09-24-2015 01:01 AM - edited 03-05-2019 02:22 AM
Hi,
I have a Cisco 887VA router, the problem is I trying to figure out how I can have a fail over between two ADSL lines if the main one go's off.
The router has one ADSL/VDSL port and 4 LAN ports. I have some ADSL modems but I'm not sure what technology to use.
Does anyone have a suggestion?
Thanks
Doug
Solved! Go to Solution.
10-03-2015 04:58 AM
Hi Doug,
You are right - the Dialer interfaces are always up and even if they do not have an IP address currently assigned, they nonetheless may participate in the routing table as egress interfaces for static routes. We'll need to modify our configuration somewhat.
Please paste the following lines into your configuration:
no ip route 0.0.0.0 0.0.0.0 Dialer0 no ip route 0.0.0.0 0.0.0.0 Dialer1 ! track 1 interface Dialer0 ip routing track 2 interface Dialer1 ip routing ! ip route 0.0.0.0 0.0.0.0 Dialer0 2 track 1 ip route 0.0.0.0 0.0.0.0 Dialer1 track 2
What I am doing here is first removing the existing two default routes and then introducing two so-called track objects - objects that verify a specific property of a certain router or IOS component or mechanism, and then report Up or Down status based on this property. The track object 1 checks whether the Dialer0 has an IP address assigned and is thus fully capable of participating in routing. The track object 2 does the same for Dialer1 interface. Afterwards, the static default routes are configured again, but this time, they are subjected to the states of the tracking object. The default route through Dialer1 will only be considered to be installed into the routing table if the track object 2 says it is Up, meaning that Dialer1 has its IP address assigned. Similarly, the default route through Dialer0 will only be considered to be installed into the routing table if the track object 1 says it is Up, meaning that Dialer0 has its IP address assigned. If both track objects are up then it is up to administrative distances to decide which one of these two goes into the routing table, with the path through Dialer1 being preferred. If only one of the track objects is up, there is no tie between the default routes, as the one with its tracking object being Down is prohibited from entering the routing table anyway.
Would you please mind testing this out?
Best regards,
Peter
09-24-2015 01:11 AM
Hi Doug,
So if I understand you correctly, you have exactly one Cisco 887VA routes with a built-in ADSL/VDSL interface, and another set of standalone ADSL modems (truly modems or modems+routers?), and you want to configure the 887 so that if the primary ADSL link goes down, another one will take over. Is that correct?
What you could do is to reserve one of the LAN ports as an additional "WAN" port to which the extra ADSL modem would be connected. You would run PPPoE over this additional "WAN" port through the ADSL modem to your ISP, and you would have two default routes configured on the 887, one pointing to the primary link, and if that one goes down, a second default route pointing through the added ADSL modem.
This setup assumes a series of requirements:
Would this be feasible for you?
Best regards,
Peter
09-24-2015 03:19 AM
HI Peter,
Yes, you understood me correctly. Your assumptions are correct. I've got a selection of modem only and modems with routing. The ISP's are deterrent and support PPPoA and PPPoE.
Thanks,
Doug
09-24-2015 06:36 AM
Hi Doug,
Okay, perfect :)
Would it be possible for you to post your current configuration of the 887 router after removing all sensitive information? It would help me very much to suggest the needed changes to the configuration. I can do it without seeing your config but that would require me to do it in a very general way, not tailored for your current addressing etc.
Best regards,
Peter
09-24-2015 11:54 PM
Thanks Peter,
Just a few nots about the config. I've setup Dialer1 ready for VDSL as the new line being installed is VDSL. The telco is supplying a new VDSL modem only this could probably be plug into one of the LAN ports and be set as the primary link is that possible.
SE-RT-01#sh run
Building configuration...
Current configuration : 5413 bytes
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SE-RT-01
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 ****
!
aaa new-model
!
!
aaa authentication login VPNUSERSAUTH local
aaa authorization network VPNUSERS local
!
!
!
!
!
aaa session-id common
memory-size iomem 10
!
crypto pki trustpoint TP-self-signed-3340949772
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3340949772
revocation-check none
rsakeypair TP-self-signed-3340949772
!
!
!
ip domain name ****
ip name-server 192.168.20.201
ip cef
no ipv6 cef
!
!
multilink bundle-name authenticated
license udi pid CISCO887VA-SEC-K9 sn ****
!
!
username **** privilege 15 secret 5 ****
!
!
!
!
!
controller VDSL 0
!
!
!
crypto isakmp policy 7
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp client configuration group VPNUSERS
key ****
dns 192.168.20.201
domain ****
pool VPN-POOL
acl VPNSPLIT
!
!
crypto ipsec transform-set **** esp-3des esp-md5-hmac
mode tunnel
!
!
!
crypto dynamic-map ****
reverse-route
!
!
crypto map MAP-OUTSIDE client authentication list VPNUSERSAUTH
crypto map MAP-OUTSIDE isakmp authorization list VPNUSERS
crypto map MAP-OUTSIDE client configuration address respond
crypto map MAP-OUTSIDE 1 ipsec-isakmp dynamic VPNDYNMAP
!
!
!
!
!
interface Ethernet0
no ip address
shutdown
!
interface Ethernet0.101
encapsulation dot1Q 101
shutdown
pppoe enable group global
pppoe-client dial-pool-number 1
!
interface ATM0
no ip address
no atm ilmi-keepalive
!
interface ATM0.1 point-to-point
pvc 0/38
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
switchport access vlan 20
no ip address
!
interface FastEthernet3
switchport access vlan 20
no ip address
!
interface Vlan1
description TEMP_INTERFACE
no ip address
ip nat inside
ip virtual-reassembly in
shutdown
!
interface Vlan20
description Coporate_LAN
ip address 192.168.20.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface Dialer0
description BT ADSL
ip address negotiated
ip nat outside
ip virtual-reassembly in
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname username@isp.com
ppp chap password 0 Password
crypto map MAP-OUTSIDE
!
interface Dialer1
description BT VDSL
mtu 1492
ip address negotiated
no ip redirects
no ip unreachables
no ip proxy-arp
ip nbar protocol-discovery
ip flow ingress
ip nat outside
ip virtual-reassembly in
encapsulation ppp
ip tcp adjust-mss 1452
shutdown
dialer pool 1
ppp authentication pap chap ms-chap callin
ppp ipcp address accept
no cdp enable
crypto map MAP-OUTSIDE
!
ip local pool VPN-POOL 10.1.74.5 10.1.74.250
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
!
ip nat inside source list NAT interface Dialer0 overload
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip access-list extended NAT
deny ip 192.168.20.0 0.0.0.255 10.1.74.0 0.0.0.255
permit ip 192.168.20.0 0.0.0.255 any
ip access-list extended VPNSPLIT
permit ip 192.168.20.0 0.0.0.255 10.1.74.0 0.0.0.255
!
!
!
!
!
control-plane
!
!
banner login ^C
***************************************************************************
This Router is the property of ****
Unauthorized access to this router is prohibited
This router is managed and supported by ****
If you are not authorized you are obligated to disconnect now!
***************************************************************************
^C
!
line con 0
logging synchronous
no modem enable
line aux 0
line vty 0 4
privilege level 15
transport input telnet ssh
transport output telnet ssh
!
!
end
SE-RT-01#
09-30-2015 03:45 AM
Hi Peter,
Hope you are well. Just wondering if you have managed to have a look at my config?
Thanks,
Doug
09-30-2015 10:08 PM
Hi Doug,
Sorry for the delay - this week turned out to be more busy than I anticipated.
Okay, the configuration looks good for the most part. There are two main issues:
After this is accomplished, further modification of the configuration would basically deal with making the VDSL to be the primary link, and to perform NAT correctly based on what link is being currently used:
no ip nat inside source list NAT interface Dialer0 overload no ip route 0.0.0.0 0.0.0.0 Dialer0 ! route-map NAT_Old_DSL permit 10 match ip address NAT match interface Dialer0 ! route-map NAT_VDSL permit 10 match ip address NAT match interface Dialer1 ! ip nat inside source route-map NAT_Old_DSL interface Dialer0 overload ip nat inside source route-map NAT_VDSL interface Dialer1 overload ! ip route 0.0.0.0 0.0.0.0 Dialer1 ip route 0.0.0.0 0.0.0.0 Dialer0 2
Please be sure to backup your current configuration before making these changes. Let me know if they worked!
Best regards,
Peter
09-30-2015 11:14 PM
Thanks Peter!
My current nat rule is call NAT I take it all I need to do is delete it and make two new ones like the below?
ip access-list extended NAT_VDSL
deny ip 192.168.20.0 0.0.0.255 10.1.74.0 0.0.0.255
permit ip 192.168.20.0 0.0.0.255 any
ip access-list extended NAT_Old_DSL
deny ip 192.168.20.0 0.0.0.255 10.1.74.0 0.0.0.255
permit ip 192.168.20.0 0.0.0.255 any
Remote access VPN would stay unmodified?
ip access-list extended VPNSPLIT
permit ip 192.168.20.0 0.0.0.255 10.1.74.0 0.0.0.255
This command ip route 0.0.0.0 0.0.0.0 Dialer0 2 the "2" that dictate it's used when the VDSL is down?
09-30-2015 11:25 PM
Hi Doug,
My current nat rule is call NAT I take it all I need to do is delete it and make two new ones like the below?
No, that would not be correct. Follow my configuration from the previous post precisely and exactly. Your suggestion would just create two ACLs with identical contents. The point of my configuration is to create two route-maps that further tighten down the NAT operation, making the NAT pay attention not only to the ACL (which stays unmodified) but also to the output interface, and select the proper IP address for address translation based on what interface the packets go out.
The configuration snippet I have posted is tailored to be copy-and-pasted into your current configuration.
Remote access VPN would stay unmodified?
Yes.
This command ip route 0.0.0.0 0.0.0.0 Dialer0 2 the "2" that dictate it's used when the VDSL is down?
The number "2" is called an administrative distance, and it defines the preference of the static route. If not specified, it equals to 1, and lower is better. So with my suggested configuration change, the path through Dialer1 will be preferred, and only if Dialer1 is entirely down, the default route through Dialer0 will take over.
Best regards,
Peter
09-30-2015 11:28 PM
Excellent thanks for clearing that up for me. Much appropriated Peter I'll be sure to let you know how it goes on Saturday.
10-03-2015 01:09 AM
Hi Peter,
Small problem I've got when I try try to run this command switchport trunk allowed vlan 101 I get this error SE-RT-01(config-if)#switchport trunk allowed vlan 101 Command rejected: Bad VLAN allowed list. You have to include all default vlans, e.g. 1-2,1002-1 005.
Any suggestions?
Thanks,
Doug
10-03-2015 02:06 AM
Hi Doug,
Your IOS or the switch built into the router is apparently one of the older types that requires the list of built-in VLANs to be always allowed on every trunk.
Therefore, replace the offending command
switchport trunk allowed vlan 101
with
switchport trunk allowed vlan 1,101,1002-1005
The remaining part of the configuration remains unchanged.
Best regards,
Peter
10-03-2015 02:19 AM
Thanks,
I added in that command however, Dialer1 isn't connecting anymore. I added my vlan 20 that is used for all data as we don't use vlan 1 on the network. I tried it with and with out 20
switchport trunk allowed vlan 1,101,1002-1005
Thanks
Doug
10-03-2015 02:23 AM
Doug,
You will of course need to move the cable from the Ethernet0 to the FastEthernet0 port because now the PPPoE client for Dialer1 is bound to send its frames out through VLAN 101, and the only port in VLAN 101 is the FastEthernet0.
Please do not add any other VLANs to the list of VLANs I have defined before. Specifically, remove the VLAN 20 you have added there. You have to keep in mind that you do not want your VLANs to leak directly into your ISPs network which is exactly what you do if you allow that VLAN on the FastEthernet0 interface. Your VLANs must stay contained inside your internal network, and only the packets from these VLANs will be routed across (not switched). The sequence is: From internal VLANs out to Dialer1, which in turn uses PPPoE client running on interface Vlan101, which in turn sends out its frames through ports in VLAN101, which is only the FastEthernet0.
Best regards,
Peter
10-03-2015 03:27 AM
Thanks Peter,
I took vlan 20 out of the command however it didn't work. I set the native vlan on fastethernet 0 to 101 and it now working.
the other problem is the fail over isn't working currently we are on the VDSL line : ) but when I simulate an outage such as power to the modem being lost. The PC's error when they try to access web pages.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide