09-11-2018 05:44 PM - edited 03-08-2019 04:08 PM
Dear All,
PLease help me:
Solved! Go to Solution.
10-10-2018 05:21 AM
Hi
Here are my answers.
1. Yes BGP is enough as soon as your ISP advertise your default route which is standard. No need to add static routes here for this.
2. You can use loopback but as you're peering with your ISP, you'll use your physical interface and that's ok, no worries.
3. No additional protocols needed.
4. Your spoke and hub routers will peer with your ISP for underlay network. Then, with DMVPN they will peer with your HUB and using DMVPN Phase 3, if needed, each spoke will build up a dynamic tunnel between each other when traffic must from 1 to the other. Here you will have BGP with ISP and you can use also BGP for DMVPM which is considered as overlay network.
5. If you have 2 IPs at the hub router, yes in your tunnel configuration you will have 2 nhrp map pointing to both Hub IPs. By default, both nhrp will be up but if you use the cluster capability at the spoke side, you can have only 1 up and the other pre-built. It will come hub when the first goes down
10-10-2018 06:17 AM - edited 10-10-2018 06:20 AM
Hi ,
Thanks for your help.
Now I am clear No. 2 to 4.
But i am not clear No.1,do you mean i need run default route in each site ?
In my lad i never run default route. :P .
The second ,i tested as-path pretend in HUB site.it is only for incoming traffic ?
Eg.
router bgp 65500
nei 10.100.1.1 remote-as 200
nei 10.100.1.1 description ISP peer
nei 10.100.1.1 route-map prepend out
route-map prepend permit 10
set as-path prepend 65500
Do we still need to use weight attribute together for fail-over ?
And we can change holdtime timer to reduce fail-over time ? Which way is better ?
10-10-2018 06:44 PM
10-12-2018 01:17 AM
HI Francesco Molino ,
I am clear now.Last time i thought i am using private network ( our network cannot access internet),so we don't need to use default route.
let me ask another question for cisco 892 router.
This router have 8 LAN port 2 WAN port.
So I carry my LAN with trunk.My network don't need to use internet access so i didn't use NAT.
I use static route to our DC only.
i would like to ask.When i bind my ACL to interface all traffic are deny.I can ping without binding ACL rule on interface.What wrong.
And i would like to know we bought switches cisco 2960 LAN Lite base.I knew LAN lite base cannot support ACL ,is it correct ?
If i want to use ACL in LAN Lite ,what should i do ?
interface GigabitEthernet7
switchport trunk native vlan 7
switchport trunk allowed vlan 1,2,200-203,1001-1005
switchport mode trunk
ip access-list access-group in
no ip address
!
interface GigabitEthernet8
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet9
ip address 10.1.1.111 255.255.255.0
duplex auto
speed auto
!
interface Vlan1
no ip address
!
interface Vlan30
ip address 10.100.201.1 255.255.255.224
!
interface Vlan40
ip address 10.100.201.65 255.255.255.224
!
interface Vlan50
ip address 10.100.201.97 255.255.255.224
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 0.0.0.0 0.0.0.0 10.1.1.1
!
!
access-list 101 permit ip 10.100.201.0 0.0.0.32 10.1.14.0 0.0.0.255
access-list 101 permit ip 10.100.201.0 0.0.0.32 10.100.201.0 0.0.0.32
access-list 101 permit ip 10.100.201.0 0.0.0.32 10.1.5.0 0.0.0.255
access-list 101 deny ip any any
!
10-13-2018 08:43 PM
10-14-2018 12:40 AM - edited 10-14-2018 07:27 AM
Hi ,
Sorry my question.My questions make you confuse.
The first question mean i configure ACL rule in c892 router. Configure sample is i configured in router.When i enable those ACL rule in router interface ,all traffic are deny. I try to carry traffic with trunk and i crate SVI in router c892.I want to restrict access between these SVI each other.
nterface GigabitEthernet7
switchport trunk native vlan 7
switchport trunk allowed vlan 1,2,200-203,1001-1005
switchport mode trunk
ip access-list access-group in
no ip address
!
interface GigabitEthernet8
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet9
ip address 10.1.1.111 255.255.255.0
duplex auto
speed auto
!
interface Vlan1
no ip address
!
interface Vlan30
ip address 10.100.201.1 255.255.255.224
!
interface Vlan40
ip address 10.100.201.65 255.255.255.224
!
interface Vlan50
ip address 10.100.201.97 255.255.255.224
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 0.0.0.0 0.0.0.0 10.1.1.1
!
!
access-list 101 permit ip 10.100.201.0 0.0.0.32 10.1.14.0 0.0.0.255
access-list 101 permit ip 10.100.201.0 0.0.0.32 10.100.201.0 0.0.0.32
access-list 101 permit ip 10.100.201.0 0.0.0.32 10.1.5.0 0.0.0.255
access-list 101 deny ip any any
10-15-2018 05:40 AM
10-21-2018 05:48 PM
10-22-2018 09:29 PM
10-26-2018 12:43 AM
10-26-2018 05:44 PM
11-07-2018 02:02 AM
Hi ,
I would like to recall DMVPN and IPSec. Now i need to integrate these two scenario together.
but i am confuse how to apply acl rule for these two tunnel in branches.I mean how to configure
let me know for IPSec should i use VTI ? which one is more preferable
11-07-2018 04:10 AM
Hello,
VTI is the easiest way to configure in your scenario, as there is no need for crypto maps and access lists. All you need is static routes...
11-07-2018 05:01 AM
11-07-2018 05:04 AM
Hello,
basically you use static routes with the tunnel as the outgoing interface.
This thread is very long, can you post your current configuration ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide