS Packete mit schneiden kann.
Auf der WAE ist tcpdump installiert, den kann man in der gewohnten weise zum sniffern gebrauchen.
# tcpdump -s 0 -w /local1/out.pcap
# copy disk ftp a.x.y.z / out.pcap /local1/out.pcap
# delfile /local1/out.pcap
Der Rest ist dann ganz normale Arbeit für wireshark.
Ich wuste es doch meine Router sind Telephone
So So ich wuste es doch meine Router sind Telephone oder doch nicht. Nach dem wir auf unseren Zentralen DMVPN Routern das 12.4.15T7 IOS Release eingespielt hatten, sahen wir einen massiven Anstieg im Memory duch den CDP Process. Ein Debug der cdp events ergab folgende Log Meldungen:
Jan 19 12:12:51.513 UTC: CDP-EV: Lookup for ip phone with idb= Tunnel105 ip= a.b.x.y mac= 0000.0000.0000 platform= Cisco 1721
Jan 19 12:12:51.517 UTC: CDP-EV: Lookup for ip phone with idb= Tunnel105 ip= a.b.x.y mac= 0000.0000.0000 platform= Cisco 1812
Jan 19 12:12:52.141 UTC: CDP-EV: Lookup for ip phone with idb= Tunnel105 ip= a.b.x.y mac= 0000.0000.0000 platform= Cisco C836
Funny, mal sehen was das heist:-)
I know it my routers are ip-phones
So So ich wuste es doch meine Router sind Telephone oder doch nicht. Nach dem wir auf unseren Zentralen DMVPN Routern das 12.4.15T7 IOS Release eingespielt hatten, sahen wir einen massiven Anstieg im Memory duch den CDP Process. Ein Debug der cdp events ergab folgende Log Meldungen:
Jan 19 12:12:51.513 UTC: CDP-EV: Lookup for ip phone with idb= Tunnel105 ip= a.b.x.y mac= 0000.0000.0000 platform= Cisco 1721
Jan 19 12:12:51.517 UTC: CDP-EV: Lookup for ip phone with idb= Tunnel105 ip= a.b.x.y mac= 0000.0000.0000 platform= Cisco 1812
Jan 19 12:12:52.141 UTC: CDP-EV: Lookup for ip phone with idb= Tunnel105 ip= a.b.x.y mac= 0000.0000.0000 platform= Cisco C836
Funny, mal sehen was das heist:-)
Cisco WAAS mit IOS Router
Die Configuration auf einem IOS Router ist analog zu der Configuration auf den Switchen, deshalb werd ich die hier nicht wiederholen.
Die Configuration auf der WAAS wird nicht fest configuriert sondern über wccp ausgehandelt.
[sourcecode]
wccp router-list 1 10.2.0.145
wccp tcp-promiscuous router-list-num 1
wccp version 2
egress-method negotiated-return intercept-method wccp
[/sourcecode]
If you feel this helps a bit or may be not ? Please leave a comment.