In an enterprise, the HQ hub connects to branch spokes over the public network, and Spoke 1 and Spoke 2 also connect over the public network. Branch spokes connect to the public network through dynamic addresses. Data transmitted between the HQ and branches and between branches needs to be protected through encryption. The HQ hub and branch spokes are located in different areas, and the subnet environments of the HQ and branches change frequently. The enterprise wants to use a VPN for communication between branches and encrypt data exchanged between the HQ and branches and between branches. To meet this requirement, deploy dynamic routing (OSPF) based on the enterprise network planning and configure DSVPN over IPsec to realize direct communication between Spoke 1 and Spoke 2 and data encryption. Figure 1 shows the related networking.
Because branches access the public network through dynamic IP addresses, branches are unaware of each other's public IP address. Therefore, configure DSVPN to interconnect branches.
Because a large number of branches exist, configure DSVPN in shortcut mode.
Because the subnet environments of the HQ and branches frequently change, deploy OSPF based on enterprise network planning for communication between the HQ and branches to simplify maintenance.
Because data transmitted between organizations needs to be encrypted, configure DSVPN over IPsec.
Configure interface IP addresses on each device.
# Configure interface IP addresses on Hub.
<HUAWEI> system-view [~HUAWEI] sysname Hub [*Hub] commit [~Hub] interface GigabitEthernet 0/1/0 [*Hub-GigabitEthernet0/1/0] ip address 10.1.1.10 255.255.255.0 [*Hub-GigabitEthernet0/1/0] quit [*Hub] interface tunnel 0 [*Hub-Tunnel0] ip address 172.16.1.1 255.255.255.0 [*Hub-Tunnel0] quit [*Hub] interface loopback 0 [*Hub-LoopBack0] ip address 192.168.0.1 255.255.255.255 [*Hub-LoopBack0] quit [*Hub] commit
Assign an IP address to each interface of Spoke 1 and Spoke 2 according to Figure 1. The configurations of the spokes are similar to the configuration of the hub.
Configure OSPF on each device to ensure that the public network routes are available.
# Configure OSPF on Hub.
[~Hub] ospf 2 router-id 10.1.1.10 [*Hub-ospf-2] area 0.0.0.1 [*Hub-ospf-2-areHub-0.0.0.1] network 10.1.1.0 0.0.0.255 [*Hub-ospf-2-areHub-0.0.0.1] quit [*Hub-ospf-2] quit [*Hub] commit
# Configure OSPF on Spoke 1.
[~Spoke1] ospf 2 router-id 10.1.2.10 [*Spoke1-ospf-2] area 0.0.0.1 [*Spoke1-ospf-2-areHub-0.0.0.1] network 10.1.2.0 0.0.0.255 [*Spoke1-ospf-2-areHub-0.0.0.1] quit [*Spoke1-ospf-2] quit [*Spoke1] commit
# Configure OSPF on Spoke 2.
[~Spoke2] ospf 2 router-id 10.1.3.10 [*Spoke2-ospf-2] area 0.0.0.1 [*Spoke2-ospf-2-areHub-0.0.0.1] network 10.1.3.0 0.0.0.255 [*Spoke2-ospf-2-areHub-0.0.0.1] quit [*Spoke2-ospf-2] quit [*Spoke2] commit
# Configure Hub.
[~Hub] ospf 1 router-id 172.16.1.1 [*Hub-ospf-1] area 0.0.0.0 [*Hub-ospf-1-areHub-0.0.0.0] network 172.16.1.0 0.0.0.255 [*Hub-ospf-1-areHub-0.0.0.0] network 192.168.0.0 0.0.0.255 [*Hub-ospf-1-areHub-0.0.0.0] quit [*Hub-ospf-1] quit [*Hub] commit
# Configure Spoke 1.
[~Spoke1] ospf 1 router-id 172.16.1.2 [*Spoke1-ospf-1] area 0.0.0.0 [*Spoke1-ospf-1-areHub-0.0.0.0] network 172.16.1.0 0.0.0.255 [*Spoke1-ospf-1-areHub-0.0.0.0] network 192.168.1.0 0.0.0.255 [*Spoke1-ospf-1-areHub-0.0.0.0] quit [*Spoke1-ospf-1] quit [*Spoke1] commit
# Configure Spoke 2.
[~Spoke2] ospf 1 router-id 172.16.1.3 [*Spoke2-ospf-1] area 0.0.0.0 [*Spoke2-ospf-1-areHub-0.0.0.0] network 172.16.1.0 0.0.0.255 [*Spoke2-ospf-1-areHub-0.0.0.0] network 192.168.2.0 0.0.0.255 [*Spoke2-ospf-1-areHub-0.0.0.0] quit [*Spoke2-ospf-1] quit [*Spoke2] commit
# Configure Hub.
[~Hub] nhrp enable
The configurations of the spokes are similar to the configuration of the hub. For configuration details, see Configuration Files.
Configure an IKE proposal on Hub and spokes and select the same authentication mode.
# Configure Hub.
[~Hub] ike proposal 1 [*Hub-ike-proposal-1] encryption-algorithm aes-cbc 256 [*Hub-ike-proposal-1] dh group14 [*Hub-ike-proposal-1] authentication-algorithm sha2-256 [*Hub-ike-proposal-1] quit [*Hub] commit
The configurations of Spoke 1 and Spoke 2 are similar to the configuration of Hub. For configuration details, see Configuration Files in this section.
Configure the IKE peer required for IKE negotiation on the hub and spokes.
# Configure Hub.
[~Hub] ike peer hub [*Hub-ike-peer-hub] ike-proposal 1 [*Hub-ike-peer-hub] pre-shared-key Huawei@1234 [*Hub-ike-peer-hub] quit [*Hub] commit
The configurations of Spoke 1 and Spoke 2 are similar to the configuration of Hub. For configuration details, see Configuration Files in this section.
Create an IPsec proposal on the hub and spokes.
# Configure Hub.
[~Hub] ipsec proposal pro1 [*Hub-ipsec-proposal-pro1] transform ah-esp [*Hub-ipsec-proposal-pro1] ah authentication-algorithm sha2-256 [*Hub-ipsec-proposal-pro1] esp authentication-algorithm sha2-256 [*Hub-ipsec-proposal-pro1] esp encryption-algorithm aes 192 [*Hub-ipsec-proposal-pro1] quit [*Hub] commit
The configurations of Spoke 1 and Spoke 2 are similar to the configuration of Hub. For configuration details, see Configuration Files in this section.
Configure an IPsec profile on the hub and spokes.
# Configure Hub.
[~Hub] ipsec policy 1 profile [*Hub-ipsec-policy-profile-1] ike-peer hub [*Hub-ipsec-policy-profile-1] proposal pro1 [*Hub-ipsec-policy-profile-1] quit [*Hub] commit
The configurations of Spoke 1 and Spoke 2 are similar to the configuration of Hub. For configuration details, see Configuration Files in this section.
Configure an IPsec service instance group on the Hub and Spokes.
# Configure Hub.
[~Hub] service-location 1
[*Hub-service-location-1] location slot 1
[*Hub-service-location-1] commit
[~Hub-service-location-1] quit
[~Hub] service-instance-group group1
[*Hub-service-instance-group-group1] service-location 1
[*Hub-service-instance-group-group1] commit
[~Hub-service-instance-group-group1] quit
The configurations of Spoke 1 and Spoke 2 are similar to the configuration of Hub. For configuration details, see Configuration Files in this section.
