06-27-2005 11:28 AM
I'm configuring a Cisco 831 as a remote office VPN device. I'm having a bit of a problem trying to export Netflow data over the VPN tunnel to a Netflow server in my central office. Is there anything that I have to do to allow this to happen? I am able export Netflow data to a Netflow server that is attached locally (192.168.1.107) off the Cisco 831 but I can't do the same over the VPN tunnel to my central office that houses another Netflow server. Any ideas? The VPN tunnel does work and I can communicate and ping between the remote and central office.
06-28-2005 01:04 AM
Please post the 831 config here, scrubbing any sensitive data. Also what type of vpn gateway is used at the central office? If possible, post the vpn gw config here too. Two questions that I have are:
1. Is the ip address that the 831 uses to export the netflow data in the interesting acl that determines whether traffic is encrypted or not?
2. Does the gateway and the 831 have reflective acls? I.E., Is one device trying to send data thru that the other device will reject?
Let me know if there are any firewalls that may block the traffic sent thru the tunnel on the corp. central office side before the traffic reaches the netflow server.
06-28-2005 03:56 AM
I think the problem is probably the source IP address of the Netflow packets. Normally an ip packet from the router uses the outgoing interface as its source address, and I bet that's not in the crypto ACL.
There is a command `ip flow-export source' that allows you to specify a loopback or other interface as the source, therefore you can specify the source ip address. Make sure this is in the crypto ACL.
Andy
06-28-2005 04:27 AM
07-01-2005 07:59 PM
I think that you may need to add these statement to your global config on the 831 remote router:
ip local policy route-map map01
route-map map01
match ip address flow-acl
set ip next-hop 192.168.1.102
exit
ip access-list extended flow-acl
permit ip host 192.168.2.1 192.168.0.0 0.0.0.255
exit
I know that you are running ios 12.3 code, but here is a link to a ios 12.2 mainline release config ref that mentions what that command does:
Try these changes and let me know how it works. I suspect that the NAT'ing may not be occuring for the traffic sourced by the router. If the changes that I want you to try do not work out, then run the following commands on the 831:
debug crypto isa
debug crypto ipsec
debug nat (there may be some detailed options for this, if so then enable them to get more output)
Do this when non-production traffic is running thru the router. Then run the telnet to the netflow server from the router console session, using e0 as the source interface - this will simulate a netflow connection to allow the ipsec and nat info to be traced. Post the results here.
07-11-2005 10:28 AM
Well... I implemented the statements that you suggested and still the Elimra router sends the Netflow traffic out it's outside interface rather than over the VPN tunnel. There must be some specfic command that tells the router to forward anything from itself over the VPN tunnel rather than it's outside non-encrypted tunnel interface.
07-11-2005 07:50 PM
I noted that you are sending debug messages from the remote router to the same host that you want to export netflow data to - host 192.168.0.100. Are the syslog messages getting sent to that host, over the ipsec vpn tunnel?
Turn on nat debugging, via the debug nat command, and then run a telnet command from the remote router, using e0 as the source interface (same as syslog and netflow source interface address) to the 192.168.0.100 host on port 9996.
Let me know what the nat debug output is. If all goes well, the nat should not happen, due to your nat route-map config (bypass nat for traffic to 192.168.0/24 network).
07-13-2005 03:41 PM
Well.... I ran the debug ip nat command on the remote VPN Cisco 831 device and also ran a sniffer trace at the central site where the Netflow collector exists. SYSlog messages from the remote 831 device are getting to the central site like they did before. Netflow information on the other hand is not being seen to the central site. The remote Cisco 831 device is sending the Netflow out through its outside NATed interface rather than over the VPN tunnel. It seems that if SYSlog messages are going over the VPN tunnel from the remote Cisco 831 device to the same server where the NetFlow Collector is installed that Netflow data should also do the same.. I'm at a loss at this point.
07-14-2005 08:02 AM
Try using a GRE Tunnel instead.
On Central office:
Interface Tunnel1
ip address 10.1.1.1 255.255.255.252
ip mtu 1440
tunnel source 192.168.1.X
tunnel destination 192.168.1.Y
tunnel path-mtu-discovery
crypto map XXXXXX
ip nat outside ---> if necessary
ip route 192.168.Y.0 255.255.255.0 Tunnel1
access-list XXX permit gre host 192.168.1.Y host 192.168.1.X
On Remote office:
Interface Tunnel1
ip address 10.1.1.2 255.255.255.252
ip mtu 1440
tunnel source 192.168.1.Y
tunnel destination 192.168.1.X
tunnel path-mtu-discovery
crypto map YYYYYY
ip nat outside ---> if necessary
ip route 192.168.Y.0 255.255.255.0 Tunnel1
access-list XXX permit gre host 192.168.1.X host 192.168.1.Y
07-14-2005 08:20 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide