06-VPN Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath Firewall Series Configuration Guides(V7)-6W40206-VPN Configuration Guide
04-GRE configuration
Title Size Download
04-GRE configuration 368.45 KB

Configuring GRE

About GRE

Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a protocol (such as IP or Ethernet) into a virtual point-to-point tunnel over a network (such as an IP network). Packets are encapsulated at one tunnel end and de-encapsulated at the other tunnel end. The network layer protocol of the packets before encapsulation and after encapsulation can be the same or different.

GRE encapsulation format

As shown in Figure 1, a GRE-tunneled packet includes the following parts:

·     Payload packet—Original packet. The protocol type of the payload packet is called the passenger protocol. The passenger protocol can be any network layer protocol.

·     GRE header—Header that is added to the payload packet to change the payload packet to a GRE packet. A GRE header includes the number of encapsulations, version, passenger protocol type, checksum, and key. GRE is called the encapsulation protocol.

·     Delivery header—Header that is added to the GRE packet to deliver it to the tunnel end. The transport protocol (or delivery protocol) is the network layer protocol that transfers GRE packets.

The device supports GRE tunnels with IPv4 and IPv6 as the transport protocols. When the transport protocol is IPv4, the GRE tunnel mode is GRE over IPv4 (GRE/IPv4). When the transport protocol is IPv6, the GRE tunnel mode is GRE over IPv6 (GRE/IPv6).

Figure 1 GRE encapsulation format

GRE tunnel operating principle

As shown in Figure 2, an IPv6 protocol packet traverses an IPv4 network through a GRE tunnel as follows:

1.     After receiving an IPv6 packet from the interface connected to IPv6 network 1, Device A processes the packet as follows:

a.     Looks up the routing table to identify the outgoing interface for the IPv6 packet.

b.     Submits the IPv6 packet to the outgoing interface—the GRE tunnel interface Tunnel 0.

2.     Upon receiving the packet, the tunnel interface encapsulates the packet with GRE and then with IPv4. In the IPv4 header:

¡     The source address is the tunnel's source address (the IP address of Interface A of Device A).

¡     The destination address is the tunnel's destination address (the IP address of Interface B of Device B).

3.     Device A looks up the routing table according to the destination address in the IPv4 header, and forwards the IPv4 packet out of the physical interface (Interface A) of the GRE tunnel.

4.     When the IPv4 arrives at the GRE tunnel destination Device B, Device B checks the destination address. Because the destination is Device B itself and the protocol number in the IP header is 47 (the protocol number for GRE), Device B submits the packet to GRE for de-encapsulation.

5.     GRE first removes the IPv4 header, and then checks the GRE key, checksum, and packet sequence number. After GRE finishes the checking, it removes the GRE header, and submits the payload to the IPv6 protocol for forwarding.

Figure 2 IPv6 networks interconnected through a GRE tunnel

GRE security mechanisms

GRE supports the GRE key and GRE checksum security mechanisms.

GRE key

GRE keys ensure packet validity. The sender adds a GRE key into a packet. The receiver compares the GRE key with its own GRE key. If the two keys are the same, the receiver accepts the packet. If the two keys are different, the receiver drops the packet.

GRE checksum

GRE checksums ensure packet integrity. The sender calculates a checksum for the GRE header and payload and sends the packet containing the checksum to the tunnel peer. The receiver calculates a checksum for the received packet and compares it with that carried in the packet. If the checksums are the same, the receiver considers the packet intact and continues to process the packet. If the checksums are different, the receiver discards the packet.

GRE application scenarios

The following shows typical GRE application scenarios:

Connecting networks running different protocols over a single backbone

As shown in Figure 3, IPv6 network 1 and IPv6 network 2 are IPv6 networks, and IPv4 network 1 and IPv4 network 2 are IPv4 networks. Through the GRE tunnel between Device A and Device B, IPv6 network 1 can communicate with IPv6 network 2 and IPv4 network 1 can communicate with IPv4 network 2, without affecting each other.

Figure 3 Network diagram

Enlarging network scope

In an IP network, the maximum TTL value of a packet is 255. If two devices have more than 255 hops in between, they cannot communicate with each other. By using a GRE tunnel, you can hide some hops to enlarge the network scope. As shown in Figure 4, only the tunnel-end devices (Device A and Device D) of the GRE tunnel are counted in hop count calculation. Therefore, there are only three hops between Host A and Host B.

Figure 4 Network diagram

Constructing VPN

As shown in Figure 5, Site 1 and Site 2 both belong to VPN 1 and are located in different cities. Using a GRE tunnel can connect the two VPN sites across the WAN.

Figure 5 Network diagram

Operating with IPsec

As shown in Figure 6, GRE can be used together with IPsec to form a GRE over IPsec tunnel. Packets (for example, routing protocol packets, voice data, and video data) are first encapsulated with GRE and then with IPsec. GRE over IPsec delivers the following benefits:

·     Improves transmission security.

·     Allows IPsec to protect not only unicast packets. GRE supports encapsulating multicast, broadcast, and non-IP packets. After GRE encapsulation, these packets become common unicast packets, which can be protected by IPsec.

·     Simplifies IPsec configuration. Packets are first encapsulated by GRE. You can define the packets to be protected by IPsec according to the GRE tunnel's source and destination addresses, without considering the source and destination addresses of the original packets.

Figure 6 Network diagram

GRE and IPsec can also form IPsec over GRE tunnels. As a best practice, use GRE over IPsec tunnels instead of IPsec over GRE tunnels.

For more information about IPsec, see VPN Configuration Guide.

Protocols and standards

·     RFC 1701, Generic Routing Encapsulation (GRE)

·     RFC 1702, Generic Routing Encapsulation over IPv4 networks

·     RFC 2784, Generic Routing Encapsulation (GRE)

·     RFC 2890, Key and Sequence Number Extensions to GRE

Restrictions and guidelines: GRE configuration

When you configure a GRE tunnel, follow these restrictions and guidelines:

·     You must configure the tunnel source address and destination address at both ends of a tunnel. The tunnel source or destination address at one end must be the tunnel destination or source address at the other end.

·     As a best practice, do not configure the same tunnel source and destination addresses for local tunnel interfaces that use the same tunnel mode.

·     Do not configure the same tunnel source and destination addresses for a GRE tunnel interface and a GRE P2MP tunnel interface.

·     You can enable or disable GRE checksum at each end of a tunnel. If GRE checksum is enabled at a tunnel end, the tunnel end sends packets carrying the checksum to the peer end. A tunnel end checks the GRE checksum of a received packet if the packet carries a GRE checksum, whether or not the tunnel end is enabled with GRE checksum.

·     To ensure correct packet forwarding, identify whether the destination network of packets and the IP address of the local tunnel interface are on the same subnet. If they are not, configure a route reaching the destination network through the tunnel interface. You can configure the route by using one of the following methods:

¡     Configure a static route, using the local tunnel interface as the outgoing interface of the route.

¡     Enable a dynamic routing protocol on both the tunnel interface and the interface connecting the private network. This allows the dynamic routing protocol to establish a routing entry with the tunnel interface as the outgoing interface.

·     GRE encapsulation and de-encapsulation can decrease the forwarding efficiency of tunnel-end devices.

Configuring a GRE/IPv4 tunnel

Restrictions and guidelines

This task describes only GRE/IPv4 tunnel required tunnel interface commands (the interface tunnel, source, and destination commands). For more tunnel interface commands, see "Configuring tunneling."

Procedure

1.     Enter system view.

system-view

2.     Create a GRE tunnel interface, and specify the tunnel mode as GRE/IPv4.

interface tunnel number mode gre

You must configure the same tunnel mode on both ends of a tunnel. Otherwise, packet delivery might fail.

3.     Configure an IP address for the tunnel interface based on the passenger protocol.

IPv4:

For information about how to assign an IPv4 address to an interface, see "Configuring IP addressing."

IPv6:

For information about how to assign an IPv6 address to an interface, see "Configuring basic IPv6 settings."

By default, no IP address is configured for a tunnel interface.

4.     Configure a source address or source interface for the tunnel interface.

source { ip-address | interface-type interface-number }

By default, no source address or interface is configured for a tunnel interface.

If you configure a source address for a tunnel interface, the tunnel interface uses the source address as the source address of the encapsulated packets.

If you configure a source interface for a tunnel interface, the tunnel interface uses the primary IP address of the source interface as the source address of the encapsulated packets.

5.     Configure a destination address for the tunnel interface.

destination ip-address

By default, no destination address is configured for a tunnel interface.

The destination address is the address of the physical interface that the tunnel remote end uses to receive packets from the GRE tunnel.

The tunnel local end uses this address as the destination address of the encapsulated packets.

The tunnel destination address and the IP address of the tunnel interface must be in different subnets.

6.     (Optional.) Enable GRE keepalive, and set the keepalive interval and keepalive number.

keepalive [ interval [ times ] ]

By default, GRE keepalive is disabled.

7.     (Optional.) Configure GRE security mechanisms.

¡     Enable GRE checksum.

gre checksum

By default, GRE checksum is disabled.

¡     Configure a GRE key for the GRE tunnel interface.

gre key key

By default, no GRE key is configured for a GRE tunnel interface.

The two ends of a GRE tunnel must have the same key or both have no key.

8.     (Optional.) Set the DF bit for encapsulated packets.

tunnel dfbit enable

By default, the DF bit is not set, allowing encapsulated packets to be fragmented.

Configuring a GRE/IPv6 tunnel

Restrictions and guidelines

This task describes only GRE/IPv6 tunnel required tunnel interface commands (the interface tunnel, source, and destination commands). For more tunnel interface commands, see "Configuring tunneling."

Procedure

1.     Enter system view.

system-view

2.     Create a GRE tunnel interface, and specify the tunnel mode as GRE/IPv6.

interface tunnel number mode gre ipv6

You must configure the same tunnel mode on both ends of a tunnel. Otherwise, packet delivery might fail.

3.     Configure an IP address for the tunnel interface based on the passenger protocol.

IPv4:

For information about how to assign an IPv4 address to an interface, see "Configuring IP addressing."

IPv6:

For information about how to assign an IPv6 address to an interface, see "Configuring basic IPv6 settings."

By default, no IP address is configured for a tunnel interface.

4.     Configure a source IPv6 address or source interface for the tunnel interface.

source { ipv6-address | interface-type interface-number }

By default, no source IPv6 address or interface is configured for a tunnel interface.

If you configure a source IPv6 address for a tunnel interface, the tunnel interface uses the source IPv6 address as the source IPv6 address of the encapsulated packets.

If you configure a source interface for a tunnel interface, the tunnel interface uses the IPv6 address of the source interface as the source IPv6 address of the encapsulated packets.

5.     Configure a destination IPv6 address for the tunnel interface.

destination ipv6-address

By default, no destination IPv6 address is configured for a tunnel interface.

The destination IPv6 address is the IPv6 address of the physical interface that the tunnel remote end uses to receive packets from the GRE tunnel.

The tunnel local end uses this address as the destination IPv6 address of the encapsulated packets.

The tunnel destination address and the IP address of the tunnel interface must be in different subnets.

6.     (Optional.) Configure GRE security mechanisms.

¡     Enable GRE checksum.

gre checksum

By default, GRE checksum is disabled.

¡     (Optional.) Configure a GRE key for the tunnel interface.

gre key key

By default, no GRE key is configured for a GRE tunnel interface.

The two ends of a GRE tunnel must have the same key or both have no key.

Enabling dropping IPv6 packets that use IPv4-compatible IPv6 addresses

About this task

This feature enables the device to check the source and destination IPv6 addresses of the de-encapsulated IPv6 packets from a tunnel. If a packet uses an IPv4-compatible IPv6 address as the source or destination address, the device discards the packet.

Procedure

1.     Enter system view.

system-view

2.     Configure the device to discard IPv6 packets with IPv4-compatible IPv6 addresses.

tunnel discard ipv4-compatible-packet

By default, the device does not discard such IPv6 packets.

For more information about this command, see tunneling in VPN Command Reference.

Display and maintenance commands for GRE

Execute display commands in any view and reset commands in user view.

 

Task

Command

Remarks

Display information about tunnel interfaces.

display interface [ tunnel [ number ] ] [ brief [ description | down ] ]

For more information about the commands, see tunneling in VPN Command Reference.

Display IPv6 information about tunnel interface.

display ipv6 interface [ tunnel [ number ] ] [ brief ]

For more information about this command, see IPv6 basics in Layer 3—IP Services Command Reference.

Clear tunnel interface statistics.

reset counters interface [ tunnel [ number ] ]

For more information about this command, see tunneling in VPN Command Reference.

Clear IPv6 statistics on tunnel interfaces.

reset ipv6 statistics [ slot slot-number ]

For more information about this command, see IPv6 basics in Layer 3—IP Services Command Reference.

GRE configuration examples

Example: Configuring an IPv4 over IPv4 GRE tunnel

Network configuration

As shown in Figure 7, Group 1 and Group 2 are two private IPv4 networks. The two networks both use private network addresses and belong to the same VPN. Establish a GRE tunnel between Device A and Device B to interconnect the two private IPv4 networks Group 1 and Group 2.

Figure 7 Network diagram

Procedure

1.     Configure Device A:

# Assign an IP addresse to interface GigabitEthernet 1/0/1.

<DeviceA> system-view

[DeviceA] interface gigabitethernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] ip address 10.1.1.1 255.255.255.0

[DeviceA-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

# Create tunnel interface Tunnel 0, and specify the tunnel mode as GRE/IPv4.

[DeviceA] interface tunnel 0 mode gre

[DeviceA-Tunnel0] ip address 10.1.2.1 255.255.255.0

[DeviceA-Tunnel0] source 1.1.1.1

[DeviceA-Tunnel0] destination 2.2.2.2

[DeviceA-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 1.1.1.2.

[DeviceA] ip route-static 2.2.2.2 24 1.1.1.2

[DeviceA] ip route-static 10.1.3.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceA] security-zone name Untrust

[DeviceA-security-zone-Untrust] import interface Tunnel 0

[DeviceA-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceA-security-zone-Untrust] quit

[DeviceA] security-zone name Trust

[DeviceA-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceA-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device A to send packets to Device B.

[DeviceA] security-policy ip

[DeviceA-security-policy-ip] rule name grelocalout

[DeviceA-security-policy-ip-1-grelocalout] source-zone local

[DeviceA-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 1.1.1.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 10.1.2.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 10.1.1.1

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 2.2.2.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 10.1.2.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 10.1.3.1

[DeviceA-security-policy-ip-1-grelocalout] action pass

[DeviceA-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device A to receive the packets sent from Device B.

[DeviceA-security-policy-ip] rule name grelocalin

[DeviceA-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceA-security-policy-ip-2-grelocalin] destination-zone local

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 2.2.2.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 10.1.2.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 10.1.3.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 1.1.1.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 10.1.2.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 10.1.1.1

[DeviceA-security-policy-ip-2-grelocalin] action pass

[DeviceA-security-policy-ip-2-grelocalin] quit

[DeviceA-security-policy-ip] quit

2.     Configure Device B:

# Assign an IP addresse to interface GigabitEthernet 1/0/1.

<DeviceB> system-view

[DeviceB] interface gigabitethernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] ip address 10.1.3.1 255.255.255.0

[DeviceB-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE/IPv4.

[DeviceB] interface tunnel 0 mode gre

[DeviceB-Tunnel0] ip address 10.1.2.2 255.255.255.0

[DeviceB-Tunnel0] source 2.2.2.2

[DeviceB-Tunnel0] destination 1.1.1.1

[DeviceB-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 2.2.2.3.

[DeviceB] ip route-static 1.1.1.1 24 2.2.2.3

[DeviceB] ip route-static 10.1.1.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceB] security-zone name Untrust

[DeviceB-security-zone-Untrust] import interface Tunnel 0

[DeviceB-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceB-security-zone-Untrust] quit

[DeviceB] security-zone name Trust

[DeviceB-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceB-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device B to send packets to Device A.

[DeviceB] security-policy ip

[DeviceB-security-policy-ip] rule 1 name grelocalout

[DeviceB-security-policy-ip-1-grelocalout] source-zone local

[DeviceB-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 2.2.2.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 10.1.2.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 10.1.3.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 1.1.1.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 10.1.2.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 10.1.1.1

[DeviceB-security-policy-ip-1-grelocalout] action pass

[DeviceB-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device B to receive the packets sent from Device A.

[DeviceB-security-policy-ip] rule name grelocalin

[DeviceB-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceB-security-policy-ip-2-grelocalin] destination-zone local

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 1.1.1.1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 10.1.2.1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 10.1.1.1

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 2.2.2.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 10.1.2.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 10.1.3.1

[DeviceB-security-policy-ip-2-grelocalin] action pass

[DeviceB-security-policy-ip-2-grelocalin] quit

[DeviceB-security-policy-ip] quit

Verifying the configuration

# Display tunnel interface information on Device A.

[DeviceA] display interface tunnel 0

Tunnel0

Current state: UP

Line protocol state: UP

Description: Tunnel0 Interface

Bandwidth: 64kbps

Maximum transmission unit: 1476

Internet address: 10.1.2.1/24 (primary)

Tunnel source 1.1.1.1, destination 2.2.2.2

Tunnel keepalive disabled

Tunnel TTL 255

Tunnel protocol/transport GRE/IP

    GRE key disabled

    Checksumming of GRE packets disabled

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops

# Display tunnel interface information on Device B.

[DeviceB] display interface tunnel 0

Tunnel0

Current state: UP

Line protocol state: UP

Description: Tunnel0 Interface

Bandwidth: 64kbps

Maximum transmission unit: 1476

Internet address: 10.1.2.2/24 (primary)

Tunnel source 2.2.2.2, destination 1.1.1.1

Tunnel keepalive disabled

Tunnel TTL 255

Tunnel protocol/transport GRE/IP

    GRE key disabled

    Checksumming of GRE packets disabled

Last clearing of counters: Never

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops

# From Device B, ping the IP address of GigabitEthernet 1/0/1 on Device A.

[DeviceB] ping -a 10.1.3.1 10.1.1.1

Ping 10.1.1.1 (10.1.1.1) from 10.1.3.1: 56 data bytes, press CTRL_C to break

56 bytes from 10.1.1.1: icmp_seq=0 ttl=255 time=11.000 ms

56 bytes from 10.1.1.1: icmp_seq=1 ttl=255 time=1.000 ms

56 bytes from 10.1.1.1: icmp_seq=2 ttl=255 time=0.000 ms

56 bytes from 10.1.1.1: icmp_seq=3 ttl=255 time=0.000 ms

56 bytes from 10.1.1.1: icmp_seq=4 ttl=255 time=0.000 ms

 

--- Ping statistics for 10.1.1.1 ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 0.000/2.400/11.000/4.317 ms

The output shows that Device B can successfully ping Device A.

Example: Configuring an IPv4 over IPv6 GRE tunnel

Network configuration

As shown in Figure 8, two IPv4 subnets Group 1 and Group 2 are connected to an IPv6 network. Create a GRE/IPv6 tunnel between Device A and Device B, so the two IPv4 subnets can communicate with each other through the GRE tunnel over the IPv6 network.

Figure 8 Network diagram

Procedure

1.     Configure Device A:

# Assign IP addresses to interfaces GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.

<DeviceA> system-view

[DeviceA] interface gigabitethernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] ip address 10.1.1.1 255.255.255.0

[DeviceA-GigabitEthernet1/0/1] quit

[DeviceA] interface gigabitethernet 1/0/2

[DeviceA-GigabitEthernet1/0/2] ipv6 address 2002::1.1/64

[DeviceA-GigabitEthernet1/0/2] quit

# Create tunnel interface Tunnel 0, and specify the tunnel mode as GRE/IPv6.

[DeviceA] interface tunnel 0 mode gre ipv6

[DeviceA-Tunnel0] ip address 10.1.2.1 255.255.255.0

[DeviceA-Tunnel0] source 2002::1:1

[DeviceA-Tunnel0] destination 2001::2:1

[DeviceA-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 2002::1:2.

[DeviceA] ipv6 route-static 2001::2:1 64 2002::1:2

[DeviceA] ip route-static 10.1.3.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceA] security-zone name Untrust

[DeviceA-security-zone-Untrust] import interface Tunnel 0

[DeviceA-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceA-security-zone-Untrust] quit

[DeviceA] security-zone name Trust

[DeviceA-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceA-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device A to send packets to Device B.

[DeviceA] security-policy ip

[DeviceA-security-policy-ip] rule name grelocalout

[DeviceA-security-policy-ip-1-grelocalout] source-zone local

[DeviceA-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 2002::1:1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 10.1.2.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 10.1.1.1

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 2001::2:1

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 10.1.2.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 10.1.3.1

[DeviceA-security-policy-ip-1-grelocalout] action pass

[DeviceA-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device A to receive the packets sent from Device B.

[DeviceA-security-policy-ip] rule name grelocalin

[DeviceA-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceA-security-policy-ip-2-grelocalin] destination-zone local

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 2001::2:1

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 10.1.2.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 10.1.3.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 2002::1:1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 10.1.2.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 10.1.1.1

[DeviceA-security-policy-ip-2-grelocalin] action pass

[DeviceA-security-policy-ip-2-grelocalin] quit

[DeviceA-security-policy-ip] quit

2.     Configure Device B:

# Assign IP addresses to interfaces GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.

<DeviceB> system-view

[DeviceB] interface gigabitethernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] ip address 10.1.3.1 255.255.255.0

[DeviceB-GigabitEthernet1/0/1] quit

[DeviceB] interface gigabitethernet 1/0/2

[DeviceB-GigabitEthernet1/0/2] ipv6 address 2001::2.1/64

[DeviceB-GigabitEthernet1/0/2] quit

# Create tunnel interface Tunnel 0, and specify the tunnel mode as GRE/IPv6.

[DeviceB] interface tunnel 0 mode gre ipv6

[DeviceB-Tunnel0] ip address 10.1.2.2 255.255.255.0

[DeviceB-Tunnel0] source 2001::2:1

[DeviceB-Tunnel0] destination 2002::1:1

[DeviceB-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 2001::2:2.

[DeviceB] ipv6 route-static 2002::1:1 64 2001::2:2

[DeviceB] ip route-static 10.1.1.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceB] security-zone name Untrust

[DeviceB-security-zone-Untrust] import interface Tunnel 0

[DeviceB-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceB-security-zone-Untrust] quit

[DeviceB] security-zone name Trust

[DeviceB-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceB-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device B to send packets to Device A.

[DeviceB] security-policy ip

[DeviceB-security-policy-ip] rule name grelocalout

[DeviceB-security-policy-ip-1-grelocalout] source-zone local

[DeviceB-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 2001::2:1

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 10.1.2.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 10.1.3.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 2002::1:1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 10.1.2.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 10.1.1.1

[DeviceB-security-policy-ip-1-grelocalout] action pass

[DeviceB-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device B to receive the packets sent from Device A.

[DeviceB-security-policy-ip] rule name grelocalin

[DeviceB-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceB-security-policy-ip-2-grelocalin] destination-zone local

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 2002::1:1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 10.1.2.1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 10.1.1.1

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 2001::2:1

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 10.1.2.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 10.1.3.1

[DeviceB-security-policy-ip-2-grelocalin] action pass

[DeviceB-security-policy-ip-2-grelocalin] quit

[DeviceB-security-policy-ip] quit

Verifying the configuration

# Display tunnel interface information on Device A.

[DeviceA] display interface tunnel 0

Tunnel0

Current state: UP

Line protocol state: UP

Description: Tunnel0 Interface

Bandwidth: 64kbps

Maximum transmission unit: 1456

Internet address: 10.1.2.1/24 (primary)

Tunnel source 2002::1:1, destination 2001::2:1

Tunnel TTL 255

Tunnel protocol/transport GRE/IPv6

    GRE key disabled

    Checksumming of GRE packets disabled

Last clearing of counters: Never

Last 300 seconds input rate: 1 bytes/sec, 8 bits/sec, 0 packets/sec

Last 300 seconds output rate: 1 bytes/sec, 8 bits/sec, 0 packets/sec

Input: 10 packets, 840 bytes, 0 drops

Output: 10 packets, 840 bytes, 0 drops

# Display tunnel interface information on Device B.

[DeviceB] display interface tunnel 0

Tunnel0

Current state: UP

Line protocol state: UP

Description: Tunnel0 Interface

Bandwidth: 64kbps

Maximum transmission unit: 1456

Internet address: 10.1.2.2/24 (primary)

Tunnel source 2001::2:1, destination 2002::1:1

Tunnel TTL 255

Tunnel protocol/transport GRE/IPv6

    GRE key disabled

    Checksumming of GRE packets disabled

Last clearing of counters: Never

Last 300 seconds input rate: 1 bytes/sec, 8 bits/sec, 0 packets/sec

Last 300 seconds output rate: 1 bytes/sec, 8 bits/sec, 0 packets/sec

Input: 10 packets, 840 bytes, 0 drops

Output: 10 packets, 840 bytes, 0 drops

# From Device B, ping the IP address of GigabitEthernet 1/0/1 on Device A.

[DeviceB] ping -a 10.1.3.1 10.1.1.1

Ping 10.1.1.1 (10.1.1.1) from 10.1.3.1: 56 data bytes, press CTRL_C to break

56 bytes from 10.1.1.1: icmp_seq=0 ttl=255 time=2.000 ms

56 bytes from 10.1.1.1: icmp_seq=1 ttl=255 time=1.000 ms

56 bytes from 10.1.1.1: icmp_seq=2 ttl=255 time=1.000 ms

56 bytes from 10.1.1.1: icmp_seq=3 ttl=255 time=0.000 ms

56 bytes from 10.1.1.1: icmp_seq=4 ttl=255 time=1.000 ms

 

--- Ping statistics for 10.1.1.1 ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 0.000/1.000/2.000/0.632 ms

The output shows that Device B can successfully ping Device A.

Troubleshooting GRE

The key to configuring GRE is to keep the configuration consistent. Most faults can be located by using the debugging gre or debugging tunnel command. This section analyzes one type of fault for illustration, with the scenario shown in Figure 9.

Figure 9 Network diagram

Hosts at both ends of a GRE tunnel cannot ping each other

Symptom

The interfaces at both ends of the tunnel are configured correctly and can ping each other, but Host A and Host B cannot ping each other.

Solution

To resolve the issue:

1.     Execute the display ip routing-table command on Device A and Device C to view whether Device A has a route over tunnel 0 to 10.2.0.0/16 and whether Device C has a route over tunnel 0 to 10.1.0.0/16.

2.     If such a route does not exist, execute the ip route-static command in system view to add the route. Take Device A as an example:

[DeviceA] ip route-static 10.2.0.0 255.255.0.0 tunnel 0

3.     If the issue persists, contact H3C Support.


Configuring GRE P2MP tunnels

About GRE P2MP tunnels

The GRE point-to-multipoint (P2MP) tunnel technology allows the device to use a GRE P2MP tunnel interface to establish a tunnel with multiple destinations.

Application scenario

As shown in Figure 10, an enterprise has multiple branches. For the headquarters to communicate with the branches through tunnels, you can deploy GRE P2MP.

Configure a GRE P2MP tunnel interface on the gateway of the headquarters. Configure GRE/IPv4 or GRE/IPv6 tunnel interfaces (also called point-to-point GRE tunnel interfaces) on the gateways of the branch networks. Use the GRE P2MP tunnel interface on the headquarters gateway to set up a point-to-multipoint tunnel with the point-to-point GRE tunnel interfaces on the branch gateways.

Figure 10 GRE P2MP tunnel application

Benefits

Compared with GRE point-to-point tunnels and other dynamic VPN technologies, GRE P2MP has the following benefits:

·     Simplified configuration—One GRE P2MP tunnel interface can set up a point-to-multipoint tunnel with multiple point-to-point GRE tunnel interfaces. You do not need to create multiple GRE tunnel interfaces for the headquarters gateway to establish point-to-point tunnels with each branch.

·     Easy maintenance—When a new branch is added, the headquarters gateway can dynamically learn the tunnel destination address through GRE packets received from the branch. The gateway can automatically set up a tunnel with the branch. Manual configuration is not required.

·     Flexible access—The headquarters can dynamically learn the tunnel destination addresses. Whether the branch network obtains public addresses dynamically or not does not affect the configuration in the headquarters.

·     Good interoperability and decreased TCO—The device implements GRE P2MP based on the standard GRE protocol. It does not require other proprietary protocols. GRE P2MP does not have special requirements for the branch gateways. You can use any devices that support GRE as branch gateways.

·     High availability—Support for tunnel backup in the headquarters and branches.

Working mechanisms

GRE uses the same packet encapsulation and de-encapsulation processes for point-to-multipoint and point-to-point tunnels.

When the device uses a GRE P2MP tunnel to forward traffic, it searches the tunnel entries for the tunnel destination address based on the packet destination IP address. GRE encapsulates the tunnel destination address as the destination IP address in the GRE transport protocol header.

GRE P2MP tunnel entries include dynamic entries and static entries. Dynamic and static entries cannot coexist.

GRE P2MP dynamic tunnel entry learning

As shown in Figure 11, Device A dynamically learns GRE P2MP tunnel entry information (tunnel destination address and packet destination address) from the GRE packets received from the branch. The tunnel destination address is the source IP address in the transport protocol header of the received GRE packet. The packet destination address (destination branch network address) is the source IP address in passenger protocol header of the received GRE packet.

Figure 11 Dynamically learning a GRE P2MP tunnel entry

GRE P2MP static tunnel entry configuration

In a dynamic GRE P2MP tunnel network, the headquarters gateway cannot actively send packets to branch networks. If the gateway does not receive GRE packets from a branch, it cannot create a dynamic tunnel entry for the branch. To resolve this issue, you can configure GRE P2MP static tunnel entries by applying a GRE P2MP tunnel template to the GRE P2MP tunnel interface. The tunnel mapping entries in the tunnel template are static tunnel entries. A static tunnel entry includes the following information:

·     Tunnel destination address.

·     Destination branch network address.

·     VPN instance of the destination branch network.

In the current software version, the device supports only IPv4 static tunnel entries for GRE P2MP.

GRE P2MP tunnel backup

This feature applies only to dynamic GRE P2MP tunnels.

GRE tunnel backup in branches

As shown in Figure 12, deploy redundant gateways in the branch network. Configure a GRE P2MP tunnel interface on the gateway of the headquarters. Use the GRE P2MP tunnel interface to set up a dynamic P2MP tunnel with each branch gateway.

Assign different GRE keys to the tunnel interfaces on the branch gateways. The headquarters gateway selects a dynamic tunnel entry for the branch in the following order:

1.     The dynamic tunnel entry that does not have a GRE key.

2.     The dynamic tunnel entry that has a GRE key with a lower value.

3.     The latest learned dynamic tunnel entry.

Figure 12 GRE tunnel backup in a branch

GRE tunnel backup in the headquarters

As shown in Figure 13, deploy redundant gateways in the headquarters, one primary and one backup. Configure a GRE P2MP tunnel interface and a GRE/IPv4 or GRE/IPv6 tunnel interface on each gateway. Specify the GRE/IPv4 or GRE/IPv6 tunnel interface on the primary gateway as the backup interface of its GRE P2MP tunnel interface.

When the primary gateway cannot reach the branch network, it sends the traffic destined for the branch network to the backup gateway through the backup interface. Then, the backup gateway sends the traffic to the destination.

The backup interface is also included for tunnel selection on the primary gateway. If the backup interface does not have a GRE key, its priority is lower than all GRE P2MP dynamic tunnel entries. If the backup interface has a GRE key, the headquarters gateway compares the GRE key with the GRE keys of GRE P2MP dynamic tunnel entries. The lower the value, the higher the priority.

Figure 13 Tunnel backup in the headquarters

Restrictions: Hardware compatibility with GRE P2MP tunnels

Hardware

GRE P2MP tunnel compatibility

F5010, F5020, F5020-GM, F5030, F5030-6GW, F5040, F5060, F5080, F5000-AI-20, F5000-AI-40, F5000-V30, F5000-C, F5000-S, F5000-M, F5000-A

Yes

F1000-AI-20, F1000-AI-30, F1000-AI-50, F1000-AI-60, F1000-AI-70, F1000-AI-80, F1000-AI-90

Yes

F1003-L, F1005-L, F1010-L

No

F1005, F1010

No

F1020, F1020-GM, F1030, F1030-GM, F1050, F1060, F1070, F1070-GM, F1070-GM-L, F1080, F1090, F1000-V70

Yes

F1000-AK1110, F1000-AK1120, F1000-AK1130, F1000-AK1140

No

F1000-AK1212, F1000-AK1222, F1000-AK1232, F1000-AK1312, F1000-AK1322, F1000-AK1332

Yes

F1000-AK1414, F1000-AK1424, F1000-AK1434, F1000-AK1514, F1000-AK1524, F1000-AK1534, F1000-AK1614

Yes

F1000-AK108, F1000-AK109, F1000-AK110, F1000-AK115, F1000-AK120, F1000-AK125, F1000-AK710

No

F1000-AK130, F1000-AK135, F1000-AK140, F1000-AK145, F1000-AK150, F1000-AK155, F1000-AK160, F1000-AK165, F1000-AK170, F1000-AK175, F1000-AK180, F1000-AK185, F1000-GM-AK370, F1000-GM-AK380, F1000-AK711

Yes

LSU3FWCEA0, LSUM1FWCEAB0, LSX1FWCEA1

Yes

LSXM1FWDF1, LSUM1FWDEC0, IM-NGFWX-IV, LSQM1FWDSC0, LSWM1FWD0, LSPM6FWD, LSQM2FWDSC0

No

vFW1000, vFW2000

Yes

Restrictions and guidelines: GRE P2MP tunnel configuration

For more information about the interface tunnel, source, and tunnel discard ipv4-compatible-packet commands and additional configuration commands on a tunnel interface, see "Configuring tunneling" and tunneling commands in VPN Command Reference.

Restrictions and guidelines for the headquarters end of a P2MP tunnel

When you configure the headquarters end of a P2MP tunnel, follow these restrictions and guidelines:

·     Do not configure the same tunnel source address for multiple P2MP tunnel interfaces on the gateway.

·     Do not configure the same tunnel source and destination addresses for a GRE P2MP tunnel interface and a GRE tunnel interface.

·     Do not configure a GRE key on a GRE P2MP tunnel interface.

·     You can specify a mask or prefix length for the headquarters gateway to create dynamic tunnel entries for branch networks. The gateway generates only one dynamic tunnel entry for each branch. Make sure the gateway can reach the devices in all branches by using the dynamic tunnel entries.

Restrictions and guidelines for the branch ends of a P2MP tunnel

The branch networks cannot communicate with one another. They do not have tunnels to reach one another.

When you configure the branch ends of a P2MP tunnel, follow these restrictions and guidelines:

·     The tunnel destination address at each branch end must be the tunnel source address of the P2MP tunnel interface on the headquarters.

·     On each gateway, the IP address of the tunnel interface and the tunnel destination address configured on the tunnel interface must be in different subnets.

·     You can configure GRE keys on the branch GRE tunnel interfaces for the headquarters to determine the dynamic tunnel entry priority of each branch.

Restrictions and guidelines for all ends of a P2MP tunnel

The following restrictions and guidelines apply to all ends of a P2MP tunnel:

·     You can enable or disable GRE checksum at each end of a tunnel. If GRE checksum is enabled at a tunnel end, the tunnel end sends packets carrying the checksum to the peer end. A tunnel end checks the GRE checksum of a received packet if the packet carries a GRE checksum, whether or not the tunnel end is enabled with GRE checksum.

·     Configure routes reaching the destination networks through the local tunnel interface. You can configure the routes by using one of the following methods:

¡     Configure static routes, using the local tunnel interface as the outgoing interface of the routes.

¡     Enable a dynamic routing protocol on both the tunnel interface and the interface connecting the private network. This allows the dynamic routing protocol to establish routing entries with the tunnel interface as the outgoing interface.

·     Dynamic entry-based GRE P2MP tunnels cannot forward private traffic.

GRE P2MP tunnel interface configuration tasks at a glance

To configure a GRE P2MP tunnel interface, perform one of the following tasks:

·     Configuring a GRE P2MP tunnel interface for dynamic entry-based tunnel setup

·     Configuring a GRE P2MP tunnel interface for static entry-based tunnel setup

Configuring a GRE P2MP tunnel interface

Configuring a GRE P2MP tunnel interface for dynamic entry-based tunnel setup

1.     Enter system view.

system-view

2.     Create a GRE P2MP tunnel interface and enter tunnel interface view.

interface tunnel interface-number mode gre-p2mp [ ipv6 ]

In this mode, the transport and passenger protocols support both IPv4 and IPv6.

The other end of a GRE P2MP tunnel interface must be a GRE/IPv4 or GRE/IPv6 tunnel interface.

3.     Configure an IP address for the tunnel interface.

IPv4:

For information about how to assign an IPv4 address to an interface, see "Configuring IP addressing."

IPv6:

For information about how to assign an IPv6 address to an interface, see "Configuring basic IPv6 settings."

By default, no IP address is configured for a tunnel interface.

4.     Configure a source IP address or source interface for the tunnel interface.

source { ipv4-address | ipv6-address | interface-type interface-number }

By default, no source IP address or interface is configured for a tunnel interface.

If you configure a source IP address for a tunnel interface, the tunnel interface uses the source IP address as the source IP address of the encapsulated packets.

If you configure a source interface for a tunnel interface, the tunnel interface uses the following IP address as the source IP address of the encapsulated packets:

¡     Primary IP address of the source interface in an IPv4 network.

¡     The lowest IP address of the source interface in an IPv6 network.

5.     (Optional.) Enable GRE checksum.

gre checksum

By default, GRE checksum is disabled.

6.     (Optional.) Set an aging timer for dynamic tunnel entries of the GRE P2MP tunnel interface.

gre p2mp aging-time aging-time

By default, the aging timer is 5 seconds for dynamic tunnel entries of a GRE P2MP tunnel interface.

7.     (Optional.) Specify a backup interface for the GRE P2MP tunnel interface.

gre p2mp backup-interface tunnel number

By default, no backup interface is specified for a GRE P2MP tunnel interface.

The backup interface must be a GRE/IPv4 or GRE/IPv6 tunnel interface. The backup interface must exist.

8.     (Optional.) Specify an IPv4 address mask or IPv6 address prefix for the branch networks.

gre p2mp branch-network-mask { mask | mask-length | ipv6 prefix-length }

By default, the IPv4 address mask is 255.255.255.255 (the mask length is 32) and the IPv6 address prefix length is 128.

9.     (Optional.) Enable next hop host route learning.

gre p2mp nexthop-learning

By default, next hop host route learning is disabled.

This command is supported only on GRE/IPv4 P2MP tunnel interfaces.

10.     Return to system view.

quit

11.     (Optional.) Enable dropping IPv6 packets that use IPv4-compatible IPv6 addresses.

tunnel discard ipv4-compatible-packet

By default, IPv6 packets that use IPv4-compatible IPv6 packets are not dropped.

Configuring a GRE P2MP tunnel interface for static entry-based tunnel setup

1.     Enter system view.

system-view

2.     Create a GRE P2MP tunnel template and enter its view.

gre p2mp-template template-name

3.     Configure a tunnel mapping entry.

map [ vpn-instance vpn-instance-name ] branch-network-address branch-network-address { mask | mask-length } tunnel-destination tunnel-dest-address [ checksum-fill checksum-value ]

By default, no tunnel mapping entries are configured for a GRE P2MP tunnel template.

Specify the checksum-fill checksum-value option depending on your network. The option might cause GRE checksum failures.

4.     Return to system view.

quit

5.     Create a GRE P2MP tunnel interface and enter its view.

interface tunnel interface-number mode gre-p2mp

The other end of a GRE P2MP tunnel interface must be a GRE/IPv4 tunnel interface.

6.     Configure an IPv4 address for the tunnel interface.

For information about how to assign an IPv4 address to an interface, see "Configuring IP addressing."

By default, no IPv4 address is configured for a tunnel interface.

7.     Configure a source IP address or source interface for the tunnel interface.

source { ipv4-address | interface-type interface-number }

By default, no source IP address or interface is configured for a tunnel interface.

If you configure a source IP address for a tunnel interface, the tunnel interface uses the source IP address as the source IP address of the encapsulated packets.

If you configure a source interface for a tunnel interface, the tunnel interface uses the primary IP address of the source interface as the source IP address of the encapsulated packets.

8.     Apply the GRE P2MP tunnel template to the tunnel interface.

gre p2mp-template template-name

By default, no GRE P2MP tunnel template is applied to a GRE P2MP tunnel interface.

You must specify an existing GRE P2MP tunnel template for this command.

9.     (Optional.) Enable GRE checksum.

gre checksum

By default, GRE checksum is disabled.

10.     (Optional.) Configure the preference of static routes issued by the tunnel mapping entries in the GRE P2MP tunnel template.

tunnel route-static [ preference preference-value ]

By default, the preference is 60.

Display and maintenance commands for GRE P2MP tunnels

Execute display commands in any view and reset commands in user view.

 

Task

Command

Display dynamic tunnel entry information for a GRE P2MP tunnel interface.

display gre p2mp tunnel-table interface tunnel number [ ipv4 | ipv6 ]

Display packet statistics of static tunnel entries for a GRE P2MP tunnel interface.

display gre p2mp tunnel-table statistics interface tunnel number [ vpn-instance vpn-instance-name ] [ branch-network-address branch-network-address { mask | mask-length } ]

Clear dynamic tunnel entry information for a GRE P2MP tunnel interface.

reset gre p2mp tunnel-table interface tunnel number [ destination { dest-address | ipv6 dest-ipv6-address } tunnel-destination { tunnel-dest-address | ipv6 tunnel-dest-address } ]

Clear packet statistics of static tunnel entries for a GRE P2MP tunnel interface.

reset gre p2mp tunnel-table statistics interface tunnel number [ vpn-instance vpn-instance-name ] [ branch-network-address branch-network-address { mask | mask-length } ]

 

GRE P2MP tunnel configuration examples

Example: Configuring a GRE P2MP tunnel

Network configuration

As shown in Figure 14, Device A is the gateway of the headquarters, and Device B and Device C are the gateways of the branches.

Configure the devices to meet the following requirements:

·     Device A can dynamically set up a GRE P2MP tunnel with multiple branch gateways.

·     Device B and Device C each can set up a GRE tunnel with Device A.

·     Branch 1 and Branch 2 cannot communicate.

Figure 14 Network diagram

Table 1 IP address assignment

Device

Interface

IP address

Security zone

Device A

GE1/0/1

11.1.1.1/24

Untrust

GE1/0/2

192.168.11.1/24

Trust

Tunnel 0

192.168.22.1/24

Untrust

Device B

GE1/0/1

11.1.1.2/24

Untrust

GE1/0/2

192.168.12.1/24

Trust

Tunnel 0

192.168.22.2/24

Untrust

Device C

GE1/0/1

11.1.1.3/24

Untrust

GE1/0/2

192.168.13.1/24

Trust

Tunnel 0

192.168.22.3/24

Untrust

 

Procedure

This example uses Device B to describe the gateway configuration for a branch. The gateway configuration for other branches is the same as the gateway configuration on Device B.

1.     Configure Device A:

# Assign an IP addresse to interface GigabitEthernet 1/0/1.

<DeviceA> system-view

[DeviceA] interface gigabitethernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] ip address 11.1.1.1 255.255.255.0

[DeviceA-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE P2MP.

[DeviceA] interface tunnel 0 mode gre-p2mp

[DeviceA-Tunnel0] ip address 192.168.22.1 255.255.255.0

[DeviceA-Tunnel0] source 11.1.1.1

[DeviceA-Tunnel0] gre p2mp branch-network-mask 255.255.255.0

[DeviceA-Tunnel0] gre p2mp aging-time 20

[DeviceA-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 11.1.1.2.

[DeviceA] ip route-static 11.1.2.2 24 11.1.1.2

[DeviceA] ip route-static 192.168.12.0 255.255.255.0 tunnel 0

# Add interfaces to security zones.

[DeviceA] security-zone name Untrust

[DeviceA-security-zone-Untrust] import interface Tunnel 0

[DeviceA-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceA-security-zone-Untrust] quit

[DeviceA] security-zone name Trust

[DeviceA-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceA-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device A to send packets to Device B.

[DeviceA] security-policy ip

[DeviceA-security-policy-ip] rule name grelocalout

[DeviceA-security-policy-ip-1-grelocalout] source-zone local

[DeviceA-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 11.1.1.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 192.168.22.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 192.168.11.1

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 11.1.2.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 192.168.22.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 192.168.12.1

[DeviceA-security-policy-ip-1-grelocalout] action pass

[DeviceA-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to to allow Device A to receive the packets sent from Device B.

[DeviceA-security-policy-ip] rule name grelocalin

[DeviceA-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceA-security-policy-ip-2-grelocalin] destination-zone local

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 11.1.2.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 192.168.22.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 192.168.12.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 11.1.1.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 192.168.22.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 192.168.11.1

[DeviceA-security-policy-ip-2-grelocalin] action pass

[DeviceA-security-policy-ip-2-grelocalin] quit

[DeviceA-security-policy-ip] quit

2.     Configure Device B:

# Assign an IP addresse to interface GigabitEthernet 1/0/1.

<DeviceB> system-view

[DeviceB] interface gigabitethernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] ip address 11.1.2.2 255.255.255.0

[DeviceB-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE/IPv4.

[DeviceB] interface tunnel 0 mode gre

[DeviceB-Tunnel0] ip address 192.168.22.2 255.255.255.0

[DeviceB-Tunnel0] source 11.1.2.2

[DeviceB-Tunnel0] destination 11.1.1.1

[DeviceB-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 11.1.2.3.

[DeviceB] ip route-static 11.1.1.1 24 11.1.2.3

[DeviceB] ip route-static 192.168.11.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceB] security-zone name Untrust

[DeviceB-security-zone-Untrust] import interface Tunnel 0

[DeviceB-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceB-security-zone-Untrust] quit

[DeviceB] security-zone name Trust

[DeviceB-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceB-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device B to send packets to Device A.

[DeviceB] security-policy ip

[DeviceB-security-policy-ip] rule name grelocalout

[DeviceB-security-policy-ip-1-grelocalout] source-zone local

[DeviceB-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 11.1.2.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 192.168.22.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 192.168.12.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 11.1.1.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 192.168.22.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 192.168.11.1

[DeviceB-security-policy-ip-1-grelocalout] action pass

[DeviceB-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to to allow Device B to receive the packets sent from Device A.

[DeviceB-security-policy-ip] rule name grelocalin

[DeviceB-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceB-security-policy-ip-2-grelocalin] destination-zone local

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 11.1.1.1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 192.168.22.1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 192.168.11.1

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 11.1.2.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 192.168.22.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 192.168.12.1

[DeviceB-security-policy-ip-2-grelocalin] action pass

[DeviceB-security-policy-ip-2-grelocalin] quit

[DeviceB-security-policy-ip] quit

Verifying the configuration

# Display GRE P2MP tunnel entries on Device A. The output shows that Device A does not have GRE P2MP tunnel entries.

[DeviceA] display gre p2mp tunnel-table interface tunnel 0

Total number:0

Dest Addr               Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

# Ping Host A from Host B. The ping operation succeeds. (Details not shown.)

# Display GRE P2MP tunnel entries again on Device A. The output shows that Device A has created a GRE P2MP tunnel entry destined for the branch.

[DeviceA] display gre p2mp tunnel-table interface tunnel 0

Total number:1

Dest Addr               Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

192.168.12.0            255.255.255.0   11.1.1.2                          5

Example: Configuring GRE P2MP headquarters-side tunnel backup

Network configuration

As shown in Figure 15, Device A is the gateway of the headquarters, Device B is the backup gateway of the headquarters, and Device C is the gateway of the branch.

Configure the devices as follows:

·     Configure a GRE P2MP tunnel interface on Device A and Device B, respectively. Device A and Device B use the interfaces to establish GRE P2MP tunnels with Device C.

·     Configure a GRE/IPv4 tunnel interface on Device A and Device B, respectively. Configure the GRE/IPv4 tunnel interface on Device A as the backup interface of the GRE P2MP tunnel interface. To avoid loops, do not configure the GRE/IPv4 tunnel interface on Device B as the backup interface of the GRE P2MP tunnel interface.

·     Configure GRE/IPv4 tunnel interfaces on Device C for the device to establish tunnels with Device A and Device B.

Figure 15 Network diagram

Table 2 IP address assignment

Device

Interface

IP address

Security zone

Device A

GE1/0/1

11.1.1.1/24

Untrust

GE1/0/2

10.1.1.1/24

Trust

GE1/0/3

192.168.11.1/24

Trust

Tunnel 0

172.168.1.1/24

Untrust

Tunnel 1

192.168.22.1/24

Trust

Device B

GE1/0/1

11.1.1.2/24

Untrust

GE1/0/2

10.1.1.2/24

Trust

GE1/0/3

192.168.11.2/24

Trust

Tunnel 0

172.168.2.2/24

Untrust

Tunnel 1

192.168.22.2/24

Trust

Device C

GE1/0/1

11.1.1.3/24

Untrust

GE1/0/2

192.168.12.1/24

Trust

Tunnel 0

172.168.1.3/24

Untrust

Tunnel 1

172.168.2.3/24

Untrust

 

Restrictions and guidelines

You need to disconnect the link between Device A and Device C to verify the tunnel backup feature. To make sure Device C can detect the link loss and switch the traffic forwarding path to the link connecting Device B, perform one of the following tasks:

·     If Device C and Device A are directly connected, configure static routes on Device C.

·     If Device C and Device A are not directly connected, use one of the following methods:

¡     Configure a dynamic routing protocol on Device A, Device B, and Device C.

¡     Configure static routes on Device C and associate the routes with track entries for detecting the route reachability status. For more information about track entries, see Network Management and Monitoring Configuration Guide.

This example uses the static routes method.

Procedure

1.     Configure Device A:

# Assign an IP addresse to interface GigabitEthernet 1/0/1.

<DeviceA> system-view

[DeviceA] interface gigabitethernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] ip address 11.1.1.1 255.255.255.0

[DeviceA-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

# Create tunnel interface Tunnel 1 and specify the tunnel mode as GRE/IPv4.

[DeviceA] interface tunnel 1 mode gre

[DeviceA-Tunnel1] ip address 192.168.22.1 255.255.255.0

[DeviceA-Tunnel1] source 10.1.1.1

[DeviceA-Tunnel1] destination 10.1.2.2

[DeviceA-Tunnel1] quit

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE P2MP.

[DeviceA] interface tunnel 0 mode gre-p2mp

[DeviceA-Tunnel0] ip address 172.168.1.1 255.255.255.0

[DeviceA-Tunnel0] source 11.1.1.1

[DeviceA-Tunnel0] gre p2mp branch-network-mask 255.255.255.0

[DeviceA-Tunnel0] gre p2mp aging-time 20

[DeviceA-Tunnel0] gre p2mp backup-interface tunnel 1

[DeviceA-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 11.1.1.2.

[DeviceA] ip route-static 11.1.3.3 24 11.1.1.2

[DeviceA] ip route-static 192.168.12.0 255.255.255.0 tunnel 0

# Add interfaces to security zones.

[DeviceA] security-zone name Untrust

[DeviceA-security-zone-Untrust] import interface Tunnel 0

[DeviceA-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceA-security-zone-Untrust] quit

[DeviceA] security-zone name Trust

[DeviceA-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceA-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceA-security-zone-Untrust] import interface Tunnel 1

[DeviceA-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device A to send packets to Device C.

[DeviceA] security-policy ip

[DeviceA-security-policy-ip] rule name grelocalout

[DeviceA-security-policy-ip-1-grelocalout] source-zone local

[DeviceA-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 11.1.1.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 172.168.1.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 192.168.11.1

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 11.1.3.3

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 172.168.1.3

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 192.168.12.1

[DeviceA-security-policy-ip-1-grelocalout] action pass

[DeviceA-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device A to receive the packets sent from Device C.

[DeviceA-security-policy-ip] rule name grelocalin

[DeviceA-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceA-security-policy-ip-2-grelocalin] destination-zone local

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 11.1.3.3

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 172.168.1.3

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 192.168.12.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 11.1.1.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 172.168.1.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 192.168.11.1

[DeviceA-security-policy-ip-2-grelocalin] action pass

[DeviceA-security-policy-ip-2-grelocalin] quit

[DeviceA-security-policy-ip] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device A to send packets to Device B.

[DeviceA] security-policy ip

[DeviceA-security-policy-ip] rule name grelocalout

[DeviceA-security-policy-ip-3-grelocalout] source-zone local

[DeviceA-security-policy-ip-3-grelocalout] destination-zone trust

[DeviceA-security-policy-ip-3-grelocalout] source-ip-host 10.1.1.1

[DeviceA-security-policy-ip-3-grelocalout] source-ip-host 192.168.22.1

[DeviceA-security-policy-ip-3-grelocalout] source-ip-host 192.168.11.1

[DeviceA-security-policy-ip-3-grelocalout] destination-ip-host 10.1.2.2

[DeviceA-security-policy-ip-3-grelocalout] destination-ip-host 192.168.22.2

[DeviceA-security-policy-ip-3-grelocalout] destination-ip-host 192.168.12.1

[DeviceA-security-policy-ip-3-grelocalout] action pass

[DeviceA-security-policy-ip-3-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device A to receive the packets sent from Device B.

[DeviceA-security-policy-ip] rule 4 name grelocalin

[DeviceA-security-policy-ip-4-grelocalin] source-zone trust

[DeviceA-security-policy-ip-4-grelocalin] destination-zone local

[DeviceA-security-policy-ip-4-grelocalin] source-ip-host 10.1.2.2

[DeviceA-security-policy-ip-4-grelocalin] source-ip-host 192.168.22.2

[DeviceA-security-policy-ip-4-grelocalin] source-ip-host 192.168.12.1

[DeviceA-security-policy-ip-4-grelocalin] destination-ip-host 10.1.1.1

[DeviceA-security-policy-ip-4-grelocalin] destination-ip-host 192.168.22.1

[DeviceA-security-policy-ip-4-grelocalin] destination-ip-host 192.168.11.1

[DeviceA-security-policy-ip-4-grelocalin] action pass

[DeviceA-security-policy-ip-4-grelocalin] quit

[DeviceA-security-policy-ip] quit

2.     Configure Device B:

# Assign an IP addresse to interface GigabitEthernet 1/0/1.

<DeviceB> system-view

[DeviceB] interface gigabitethernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] ip address 11.1.2.2 255.255.255.0

[DeviceB-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE P2MP.

[DeviceB] interface tunnel 0 mode gre-p2mp

[DeviceB-Tunnel0] ip address 172.168.2.2 255.255.255.0

[DeviceB-Tunnel0] source 11.1.2.2

[DeviceB-Tunnel0] gre p2mp branch-network-mask 255.255.255.0

[DeviceB-Tunnel0] gre p2mp aging-time 20

[DeviceB-Tunnel0] quit

# Create tunnel interface Tunnel 1 and specify the tunnel mode as GRE/IPv4.

[DeviceB] interface tunnel 1 mode gre

[DeviceB-Tunnel1] ip address 192.168.22.2 255.255.255.0

[DeviceB-Tunnel1] source 10.1.2.2

[DeviceB-Tunnel1] destination 10.1.1.1

[DeviceB-Tunnel1] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 11.1.2.3.

[DeviceB] ip route-static 11.1.3.3 24 11.1.2.3

[DeviceB] ip route-static 192.168.12.1 24 tunnel 0

# Add interfaces to security zones.

[DeviceB] security-zone name Untrust

[DeviceB-security-zone-Untrust] import interface Tunnel 0

[DeviceB-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceB-security-zone-Untrust] quit

[DeviceB] security-zone name Trust

[DeviceB-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceB-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceB-security-zone-trust] import interface Tunnel 1

[DeviceB-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device B to send packets to Device C.

[DeviceB] security-policy ip

[DeviceB-security-policy-ip] rule name grelocalout

[DeviceB-security-policy-ip-1-grelocalout] source-zone local

[DeviceB-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 11.1.2.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 172.168.2.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 192.168.11.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 11.1.3.3

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 172.168.2.3

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 192.168.12.1

[DeviceB-security-policy-ip-1-grelocalout] action pass

[DeviceB-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device B to receive the packets sent from Device C.

[DeviceB-security-policy-ip] rule name grelocalin

[DeviceB-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceB-security-policy-ip-2-grelocalin] destination-zone local

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 11.1.3.3

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 172.168.2.3

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 192.168.12.1

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 11.1.2.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 172.168.2.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 192.168.11.1

[DeviceB-security-policy-ip-2-grelocalin] action pass

[DeviceB-security-policy-ip-2-grelocalin] quit

[DeviceB-security-policy-ip] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device B to send packets to Device A.

[DeviceB] security-policy ip

[DeviceB-security-policy-ip] rule name grelocalout

[DeviceB-security-policy-ip-3-grelocalout] source-zone local

[DeviceB-security-policy-ip-3-grelocalout] destination-zone trust

[DeviceB-security-policy-ip-3-grelocalout] source-ip-host 10.1.2.2

[DeviceB-security-policy-ip-3-grelocalout] source-ip-host 192.168.22.2

[DeviceB-security-policy-ip-3-grelocalout] source-ip-host 192.168.12.1

[DeviceB-security-policy-ip-3-grelocalout] destination-ip-host 10.1.1.1

[DeviceB-security-policy-ip-3-grelocalout] destination-ip-host 192.168.22.1

[DeviceB-security-policy-ip-3-grelocalout] destination-ip-host 192.168.11.1

[DeviceB-security-policy-ip-3-grelocalout] action pass

[DeviceB-security-policy-ip-3-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device B to receive the packets sent from Device A.

[DeviceB-security-policy-ip] rule name grelocalin

[DeviceB-security-policy-ip-4-grelocalin] source-zone trust

[DeviceB-security-policy-ip-4-grelocalin] destination-zone local

[DeviceB-security-policy-ip-4-grelocalin] source-ip-host 10.1.1.1

[DeviceB-security-policy-ip-4-grelocalin] source-ip-host 192.168.22.1

[DeviceB-security-policy-ip-4-grelocalin] source-ip-host 192.168.11.1

[DeviceB-security-policy-ip-4-grelocalin] destination-ip-host 10.1.2.2

[DeviceB-security-policy-ip-4-grelocalin] destination-ip-host 192.168.22.2

[DeviceB-security-policy-ip-4-grelocalin] destination-ip-host 192.168.12.1

[DeviceB-security-policy-ip-4-grelocalin] action pass

[DeviceB-security-policy-ip-4-grelocalin] quit

[DeviceB-security-policy-ip] quit

3.     Configure Device C:

# Assign an IP addresse to interface GigabitEthernet 1/0/1.

<DeviceC> system-view

[DeviceC] interface gigabitethernet 1/0/1

[DeviceC-GigabitEthernet1/0/1] ip address 11.1.3.3 255.255.255.0

[DeviceC-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE/IPv4.

[DeviceC] interface tunnel 0 mode gre

[DeviceC-Tunnel0] ip address 172.168.1.3 255.255.255.0

[DeviceC-Tunnel0] source 11.1.3.3

[DeviceC-Tunnel0] destination 11.1.1.1

[DeviceC-Tunnel0] quit

# Create tunnel interface Tunnel 1 and specify the tunnel mode as GRE/IPv4.

[DeviceC] interface tunnel 1 mode gre

[DeviceC-Tunnel1] ip address 172.168.2.3 255.255.255.0

[DeviceC-Tunnel1] source 11.1.3.3

[DeviceC-Tunnel1] destination 11.1.2.2

[DeviceC-Tunnel1] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 or Tunnel 1 and the next hop is 11.1.3.4. The route with priority 1 has a higher priority than the route with priority 10.

[DeviceC] ip route-static 11.1.1.1 24 11.1.3.4

[DeviceC] ip route-static 11.1.2.2 24 11.1.3.4

[DeviceC] ip route-static 192.168.11.0 255.255.255.0 tunnel 0 preference 1

[DeviceC] ip route-static 192.168.11.0 255.255.255.0 tunnel 1 preference 10

# Add interfaces to security zones.

[DeviceC] security-zone name Untrust

[DeviceC-security-zone-Untrust] import interface Tunnel 0

[DeviceC-security-zone-Untrust] import interface Tunnel 1

[DeviceC-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceC-security-zone-Untrust] quit

[DeviceC] security-zone name Trust

[DeviceC-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceC-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device C to send packets to Device A and Device B.

[DeviceC] security-policy ip

[DeviceC-security-policy-ip] rule name grelocalout

[DeviceC-security-policy-ip-1-grelocalout] source-zone local

[DeviceC-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceC-security-policy-ip-1-grelocalout] source-ip-host 11.1.3.3

[DeviceC-security-policy-ip-1-grelocalout] source-ip-host 172.168.1.3

[DeviceC-security-policy-ip-1-grelocalout] source-ip-host 172.168.2.3

[DeviceC-security-policy-ip-1-grelocalout] source-ip-host 192.168.12.1

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 11.1.1.1

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 11.1.2.2

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 172.168.1.1

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 192.168.22.2

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 192.168.11.1

[DeviceC-security-policy-ip-1-grelocalout] action pass

[DeviceC-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device C to receive the packets sent from Device A and Device B.

[DeviceC-security-policy-ip] rule name grelocalin

[DeviceC-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceC-security-policy-ip-2-grelocalin] destination-zone local

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 11.1.1.1

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 11.1.2.2

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 172.168.1.1

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 192.168.22.2

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 192.168.11.1

[DeviceC-security-policy-ip-2-grelocalin] destination-ip-host 11.1.3.3

[DeviceC-security-policy-ip-2-grelocalin] destination-ip-host 172.168.1.3

[DeviceC-security-policy-ip-2-grelocalin] destination-ip-host 172.168.2.3

[DeviceC-security-policy-ip-2-grelocalin] destination-ip-host 192.168.12.1

[DeviceC-security-policy-ip-2-grelocalin] action pass

[DeviceC-security-policy-ip-2-grelocalin] quit

[DeviceC-security-policy-ip] quit

Verifying the configuration

# Ping Host A from Host C. The ping operation succeeds. (Details not shown.)

# Display GRE P2MP tunnel entries on Device A.

[DeviceA] display gre p2mp tunnel-table interface tunnel 0

Total number:1

Dest Addr             Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

192.168.12.0          255.255.255.0   11.1.1.3                          10

The output shows that Device A has a GRE P2MP tunnel entry for the branch.

# Shut down tunnel interface Tunnel 0 on Device C.

[DeviceC] interface tunnel 0

[DeviceC-Tunnel0] shutdown

[DeviceC-Tunnel0] quit

# Verify that Device A has deleted the GRE P2MP tunnel entry for the branch after the tunnel entry aging timer expires.

[DeviceA] display gre p2mp tunnel-table interface tunnel 0

Total number:0

Dest Addr             Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

# Ping Host A from Host C. The ping operation succeeds. (Details not shown.)

# Display GRE P2MP tunnel entries on Device B.

[DeviceB] display gre p2mp tunnel-table interface tunnel 0

Total number:1

Dest Addr             Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

192.168.12.0          255.255.255.0   11.1.1.3                          10

The output shows that Device B has created a tunnel entry destined for the branch. This indicates that Device A forwarded traffic destined for the branch to Device B through the backup tunnel interface.

Example: Configuring GRE P2MP branch-side tunnel backup

Network configuration

As shown in Figure 16, Device A is the gateway of the headquarters, Device B is the gateway of the branch, and Device C is the backup gateway of the branch.

Configure the devices as follows:

·     Configure a GRE P2MP tunnel interface on Device A. Device A uses the interface to establish a GRE P2MP tunnel with Device B and Device C.

·     Configure a GRE/IPv4 tunnel interface on Device B and Device C, respectively. The devices use the tunnel interfaces to establish tunnels with Device A.

·     Assign different GRE keys to the GRE/IPv4 tunnel interfaces on Device B and Device C. Device A selects the tunnel that has a GRE key with a higher priority to forward traffic. In this example, the tunnel destined for Device B has a higher priority.

Figure 16 Network diagram

Table 3 IP address assignment

Device

Interface

IP address

Security zone

Device A

GE1/0/1

11.1.1.1/24

Untrust

GE1/0/2

172.17.17.1/24

Trust

Tunnel 0

192.168.22.1/24

Untrust

Device B

GE1/0/1

11.1.1.2/24

Untrust

GE1/0/2

192.168.1.2/24

Trust

Tunnel 0

192.168.22.2/24

Untrust

Device C

GE1/0/1

11.1.1.3/24

Untrust

GE1/0/2

192.168.1.3/24

Trust

Tunnel 0

192.168.22.3/24

Untrust

 

Procedure

1.     Configure Device A:

# Assign IP addresses to interfaces GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.

<DeviceA> system-view

[DeviceA] interface gigabitethernet 1/0/1

[DeviceA-GigabitEthernet1/0/1] ip address 11.1.1.1 255.255.255.0

[DeviceA-GigabitEthernet1/0/1] quit

[DeviceA] interface gigabitethernet 1/0/2

[DeviceA-GigabitEthernet1/0/2] ip address 172.17.17.1 255.255.255.0

[DeviceA-GigabitEthernet1/0/2] quit

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE P2MP.

[DeviceA] interface tunnel 0 mode gre-p2mp

[DeviceA-Tunnel0] ip address 192.168.22.1 255.255.255.0

[DeviceA-Tunnel0] gre p2mp branch-network-mask 255.255.255.0

[DeviceA-Tunnel0] gre p2mp aging-time 20

[DeviceA-Tunnel0] source 11.1.1.1

[DeviceA-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 11.1.1.2.

[DeviceA] ip route-static 11.1.2.2 24 11.1.1.2

[DeviceA] ip route-static 11.1.3.3 24 11.1.1.2

[DeviceA] ip route-static 192.168.1.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceA] security-zone name Untrust

[DeviceA-security-zone-Untrust] import interface Tunnel 0

[DeviceA-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceA-security-zone-Untrust] quit

[DeviceA] security-zone name Trust

[DeviceA-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceA-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device A to send packets to Device B and Device C.

[DeviceA] security-policy ip

[DeviceA-security-policy-ip] rule name grelocalout

[DeviceA-security-policy-ip-1-grelocalout] source-zone local

[DeviceA-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 11.1.1.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 192.168.22.1

[DeviceA-security-policy-ip-1-grelocalout] source-ip-host 172.17.17.1

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 11.1.2.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 11.1.3.3

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 192.168.22.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 192.168.22.3

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 192.168.1.2

[DeviceA-security-policy-ip-1-grelocalout] destination-ip-host 192.168.1.3

[DeviceA-security-policy-ip-1-grelocalout] action pass

[DeviceA-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device A to receive the packets sent from Device B and Device C.

[DeviceA-security-policy-ip] rule name grelocalin

[DeviceA-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceA-security-policy-ip-2-grelocalin] destination-zone local

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 11.1.2.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 11.1.3.3

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 192.168.22.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 192.168.22.3

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 192.168.1.2

[DeviceA-security-policy-ip-2-grelocalin] source-ip-host 192.168.1.3

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 11.1.1.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 192.168.22.1

[DeviceA-security-policy-ip-2-grelocalin] destination-ip-host 172.17.17.1

[DeviceA-security-policy-ip-2-grelocalin] action pass

[DeviceA-security-policy-ip-2-grelocalin] quit

[DeviceA-security-policy-ip] quit

2.     Configure Device B:

# Assign IP addresses to interfaces GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.

<DeviceB> system-view

[DeviceB] interface gigabitethernet 1/0/1

[DeviceB-GigabitEthernet1/0/1] ip address 11.1.2.2 255.255.255.0

[DeviceB-GigabitEthernet1/0/1] quit

[DeviceB] interface gigabitethernet 1/0/2

[DeviceB-GigabitEthernet1/0/2] ip address 192.168.1.2 255.255.255.0

[DeviceB-GigabitEthernet1/0/2] quit

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE/IPv4.

[DeviceB] interface tunnel 0 mode gre

[DeviceB-Tunnel0] ip address 192.168.22.2 255.255.255.0

[DeviceB-Tunnel0] source 11.1.2.2

[DeviceB-Tunnel0] destination 11.1.1.1

[DeviceB-Tunnel0] gre key 1

[DeviceB-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 11.1.2.3.

[DeviceB] ip route-static 11.1.1.1 24 11.1.2.3

[DeviceB] ip route-static 172.17.17.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceB] security-zone name Untrust

[DeviceB-security-zone-Untrust] import interface Tunnel 0

[DeviceB-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceB-security-zone-Untrust] quit

[DeviceB] security-zone name Trust

[DeviceB-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceB-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device B to send packets to Device A.

[DeviceB] security-policy ip

[DeviceB-security-policy-ip] rule name grelocalout

[DeviceB-security-policy-ip-1-grelocalout] source-zone local

[DeviceB-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 11.1.2.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 192.168.22.2

[DeviceB-security-policy-ip-1-grelocalout] source-ip-host 192.168.1.2

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 11.1.1.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 192.168.22.1

[DeviceB-security-policy-ip-1-grelocalout] destination-ip-host 172.17.17.1

[DeviceB-security-policy-ip-1-grelocalout] action pass

[DeviceB-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device B to receive the packets sent from Device A.

[DeviceB-security-policy-ip] rule 2 name grelocalin

[DeviceB-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceB-security-policy-ip-2-grelocalin] destination-zone local

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 11.1.1.1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 192.168.22.1

[DeviceB-security-policy-ip-2-grelocalin] source-ip-host 172.17.17.1

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 11.1.2.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 192.168.22.2

[DeviceB-security-policy-ip-2-grelocalin] destination-ip-host 192.168.1.2

[DeviceB-security-policy-ip-2-grelocalin] action pass

[DeviceB-security-policy-ip-2-grelocalin] quit

[DeviceB-security-policy-ip] quit

3.     Configure Device C:

# Assign IP addresses to interfaces GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.

<DeviceC> system-view

[DeviceC] interface gigabitethernet 1/0/1

[DeviceC-GigabitEthernet1/0/1] ip address 11.1.3.3 255.255.255.0

[DeviceC-GigabitEthernet1/0/1] quit

[DeviceC] interface gigabitethernet 1/0/2

[DeviceC-GigabitEthernet1/0/2] ip address 192.168.1.3 255.255.255.0

[DeviceC-GigabitEthernet1/0/2] quit

# Create tunnel interface Tunnel 0 and specify the tunnel mode as GRE/IPv4.

[DeviceC] interface tunnel 0 mode gre

[DeviceC-Tunnel0] ip address 192.168.22.3 255.255.255.0

[DeviceC-Tunnel0] source 11.1.3.3

[DeviceC-Tunnel0] destination 11.1.1.1

[DeviceC-Tunnel0] gre key 2

[DeviceC-Tunnel0] quit

# Configure settings for routing. This example configures static routes. In the routes, the output interface is Tunnel 0 and the next hop is 11.1.3.4.

[DeviceC] ip route-static 11.1.1.1 24 11.1.3.4

[DeviceC] ip route-static 172.17.17.0 24 tunnel 0

# Add interfaces to security zones.

[DeviceC] security-zone name Untrust

[DeviceC-security-zone-Untrust] import interface Tunnel 0

[DeviceC-security-zone-Untrust] import interface gigabitethernet 1/0/1

[DeviceC-security-zone-Untrust] quit

[DeviceC] security-zone name Trust

[DeviceC-security-zone-Trust] import interface gigabitethernet 1/0/2

[DeviceC-security-zone-Trust] quit

# Configure a rule named grelocalout in the IPv4 security policy to allow Device C to send packets to Device A.

[DeviceC] security-policy ip

[DeviceC-security-policy-ip] rule name grelocalout

[DeviceC-security-policy-ip-1-grelocalout] source-zone local

[DeviceC-security-policy-ip-1-grelocalout] destination-zone untrust

[DeviceC-security-policy-ip-1-grelocalout] source-ip-host 11.1.3.3

[DeviceC-security-policy-ip-1-grelocalout] source-ip-host 192.168.22.3

[DeviceC-security-policy-ip-1-grelocalout] source-ip-host 192.168.1.3

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 11.1.1.1

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 192.168.22.1

[DeviceC-security-policy-ip-1-grelocalout] destination-ip-host 172.17.17.1

[DeviceC-security-policy-ip-1-grelocalout] action pass

[DeviceC-security-policy-ip-1-grelocalout] quit

# Configure a rule named grelocalin in the IPv4 security policy to allow Device C to receive the packets sent from Device A.

[DeviceC-security-policy-ip] rule 2 name grelocalin

[DeviceC-security-policy-ip-2-grelocalin] source-zone untrust

[DeviceC-security-policy-ip-2-grelocalin] destination-zone local

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 11.1.1.1

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 192.168.22.1

[DeviceC-security-policy-ip-2-grelocalin] source-ip-host 172.17.17.1

[DeviceC-security-policy-ip-2-grelocalin] destination-ip-host 11.1.3.3

[DeviceC-security-policy-ip-2-grelocalin] destination-ip-host 192.168.22.3

[DeviceC-security-policy-ip-2-grelocalin] destination-ip-host 192.168.1.3

[DeviceC-security-policy-ip-2-grelocalin] action pass

[DeviceC-security-policy-ip-2-grelocalin] quit

[DeviceC-security-policy-ip] quit

Verifying the configuration

# Configure Device C as the default gateway of Host B, and then ping Host A from Host B. The ping operation succeeds. (Details not shown.)

# Display GRE P2MP tunnel entries on Device A.

[DeviceA] display gre p2mp tunnel-table interface tunnel 0

Total number:1

Dest Addr             Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

192.168.1.0           255.255.255.0   11.1.1.3                2         20

# Configure the default gateway of Host B as Device B, and then ping Host A from Host B. The ping operation succeeds. (Details not shown).

# Display GRE P2MP tunnel entries on Device A.

[DeviceA] display gre p2mp tunnel-table interface tunnel 0

Total number:2

Dest Addr             Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

192.168.1.0           255.255.255.0   11.1.1.3                2         20

192.168.1.0           255.255.255.0   11.1.1.2                1         20

The output shows that Device A has two GRE P2MP tunnel entries destined for the branch. The device prefers the tunnel entry with a lower GRE key value. The entry destined for Device B is preferred.

# Shut down tunnel interface Tunnel 0 on Device B.

[DeviceB] interface tunnel 0

[DeviceB-Tunnel0] shutdown

[DeviceB-Tunnel0] quit

# Change the default gateway of Host B to Device C. (Details not shown.)

# Ping Host A from Host B after the GRE P2MP tunnel entry destined for Device B ages. The ping operation succeeds. (Details not shown.)

# Display GRE P2MP tunnel entries on Device A.

[DeviceA] display gre p2mp tunnel-table interface tunnel 0

Total number:1

Dest Addr             Mask/Prefix Len Tunnel Dest Addr        Gre Key   Aging

192.168.1.0           255.255.255.0   11.1.1.3                2         10

The output shows that Device A can forward traffic to hosts in the branch only through Device C.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网