Guest

Novell / IPX Routing

GRE Tunneling IPX over ISDN

Application Note

GRE Tunneling IPX over ISDN

Network-to-User Business Unit

Abstract

This document presents a solution for generic routing encapsulation (GRE) tunneling Internetwork Packet Exchange (IPX) over Integrated Services Digital Network (ISDN). This tunneling allows a customer to connect a remote IPX network to a central site without routing IPX on all the intervening routers. The assumption is that IP is up and routing between the two end nodes. Sample connectivity configurations for this network are provided at the end of the document. More information about configuring encryption is provided in the Dialup Encryption Solution Guide.


Figure 1: Network Map


IPX Connectivity for Central Router

The step is to turn on IPX on the central site router. It is connected via Ethernet 1/1 to IPX network 1681140, which uses the Enhanced Interior Gateway Routing Protocol (IGRP) with the autonomous system number. The steps follow:

1. Turn on IPX routing:

central7206#conf t

Enter configuration commands, one per line. End with CNTL/Z.

central7206(config)#ipx routing

2. Assign IPX network 1681140 to Ethernet 1/1

central7206(config-if)#interface ethernet 1/1

central7206(config-if)#ipx network 1681140

3. Turn on Enhanced IGRP AS 2, with network 1681140.

central7206(config-if)#ipx router eigrp 2

central7206(config-ipx-route)#network 1681140

central7206(config-ipx-route)#exit

central7206#

%SYS-5-CONFIG_I: Configured from console by console

4. Use show IPX routes to ensure that the protocol is working.

central7206# show ipx route

Codes: C - Connected primary network, c - Connected secondary network

       S - Static, F - Floating static, L - Local (internal), W - IPXWAN

       R - RIP, E - EIGRP, N - NLSP, X - External, A - Aggregate

       s - seconds, u - uses

40 Total IPX routes. Up to 1 parallel paths and 16 hops allowed.

No default route known.

C     1681140 (NOVELL-ETHER), Et1/1

E     DAD [269340160/2] via 1681140.00e0.f727.1b66, age 00:00:09, 1u, Et1/1

E     BABE [269340160/2] via 1681140.00e0.f727.1b66, age 00:00:09, 1u, Et1/1

E     DADE [269337600/2] via 1681140.00e0.f727.1b66, age 00:00:09, 1u, Et1/1

E     16814 [309760/0] via 1681140.00e0.f727.1b66, age 00:00:09, 1u, Et1/0

E     16818 [309760/0] via 1681140.00e0.f727.1b66, age 00:00:09, 1u, Et1/0

E     16820 [286720/0] via 1681140.00e0.f727.1b66, age 00:00:09, 1u, Et1/0

GRE Tunnel

The second procedure is to set up the GRE tunnel and route IPX through it to the Cisco 1600. This procedure involves creating the tunnel interface on both routers. The Ethernet 0 of the Cisco 1600 and the Ethernet 1/1 of the Cisco 7206 are the endpoints of the tunnel. It will be a simple IP GRE tunnel.

1. Configure the tunnel interface of the Cisco 7206:

central7206#conf t

Enter configuration commands, one per line. End with CNTL/Z.

central7206(config)#interface tunnel 0

central7206(config-if)#tunnel source e 1/1

central7206(config-if)#tunnel destination 192.168.113.2

central7206(config-if)#

%LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to up

2. Configure the tunnel interface of the Cisco 1600:

home1600#conf t

Enter configuration commands, one per line. End with CNTL/Z.

home1600(config)#interface tunnel 0

home1600(config-if)#tunnel source Ethernet 0

home1600(config-if)#tunnel destination 192.168.114.2

home1600(config-if)#

%LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to up

IPX through GRE

1. Enable IPX routing on the Cisco 1600:

home1600(config)#ipx routing

home1600(config)ipx router rip

home1600(config-ipx-router)#network 1681130

home1600(config-ipx-router)#network 1681131

2. Turn on the IPX networks on its Ethernet and tunnel interfaces:

home1600(config)#interface ethernet 0

home1600(config-if)#ipx network 1681130

home1600(config-if)#interface tunnel 0

home1600(config-if)#ipx network 1681131

3. Turn on IPX network 1681131 on the tunnel interface of the Cisco 7206:

central7206(config)#interface tunnel 0

central7206(config-if)#ipx network 1681131

4. Turn on IPX Routing Information Protocol (RIP) on the Cisco 7206, and enable route redistribution:

central7206(config)#ipx router rip

central7206(config-ipx-route)#redistribute eigrp 2

central7206(config-ipx-route)#network 1681131

central7206(config-ipx-route)#ipx router eigrp 2

central7206(config-ipx-route)#redistribute rip

5. Run show IPX routes on the Cisco 1600 to ensure that routing is working:

home1600#show ipx route

Codes: C - Connected primary network, c - Connected secondary network

       S - Static, F - Floating static, L - Local (internal), W - IPXWAN

       R - RIP, E - EIGRP, N - NLSP, X - External, A - Aggregate

       s - seconds, u - uses

43 Total IPX routes. Up to 1 parallel paths and 16 hops allowed.

No default route known.

C     1681130 (NOVELL-ETHER), Et0

C     1681131 (TUNNEL), Tu0

R        DAD [155/03] via 1681131.0010.1179.6c00, 33s, Tu0

R       BABE [155/03] via 1681131.0010.1179.6c00, 34s, Tu0

R       DADE [155/03] via 1681131.0010.1179.6c00, 34s, Tu0

R      16814 [151/01] via 1681131.0010.1179.6c00, 34s, Tu0

R      16818 [151/01] via 1681131.0010.1179.6c00, 34s, Tu0

R      16820 [151/01] via 1681131.0010.1179.6c00, 34s, Tu0

R      16830 [151/01] via 1681131.0010.1179.6c00, 34s, Tu0

IPX Snapshot Routing

When IPX is up and routing, you will want to switch to snapshot routing through the tunnel unless you want the Basic Rate Interface (BRI) line to be up all the time.

1. Establish snapshot service on the tunnel interface of the Cisco 7206:

central7206(config)#interface tunnel 0

central7206(config-if)#snapshot server 10

2. Establish the tunnel interface on the Cisco 1600 as a snapshot client.

home1600(config)#interface tunnel 0

home1600(config-if)#snapshot client 10 240

Encrypting the Tunnel Interface

1. Generate and exchange keys:

central7206(config)#cry gen-signature-keys centralkey

 home1600(config)#cry gen-signature-keys

 homekey

Generating DSS keys ....

 [OK]

 Generating DSS keys ....

 [OK]

central7206(config)#cry key-exchange

 192.168.113.2 centralkey  

 home1600(config)#cry key-exchange

    passive

 Enter escape character to abort if connection  does  not complete.

 Wait for connection from peer[confirm]

 Waiting ....

Public key for centralkey:

 Serial Number 004E0C7E

 Fingerprint D796 BC6B F826 D06E 7559

 Public key for centralkey:

  Serial Number 004E0C7E

  Fingerprint D796 BC6B F826 D06E 7559

Wait for peer to send a key[confirm]

Waiting ....

 Add this public key to the configuration?

 [yes/no]: yes

 Send peer a key in return[confirm]

 Which one?

Public key for homekey:

 Serial Number 03306184

 Fingerprint BA91 46FA 90D1 5D43 9A47

 homekey? [yes]:

 Public key for homekey:

 Serial Number 03306184

 Fingerprint BA91 46FA 90D1 5D43 9A47

Add this public key to the configuration?

[yes/no]: yes



2. Create crypto maps and crypto access lists:

central7206(config)#cry map homemap 10

 home1600(config)#cry map centralmap 10

central7206(config-crypto-ma)#set peer homekey

 home1600(config-crypto-map)#set peer centralkey

central7206(config-crypto-ma)#set alg des

 home1600(config-crypto-map)#set alg des

central7206(config-crypto-ma)#match address 105

 home1600(config-crypto-map)#match address

 105

central7206(config-crypto-ma)#exit

 home1600(config-crypto-map)#exit

central7206(config)#access-list 105 permit gre

 home1600(config)#access-lsit 105 permit gre

host 192.168.114.2 host 192.168.113.2

 host 192.168.113.2 host 192.168.114.2



3. Apply them to both the incoming physical and the tunnel interfaces:

central7206(config-if)#interface tunnel 0

 home1600(config)#interface tunnel 0

central7206(config-if)#cry map homemap

 home1600(config-if)#cry map centralmap

central7206(config-if)#interface e 1/0

 home1600(config-if)#interface bri 0

central7206(config-if)#cry map homemap

 home1600(config-if)#cry map centralmap



4. Ping through to be certain that the encryption is working. Note that this may fail a couple of times while the initial session is being established. Debug crypto session-management and debug crypto engine may be useful commands for watching and debugging the process:

home1600# ping 1681140.0010.1179.6c09

Translating "1681140.0010.1179.6c09"

Type escape sequence to abort.

Sending 5, 100-byte IPX cisco Echoes to 1681140.0010.1179.6c09, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 56/56/60 ms

Caveats

Note that in this example, the central network is exposed between the time IPX routing is turned on to the Cisco 1600 and the time encryption is established. Therefore, care must be taken to ensure that nothing is compromised. One way to do this might be to turn off the Enhanced IGRP process on the central router until encryption has been configured.

Careful tuning of IPX snapshot routing and the session key timeouts could be used to configure the router to automatically establish encryption sessions at appropriate times; say, for instance, at the beginning of the working day and at lunch. Be aware that it could also cause problems if the connection establishment takes long enough that the snapshot burst is not fully received before the timeout.

Before and After Configurations

Cisco 7206 Configuration

hostname central7206

!

enable secret 5 $1$/0gr$u4bdVrIC6lNGGJRTdVBrb0

enable password cisco

!

ipx routing 0010.1179.6c00

!

crypto public-key homekey 03306184

 519F5C0A 695230E2 42342C69 87F96E7A 60A6FCE1 9E617B07 CFEF19D8 0CE9DA93

 8D8F23A4 13F5942F 5F1E5016 5F0ADB2A CFE50E40 2F51096E AD00EE7E C8E80018

 quit

!

crypto map homemap 10

 set algorithm des

 set peer homekey

 match address 105

!

interface Tunnel0

 no ip address

 ipx network 1681131

 snapshot server 10

 tunnel source Ethernet1/1

 tunnel destination 192.168.113.2

 crypto map homemap

!

interface Ethernet1/0

 ip address 192.168.112.6 255.255.255.0

 no mop enabled

 crypto map homemap

!

interface Ethernet1/1

 ip address 192.168.114.2 255.255.255.0

 ipx network 1681140

 no mop enabled

!

router eigrp 1

 redistribute connected

 network 192.168.112.0

 network 192.168.114.0

!

no ip classless

access-list 105 permit gre host 192.168.114.2 host 192.168.113.2

!

ipx router eigrp 2

 network 1681120

 network 1681140

!

line con 0

line aux 0

line vty 0 4

 password pms

 login

!

end

Cisco 1600 Configuration

hostname home1600

enable password pms

username central5200 password 7 13151A01

no ip domain-lookup

ipx routing 0060.5cbb.f59a

isdn switch-type basic-5ess

!

crypto public-key centralkey 004E0C7E

 A39659EB AF1EA202 D46E9145 3D7D0C31 DB291437 980F851B 7757AA79 469C6328

 958298CF 5CC2AC10 DCB62E85 DA690620 E6A8AFBC 1077D3A4 48B1C96E 19A84862

 quit

!

crypto map centralmap 10

 set algorithm des

 set peer centralkey

 match address 105

!

interface Tunnel0

 no ip address

 ipx network 1681131

 snapshot client 10 240

 tunnel source Ethernet0

 tunnel destination 192.168.114.2

 crypto map centralmap

!

interface Ethernet0

 ip address 192.168.113.2 255.255.255.0

ipx network 1681130

!

interface BRI0

 ip unnumbered Ethernet0

 encapsulation ppp

 dialer idle-timeout 300

 dialer map ip 192.168.112.3 name central5200 95552001

 dialer hold-queue 100

 dialer load-threshold 5

 dialer-group 1

 no fair-queue

 ppp multilink

 crypto map centralmap

!

ip classless

ip route 0.0.0.0 0.0.0.0 BRI0 192.168.112.3

access-list 101 permit ip any any

access-list 105 permit gre host 192.168.113.2 host 192.168.114.2

no cdp run

!

dialer-list 1 protocol ip list 101

!

line con 0

 exec-timeout 0 0

 password pms

 login

line vty 0 4

 password pms

 login

Cisco 5200 Configuration

hostname central5200

!

enable password pms

!

username home1600 password pms

no ip domain-lookup

isdn switch-type primary-5ess

!

controller T1 0

 framing esf

 clock source line primary

 linecode b8zs

 pri-group timeslots 1-24

 no shutdown

!

interface Ethernet0

 ip address 192.168.112.3 255.255.255.0

 no mop enabled

 no shutdown

!

interface Serial0:23

 ip unnumbered Ethernet0

 encapsulation ppp

 no keepalive

 dialer idle-timeout 6000

 dialer hold-queue 100

 dialer-group 1

 no fair-queue

 no cdp enable

 ppp authentication chap

 ppp multilink

 no shutdown

!

router eigrp 1

 redistribute connected

 network 192.168.112.0

!

no ip classless

ip route 0.0.0.0 0.0.0.0 192.168.112.1

access-list 101 permit ip any any

no cdp run

!

dialer-list 1 protocol ip list 101

!

line con 0

 exec-timeout 0 0

 password pms

 login

line 1 48

line aux 0

 password pms

 login

line vty 0 4

 password pms

 login

!

end