diff options
-rw-r--r-- | docs/_static/images/blueprint-dmvpn.png | bin | 26830 -> 29626 bytes | |||
-rw-r--r-- | docs/configuration/vpn/dmvpn.rst | 433 |
2 files changed, 260 insertions, 173 deletions
diff --git a/docs/_static/images/blueprint-dmvpn.png b/docs/_static/images/blueprint-dmvpn.png Binary files differindex b07c190d..85f189c1 100644 --- a/docs/_static/images/blueprint-dmvpn.png +++ b/docs/_static/images/blueprint-dmvpn.png diff --git a/docs/configuration/vpn/dmvpn.rst b/docs/configuration/vpn/dmvpn.rst index 21df8cfd..e58eecbc 100644 --- a/docs/configuration/vpn/dmvpn.rst +++ b/docs/configuration/vpn/dmvpn.rst @@ -37,142 +37,175 @@ peers. Configuration ************* -* Please refer to the :ref:`tunnel-interface` documentation for the individual - tunnel related options. +Tunnel interface configuration +============================== -* Please refer to the :ref:`ipsec` documentation for the individual IPSec - related options. +NHRP never handles routing of prefixes itself. You need to run some real routing +protocol (e.g. BGP) to advertise routes over the tunnels. What nhrpd does it +establishes ‘shortcut routes’ that optimizes the routing protocol to avoid going +through extra nodes in NBMA GRE mesh. + +NHRP does route NHRP domain addresses individually using per-host prefixes. +This is similar to Cisco FlexVPN, but in contrast to opennhrp which uses +a generic subnet route. -.. cfgcmd:: set protocols nhrp tunnel <tunnel> cisco-authentication <secret> +To create NBMA GRE tunnel you might use the following: - Enables Cisco style authentication on NHRP packets. This embeds the secret - plaintext password to the outgoing NHRP packets. Incoming NHRP packets on - this interface are discarded unless the secret password is present. Maximum - length of the secret is 8 characters. +.. code-block:: none -.. cfgcmd:: set protocols nhrp tunnel <tunnel> dynamic-map <address> - nbma-domain-name <fqdn> + set interfaces tunnel tun100 address '10.0.0.1/32' + set interfaces tunnel tun100 enable-multicast + set interfaces tunnel tun100 encapsulation 'gre' + set interfaces tunnel tun100 ip adjust-mss '1360' + set interfaces tunnel tun100 mtu '1400' + set interfaces tunnel tun100 parameters ip key '42' + set interfaces tunnel tun100 source-interface 'eth0' - Specifies that the :abbr:`NBMA (Non-broadcast multiple-access network)` - addresses of the next hop servers are defined in the domain name - nbma-domain-name. For each A record opennhrp creates a dynamic NHS entry. +* Please refer to the :ref:`tunnel-interface` documentation for the individual + tunnel related options. - Each dynamic NHS will get a peer entry with the configured network address - and the discovered NBMA address. + .. note:: The IP-address is assigned as host prefix to tunnel interface. + NHRP will automatically create additional host routes pointing to tunnel interface + when a connection with these hosts is established. - The first registration request is sent to the protocol broadcast address, and - the server's real protocol address is dynamically detected from the first - registration reply. +The tunnel interface subnet prefix should be announced by routing protocol +from the hub nodes (e.g. BGP ‘network’ announce). This allows the routing +protocol to decide which is the closest hub and determine the relay hub on +prefix basis when direct tunnel is not established. -.. cfgcmd:: set protocols nhrp tunnel <tunnel> holding-time <timeout> +NHRP protocol configuration +============================== - Specifies the holding time for NHRP Registration Requests and Resolution - Replies sent from this interface or shortcut-target. The holdtime is specified - in seconds and defaults to two hours. +.. cfgcmd:: set protocols nhrp tunnel <tunnel> authentication <secret> -.. cfgcmd:: set protocols nhrp tunnel <tunnel> map cisco + Enables Cisco style authentication on NHRP packets. This embeds the + plaintext password to the outgoing NHRP packets. Maximum length of + the password is 8 characters. - If the statically mapped peer is running Cisco IOS, specify the cisco keyword. - It is used to fix statically the Registration Request ID so that a matching - Purge Request can be sent if NBMA address has changed. This is to work around - broken IOS which requires Purge Request ID to match the original Registration - Request ID. +.. cfgcmd:: set protocols nhrp tunnel <tunnel> holdtime <timeout> -.. cfgcmd:: set protocols nhrp tunnel <tunnel> map nbma-address <address> + Holdtime is the number of seconds that have to pass before stopping to + advertise an NHRP NBMA address as valid. It also controls how often NHRP + registration requests are sent. By default registrations are sent every + one third of the holdtime - Creates static peer mapping of protocol-address to :abbr:`NBMA (Non-broadcast - multiple-access network)` address. +.. cfgcmd:: set protocols nhrp tunnel <tunnel> map tunnel-ip <tunnel-ip> + nbma <nbma-ip> - If the IP prefix mask is present, it directs opennhrp to use this peer as a - next hop server when sending Resolution Requests matching this subnet. + * **tunnel-ip** - Tunnel ip address in format **x.x.x.x**. + * **nbma-ip** - NBMA ip address in format **x.x.x.x** or **local** - This is also known as the HUBs IP address or FQDN. + Map an IP address of a station to the station’s NBMA address. -.. cfgcmd:: set protocols nhrp tunnel <tunnel> map register +.. cfgcmd:: set protocols nhrp tunnel <tunnel> mtu <mtu> - The optional parameter register specifies that Registration Request should be - sent to this peer on startup. + Configure NHRP advertised MTU. - This option is required when running a DMVPN spoke. +.. cfgcmd:: set protocols nhrp tunnel <tunnel> multicast <nbma-ip> -.. cfgcmd:: set protocols nhrp tunnel <tunnel> multicast <dynamic | nhs> + * **nbma-ip** - NBMA ip address in format **x.x.x.x** or **dynamic** - Determines how opennhrp daemon should soft switch the multicast traffic. - Currently, multicast traffic is captured by opennhrp daemon using a packet - socket, and resent back to proper destinations. This means that multicast - packet sending is CPU intensive. + Sends multicast packets to the specified NBMA address. If dynamic is specified + then destination NBMA address (or addresses) are learnt dynamically. - Specfying nhs makes all multicast packets to be repeated to each statically - configured next hop. +.. cfgcmd:: set protocols nhrp tunnel <tunnel> network-id <network-id> - Synamic instructs to forward to all peers which we have a direct connection - with. Alternatively, you can specify the directive multiple times for each - protocol-address the multicast traffic should be sent to. + * **network-id** - NHRP network id <1-4294967295> - .. warning:: It is very easy to misconfigure multicast repeating if you have - multiple NHSes. + Enable NHRP on this interface and set the interface’s network ID. The network ID + is used to allow creating multiple nhrp domains on a router when multiple interfaces + are configured on the router. Interfaces configured with the same ID are part of the + same logical NBMA network. The ID is a local only parameter and is not sent to other + NHRP nodes and so IDs on different nodes do not need to match. When NHRP packets are + received on an interface they are assigned to the local NHRP domain for that interface. -.. cfgcmd:: set protocols nhrp tunnel <tunnel> non-caching +.. cfgcmd:: set protocols nhrp tunnel <tunnel> nhs tunnel-ip <tunnel-ip> nbma <nbma-ip> - Disables caching of peer information from forwarded NHRP Resolution Reply - packets. This can be used to reduce memory consumption on big NBMA subnets. + * **tunnel-ip** - Tunnel ip address in format **x.x.x.x** or **dynamic** + * **nbma-ip** - NBMA ip address in format **x.x.x.x** - .. note:: Currently does not do much as caching is not implemented. + Configure the Next Hop Server address and its NBMA address. If dynamic is specified + then Next Hop Server can have dynamic address which maps to its NBMA address. .. cfgcmd:: set protocols nhrp tunnel <tunnel> redirect - Enable sending of Cisco style NHRP Traffic Indication packets. If this is - enabled and opennhrp detects a forwarded packet, it will send a message to - the original sender of the packet instructing it to create a direct connection - with the destination. This is basically a protocol independent equivalent of - ICMP redirect. + This enable redirect replies on the NHS similar to ICMP redirects except this is + managed by the nhrp protocol. This setting allows spokes to communicate with each + others directly. + +.. cfgcmd:: set protocols nhrp tunnel <tunnel> registration-no-unique + + Allow the client to not set the unique flag in the NHRP packets. This is useful when + a station has a dynamic IP address that could change over time. .. cfgcmd:: set protocols nhrp tunnel <tunnel> shortcut - Enable creation of shortcut routes. + Enable shortcut (spoke-to-spoke) tunnels to allow NHC to talk to each others directly + after establishing a connection without going through the hub. + +IPSEC configuration +============================== + +* Please refer to the :ref:`ipsec` documentation for the individual IPSec + related options. + +.. note:: NHRP daemon based on FRR nhrpd. It controls IPSEC. That's why 'close-action' + parameter in IKE configuration always is set to 'close' and 'dead-peer-detection action' + always is set to 'clear'. + +.. cfgcmd:: set vpn ipsec profile <profile-name> authentication mode pre-shared-secret + + Set preshared secret mode authentication + +.. cfgcmd:: set vpn ipsec profile <profile-name> authentication pre-shared-secret <secret> + + Set preshared secret + +.. cfgcmd:: set vpn ipsec profile <profile-name> bind tunnel <tunnel name> + + Bind IPSEC profile to the specific tunnel interface. + +.. cfgcmd:: set vpn ipsec profile <profile-name> esp-group 'ESP-HUB' - A received NHRP Traffic Indication will trigger the resolution and - establishment of a shortcut route. + Map ESP group to IPSEC profile -.. cfgcmd:: set protocols nhrp tunnel <tunnel> shortcut-destination +.. cfgcmd:: set vpn ipsec profile <profile-name> ike-group 'IKE-HUB' - This instructs opennhrp to reply with authorative answers on NHRP Resolution - Requests destinied to addresses in this interface (instead of forwarding the - packets). This effectively allows the creation of shortcut routes to subnets - located on the interface. + Map IKE group to IPSEC profile - When specified, this should be the only keyword for the interface. +********** +Monitoring +********** +.. opcmd:: show ip nhrp cache -.. cfgcmd:: set protocols nhrp tunnel <tunnel> shortcut-target <address> + Forwarding cache information. - Defines an off-NBMA network prefix for which the GRE interface will act as a - gateway. This an alternative to defining local interfaces with - shortcut-destination flag. +.. opcmd:: show ip nhrp nhs -.. cfgcmd:: set protocols nhrp tunnel <tunnel> shortcut-target <address> - holding-time <timeout> + Next hop server information. - Specifies the holding time for NHRP Registration Requests and Resolution - Replies sent from this interface or shortcut-target. The holdtime is specified - in seconds and defaults to two hours. +.. opcmd:: show ip nhrp shortcut + + Shortcut information. ******* Example ******* - -This blueprint uses VyOS as the DMVPN Hub and Cisco (7206VXR) and VyOS as -multiple spoke sites. The lab was built using :abbr:`EVE-NG (Emulated Virtual -Environment NG)`. +This blueprint uses VyOS as the DMVPN Hub and Cisco IOSv 15.5(3)M and VyOS as +multiple spoke sites. .. figure:: /_static/images/blueprint-dmvpn.png - :alt: DMVPN network + :width: 70% + :align: center + :alt: DMVPN Network Topology Diagram + - DMVPN example network + DMVPN Network Topology Diagram -Each node (Hub and Spoke) uses an IP address from the network 172.16.253.128/29. +Each node (Hub and Spoke) uses an IP address from the network 10.0.0.0/24. -The below referenced IP address `192.0.2.1` is used as example address +The below referenced IP address `192.168.0.2` is used as example address representing a global unicast address under which the HUB can be contacted by each and every individual spoke. @@ -183,47 +216,46 @@ Configuration Hub --- +VyOS-HUB-1 +^^^^^^^^^^ .. code-block:: none - set interfaces ethernet eth0 address 192.0.2.1/24 + set interfaces ethernet eth0 address '192.168.0.2/30' - set interfaces tunnel tun100 address '172.16.253.134/29' - set interfaces tunnel tun100 encapsulation 'gre' - set interfaces tunnel tun100 source-address '192.0.2.1' + set interfaces tunnel tun100 address '10.0.0.100/32' set interfaces tunnel tun100 enable-multicast - set interfaces tunnel tun100 parameters ip key '1' + set interfaces tunnel tun100 encapsulation 'gre' + set interfaces tunnel tun100 parameters ip key '42' + set interfaces tunnel tun100 source-interface 'eth0' - set protocols nhrp tunnel tun100 cisco-authentication 'secret' - set protocols nhrp tunnel tun100 holding-time '300' + set protocols nhrp tunnel tun100 authentication 'test123' + set protocols nhrp tunnel tun100 holdtime '300' set protocols nhrp tunnel tun100 multicast 'dynamic' + set protocols nhrp tunnel tun100 network-id '1' set protocols nhrp tunnel tun100 redirect - set protocols nhrp tunnel tun100 shortcut + set protocols nhrp tunnel tun100 registration-no-unique + + set protocols static route 0.0.0.0/0 next-hop 192.168.0.1 set vpn ipsec esp-group ESP-HUB lifetime '1800' set vpn ipsec esp-group ESP-HUB mode 'transport' set vpn ipsec esp-group ESP-HUB pfs 'dh-group2' set vpn ipsec esp-group ESP-HUB proposal 1 encryption 'aes256' set vpn ipsec esp-group ESP-HUB proposal 1 hash 'sha1' - set vpn ipsec esp-group ESP-HUB proposal 2 encryption '3des' - set vpn ipsec esp-group ESP-HUB proposal 2 hash 'md5' set vpn ipsec ike-group IKE-HUB key-exchange 'ikev1' set vpn ipsec ike-group IKE-HUB lifetime '3600' set vpn ipsec ike-group IKE-HUB proposal 1 dh-group '2' set vpn ipsec ike-group IKE-HUB proposal 1 encryption 'aes256' set vpn ipsec ike-group IKE-HUB proposal 1 hash 'sha1' - set vpn ipsec ike-group IKE-HUB proposal 2 dh-group '2' - set vpn ipsec ike-group IKE-HUB proposal 2 encryption 'aes128' - set vpn ipsec ike-group IKE-HUB proposal 2 hash 'sha1' - set vpn ipsec interface 'eth0' - set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret' set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret' set vpn ipsec profile NHRPVPN bind tunnel 'tun100' set vpn ipsec profile NHRPVPN esp-group 'ESP-HUB' set vpn ipsec profile NHRPVPN ike-group 'IKE-HUB' + .. note:: Setting this up on AWS will require a "Custom Protocol Rule" for protocol number "47" (GRE) Allow Rule in TWO places. Firstly on the VPC Network ACL, and secondly on the security group network ACL attached to the @@ -231,105 +263,160 @@ Hub the AWS Marketplace. (Locate the correct VPC and security group by navigating through the details pane below your EC2 instance in the AWS console). -Spoke ------ +Spokes +------ -The individual spoke configurations only differ in the local IP address on the -``tun10`` interface. See the above diagram for the individual IP addresses. + The individual spoke configurations only differ in interface IP addresses. -spoke01-spoke04 -^^^^^^^^^^^^^^^ +VyOS-Spoke-1 and VyOS-Spoke-2 +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +.. code-block:: none + + set interfaces ethernet eth0 address '192.168.1.2/30' + + set interfaces tunnel tun100 address '10.0.0.1/32' + set interfaces tunnel tun100 enable-multicast + set interfaces tunnel tun100 encapsulation 'gre' + set interfaces tunnel tun100 parameters ip key '42' + set interfaces tunnel tun100 source-interface 'eth0' + + set protocols nhrp tunnel tun100 authentication 'test123' + set protocols nhrp tunnel tun100 holdtime '300' + set protocols nhrp tunnel tun100 multicast 'dynamic' + set protocols nhrp tunnel tun100 network-id '1' + set protocols nhrp tunnel tun100 nhs tunnel-ip dynamic nbma '192.168.0.2' + set protocols nhrp tunnel tun100 registration-no-unique + set protocols nhrp tunnel tun100 shortcut + + set protocols static route 0.0.0.0/0 next-hop 192.168.1.1 + set protocols static route 10.0.0.0/24 next-hop 10.0.0.100 + + set vpn ipsec esp-group ESP-HUB lifetime '1800' + set vpn ipsec esp-group ESP-HUB mode 'transport' + set vpn ipsec esp-group ESP-HUB pfs 'dh-group2' + set vpn ipsec esp-group ESP-HUB proposal 1 encryption 'aes256' + set vpn ipsec esp-group ESP-HUB proposal 1 hash 'sha1' + set vpn ipsec ike-group IKE-HUB key-exchange 'ikev1' + set vpn ipsec ike-group IKE-HUB lifetime '3600' + set vpn ipsec ike-group IKE-HUB proposal 1 dh-group '2' + set vpn ipsec ike-group IKE-HUB proposal 1 encryption 'aes256' + set vpn ipsec ike-group IKE-HUB proposal 1 hash 'sha1' + set vpn ipsec interface 'eth0' + set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret' + set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret' + set vpn ipsec profile NHRPVPN bind tunnel 'tun100' + set vpn ipsec profile NHRPVPN esp-group 'ESP-HUB' + set vpn ipsec profile NHRPVPN ike-group 'IKE-HUB' + +Cisco-Spoke-3 +^^^^^^^^^^^^^ .. code-block:: none - crypto keyring DMVPN - pre-shared-key address 192.0.2.1 key secret - ! crypto isakmp policy 10 encr aes 256 authentication pre-share group 2 - crypto isakmp invalid-spi-recovery - crypto isakmp keepalive 30 30 periodic - crypto isakmp profile DMVPN - keyring DMVPN - match identity address 192.0.2.1 255.255.255.255 + lifetime 3600 + crypto isakmp key secret address 0.0.0.0 + ! ! - crypto ipsec transform-set DMVPN-AES256 esp-aes 256 esp-sha-hmac + crypto ipsec transform-set DMVPNESP esp-aes 256 esp-sha-hmac mode transport ! - crypto ipsec profile DMVPN - set security-association idle-time 720 - set transform-set DMVPN-AES256 - set isakmp-profile DMVPN + crypto ipsec profile DMVPNPROFILE + set security-association lifetime seconds 1800 + set transform-set DMVPNESP + set pfs group2 + ! ! - interface Tunnel10 - ! individual spoke tunnel IP must change - ip address 172.16.253.129 255.255.255.248 + ! + ! + ! + ! + ! + interface Tunnel100 + ip address 10.0.0.3 255.255.255.0 no ip redirects - ip nhrp authentication secret - ip nhrp map 172.16.253.134 192.0.2.1 - ip nhrp map multicast 192.0.2.1 + ip nhrp authentication test123 + ip nhrp map multicast dynamic ip nhrp network-id 1 - ip nhrp holdtime 600 - ip nhrp nhs 172.16.253.134 - ip nhrp registration timeout 75 - tunnel source FastEthernet0/0 + ip nhrp holdtime 300 + ip nhrp nhs 10.0.0.100 nbma 192.168.0.2 + ip nhrp registration no-unique + ip nhrp redirect + tunnel source GigabitEthernet0/0 tunnel mode gre multipoint - tunnel protection ipsec profile DMVPN - tunnel key 1 + tunnel key 42 + tunnel protection ipsec profile DMVPNPROFILE + ! + interface GigabitEthernet0/0 + ip address 192.168.3.2 255.255.255.252 + duplex auto + speed auto + media-type rj45 ! - interface FastEthernet0/0 - ip address dhcp - duplex half + ip route 0.0.0.0 0.0.0.0 192.168.3.1 -spoke05 -^^^^^^^ +Monitoring DMVPN Network +^^^^^^^^^^^^^^^^^^^^^^^^ -VyOS can also run in DMVPN spoke mode. +Let send ICMP packets from VyOS-SPOKE-1 to Cisco-SPOKE-3 .. code-block:: none - set interfaces ethernet eth0 address 'dhcp' + vyos@vyos:~$ ping 10.0.0.3 + PING 10.0.0.3 (10.0.0.3) 56(84) bytes of data. + 64 bytes from 10.0.0.3: icmp_seq=1 ttl=255 time=3.44 ms + 64 bytes from 10.0.0.3: icmp_seq=2 ttl=255 time=3.07 ms + ^C + --- 10.0.0.3 ping statistics --- + 2 packets transmitted, 2 received, 0% packet loss, time 1002ms + rtt min/avg/max/mdev = 3.072/3.257/3.442/0.185 ms - set interfaces tunnel tun100 address '172.16.253.133/29' - set interfaces tunnel tun100 source-address 0.0.0.0 - set interfaces tunnel tun100 encapsulation 'gre' - set interfaces tunnel tun100 enable-multicast - set interfaces tunnel tun100 parameters ip key '1' +Monitoring on HUB +^^^^^^^^^^^^^^^^^ - set protocols nhrp tunnel tun100 cisco-authentication 'secret' - set protocols nhrp tunnel tun100 holding-time '300' - set protocols nhrp tunnel tun100 map 172.16.253.134/29 nbma-address '192.0.2.1' - set protocols nhrp tunnel tun100 map 172.16.253.134/29 register - set protocols nhrp tunnel tun100 multicast 'nhs' - set protocols nhrp tunnel tun100 redirect - set protocols nhrp tunnel tun100 shortcut +.. code-block:: none - set vpn ipsec esp-group ESP-HUB lifetime '1800' - set vpn ipsec esp-group ESP-HUB mode 'transport' - set vpn ipsec esp-group ESP-HUB pfs 'dh-group2' - set vpn ipsec esp-group ESP-HUB proposal 1 encryption 'aes256' - set vpn ipsec esp-group ESP-HUB proposal 1 hash 'sha1' - set vpn ipsec esp-group ESP-HUB proposal 2 encryption '3des' - set vpn ipsec esp-group ESP-HUB proposal 2 hash 'md5' - set vpn ipsec ike-group IKE-HUB close-action 'none' - set vpn ipsec ike-group IKE-HUB key-exchange 'ikev1' - set vpn ipsec ike-group IKE-HUB lifetime '3600' - set vpn ipsec ike-group IKE-HUB proposal 1 dh-group '2' - set vpn ipsec ike-group IKE-HUB proposal 1 encryption 'aes256' - set vpn ipsec ike-group IKE-HUB proposal 1 hash 'sha1' - set vpn ipsec ike-group IKE-HUB proposal 2 dh-group '2' - set vpn ipsec ike-group IKE-HUB proposal 2 encryption 'aes128' - set vpn ipsec ike-group IKE-HUB proposal 2 hash 'sha1' + vyos@vyos:~$ show ip nhrp cache + Iface Type Protocol NBMA Claimed NBMA Flags Identity + tun100 dynamic 10.0.0.1 192.168.1.2 192.168.1.2 T 192.168.1.2 + tun100 dynamic 10.0.0.3 192.168.3.2 192.168.3.2 T 192.168.3.2 + tun100 dynamic 10.0.0.2 192.168.2.2 192.168.2.2 T 192.168.2.2 + tun100 local 10.0.0.100 192.168.0.2 192.168.0.2 - - set vpn ipsec interface 'eth0' + vyos@vyos:~$ show vpn ipsec sa + Connection State Uptime Bytes In/Out Packets In/Out Remote address Remote ID Proposal + -------------------------- ------- -------- -------------- ---------------- ---------------- ----------- ---------------------------------- + dmvpn-NHRPVPN-tun100-child up 3m46s 230B/270B 2/2 192.168.1.2 192.168.1.2 AES_CBC_256/HMAC_SHA1_96/MODP_1024 + dmvpn-NHRPVPN-tun100-child up 5m48s 460B/540B 4/4 192.168.2.2 192.168.2.2 AES_CBC_256/HMAC_SHA1_96/MODP_1024 + dmvpn-NHRPVPN-tun100-child up 16m26s 1K/1K 13/12 192.168.3.2 192.168.3.2 AES_CBC_256/HMAC_SHA1_96/MODP_1024 - set vpn ipsec profile NHRPVPN authentication mode 'pre-shared-secret' - set vpn ipsec profile NHRPVPN authentication pre-shared-secret 'secret' - set vpn ipsec profile NHRPVPN bind tunnel 'tun100' - set vpn ipsec profile NHRPVPN esp-group 'ESP-HUB' - set vpn ipsec profile NHRPVPN ike-group 'IKE-HUB' +Monitoring on Spokes +^^^^^^^^^^^^^^^^^^^^ + +.. code-block:: none + vyos@vyos:~$ show ip nhrp cache + Iface Type Protocol NBMA Claimed NBMA Flags Identity + tun100 local 10.0.0.1 192.168.1.2 192.168.1.2 - + tun100 dynamic 10.0.0.3 192.168.3.2 192.168.3.2 T 192.168.3.2 + tun100 nhs 10.0.0.100 192.168.0.2 192.168.0.2 T 192.168.0.2 + + vyos@vyos:~$ show ip nhrp nhs + Iface FQDN NBMA Protocol + tun100 192.168.0.2 192.168.0.2 10.0.0.100 + + vyos@vyos:~$ show ip nhrp shortcut + Type Prefix Via Identity + dynamic 10.0.0.3/32 10.0.0.3 192.168.3.2 + + vyos@vyos:~$ show vpn ipsec sa + Connection State Uptime Bytes In/Out Packets In/Out Remote address Remote ID Proposal + -------------------------- ------- -------- -------------- ---------------- ---------------- ----------- ---------------------------------- + dmvpn-NHRPVPN-tun100-child up 6m43s 898B/695B 7/6 192.168.0.2 192.168.0.2 AES_CBC_256/HMAC_SHA1_96/MODP_1024 + dmvpn-NHRPVPN-tun100-child up 49s 215B/187B 2/2 192.168.3.2 192.168.3.2 AES_CBC_256/HMAC_SHA1_96/MODP_1024 |