[~Hub] interface tunnel 0 [*Hub-Tunnel0] tunnel-protocol gre p2mp [*Hub-Tunnel0] nhrp enable [*Hub-Tunnel0] source 10.1.1.10 [*Hub-Tunnel0] nhrp entry multicast dynamic [*Hub-Tunnel0] ospf network-type p2mp [*Hub-Tunnel0] nhrp redirect [*Hub-Tunnel0] ipsec policy 1 service-instance-group group1 [*Hub-Tunnel0] quit [*Hub] commit
[~Spoke1] interface tunnel 0 [*Spoke1-Tunnel0] tunnel-protocol gre p2mp [*Spoke1-Tunnel0] nhrp enable [*Spoke1-Tunnel0] source 10.1.2.10 [*Spoke1-Tunnel0] nhrp entry 172.16.1.1 10.1.1.10 register [*Spoke1-Tunnel0] ospf network-type p2mp [*Spoke1-Tunnel0] nhrp shortcut [*Spoke1-Tunnel0] ipsec policy 1 service-instance-group group1 [*Spoke1-Tunnel0] quit [*Spoke1] commit
[~Spoke2] interface tunnel 0 [*Spoke2-Tunnel0] tunnel-protocol gre p2mp [*Spoke2-Tunnel0] nhrp enable [*Spoke2-Tunnel0] source 10.1.3.10 [*Spoke2-Tunnel0] nhrp entry 172.16.1.1 10.1.1.10 register [*Spoke2-Tunnel0] ospf network-type p2mp [*Spoke2-Tunnel0] nhrp shortcut [*Spoke2-Tunnel0] ipsec policy 1 service-instance-group group1 [*Spoke2-Tunnel0] quit [*Spoke2] commit
After completing the configuration, verify the NHRP peer entry on spokes.
[~Spoke1] display nhrp peer all
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
172.16.1.1 32 10.1.1.10 172.16.1.1 hub up
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:10:58
Expire time : --
Number of nhrp peers: 1
[~Spoke2] display nhrp peer all
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
172.16.1.1 32 10.1.1.10 172.16.1.1 hub up
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:07:55
Expire time : --
Number of nhrp peers: 1
The display nhrp peer all command output shows that the static NHRP peer entry mapped only to Hub is displayed on Spoke 1 and Spoke 2.
On Hub, verify registration information about Spoke 1 and Spoke 2.
[~Hub] display nhrp peer all
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
172.16.1.2 32 10.1.2.10 172.16.1.2 registered up|unique
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:02:02
Expire time : 01:57:58
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
172.16.1.3 32 10.1.3.10 172.16.1.3 registered up|unique
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:01:53
Expire time : 01:59:35
Number of nhrp peers: 2
On Spoke 1, ping the subnet address 192.168.2.1 of Spoke 2. Then, verify the dynamic NHRP peer entries of Spoke 1 and Spoke 2.
# Run the ping -a 192.168.1.1 192.168.2.1 command on Spoke 1. The ping is successful.
[~Spoke1] ping -a 192.168.1.1 192.168.2.1
PING 192.168.2.1: 56 data bytes, press CTRL_C to break
Reply from 192.168.2.1: bytes=56 Sequence=1 ttl=254 time=3 ms
Reply from 192.168.2.1: bytes=56 Sequence=2 ttl=255 time=2 ms
Reply from 192.168.2.1: bytes=56 Sequence=3 ttl=255 time=2 ms
Reply from 192.168.2.1: bytes=56 Sequence=4 ttl=255 time=2 ms
Reply from 192.168.2.1: bytes=56 Sequence=5 ttl=255 time=2 ms
--- 192.168.2.1 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 2/2/3 ms
# Run the display nhrp peer all command on each spoke. The command output on Spoke 1 is used as an example. If the following information is displayed, the NHRP peer entry information is correct.
[~Spoke1] display nhrp peer all
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
172.16.1.1 32 10.1.1.10 172.16.1.1 hub up
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:46:35
Expire time : --
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
192.168.2.1 32 10.1.3.10 172.16.1.3 remote-network up
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:00:28
Expire time : 01:59:32
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
172.16.1.3 32 10.1.3.10 172.16.1.3 remote up
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:00:28
Expire time : 01:59:32
-------------------------------------------------------------------------------
Protocol-addr Mask NBMA-addr NextHop-addr Type Flag
-------------------------------------------------------------------------------
172.16.1.2 32 10.1.2.10 172.16.1.2 local up
-------------------------------------------------------------------------------
Tunnel interface: Tunnel0 (VPN instance: _public_)
Created time : 00:00:28
Expire time : 01:59:32
Number of nhrp peers: 4
Hub configuration file
# sysname Hub # ike dpd 100 # ike proposal 1 encryption-algorithm aes-cbc 256 dh group14 authentication-algorithm sha2-256 authentication-method pre-share integrity-algorithm hmac-sha2-256 # ike peer hub pre-shared-key cipher %^%#6n%Y;[:>0T\w~V2nMW//EnxY@k;[q0/x~`.gjZ>#%^%# ike-proposal 1 # service-location 1 location slot 1 # service-instance-group group1 service-location 1 # ipsec proposal pro1 transform ah-esp ah authentication-algorithm sha2-256 esp authentication-algorithm sha2-256 esp encryption-algorithm aes 192 # ipsec policy 1 profile ike-peer hub proposal pro1 # nhrp enable # interface GigabitEthernet0/1/0 ip address 10.1.1.10 255.255.255.0 # interface LoopBack0 ip address 192.168.0.1 255.255.255.255 # interface Tunnel0 ip address 172.16.1.1 255.255.255.0 tunnel-protocol gre p2mp source 10.1.1.10 ospf network-type p2mp nhrp enable nhrp redirect nhrp entry multicast dynamic ipsec policy 1 service-instance-group group1 # ospf 1 router-id 172.16.1.1 area 0.0.0.0 network 172.16.1.0 0.0.0.255 network 192.168.0.0 0.0.0.255 # ospf 2 router-id 10.1.1.10 area 0.0.0.1 network 10.1.1.0 0.0.0.255 # return
Spoke 1 configuration file
# sysname Spoke1 # nhrp enable # ike dpd 100 # ike proposal 1 encryption-algorithm aes-cbc 256 dh group14 authentication-algorithm sha2-256 authentication-method pre-share integrity-algorithm hmac-sha2-256 # ike peer spoke1 pre-shared-key cipher %^%#6n%Y;[:>0T\w~V2nMW//EnxY@k;[q0/x~`.gjZ>#%^%# ike-proposal 1 # service-location 1 location slot 1 # service-instance-group group1 service-location 1 # ipsec proposal pro1 transform ah-esp ah authentication-algorithm sha2-256 esp authentication-algorithm sha2-256 esp encryption-algorithm aes 192 # ipsec policy 1 profile ike-peer spoke1 proposal pro1 # interface GigabitEthernet0/1/0 ip address 10.1.2.10 255.255.255.0 # interface LoopBack0 ip address 192.168.1.1 255.255.255.255 # interface Tunnel0 ip address 172.16.1.2 255.255.255.0 tunnel-protocol gre p2mp source 10.1.2.10 ospf network-type p2mp nhrp enable nhrp shortcut nhrp entry 172.16.1.1 10.1.1.10 register ipsec policy 1 service-instance-group group1 # ospf 1 router-id 172.16.1.2 area 0.0.0.0 network 172.16.1.0 0.0.0.255 network 192.168.1.0 0.0.0.255 # ospf 2 router-id 10.1.2.10 area 0.0.0.1 network 10.1.2.0 0.0.0.255 # return
Spoke 2 configuration file
# sysname Spoke2 # nhrp enable # ike dpd 100 # ike proposal 1 encryption-algorithm aes-cbc 256 dh group14 authentication-algorithm sha2-256 authentication-method pre-share integrity-algorithm hmac-sha2-256 # ike peer spoke2 pre-shared-key Huawei@1234 ike-proposal 1 # service-location 1 location slot 1 # service-instance-group group1 service-location 1 # ipsec proposal pro1 transform ah-esp ah authentication-algorithm sha2-256 esp authentication-algorithm sha2-256 esp encryption-algorithm aes 192 # ipsec policy 1 profile ike-peer spoke2 proposal pro1 # interface GigabitEthernet0/1/0 ip address 10.1.3.10 255.255.255.0 # interface LoopBack0 ip address 192.168.2.1 255.255.255.255 # interface Tunnel0 ip address 172.16.1.3 255.255.255.0 tunnel-protocol gre p2mp source 10.1.3.10 ospf network-type p2mp nhrp enable nhrp shortcut nhrp entry 172.16.1.1 10.1.1.10 register ipsec policy 1 service-instance-group group1 # ospf 1 router-id 172.16.1.3 area 0.0.0.0 network 172.16.1.0 0.0.0.255 network 192.168.2.0 0.0.0.255 # ospf 2 router-id 10.1.3.10 area 0.0.0.1 network 10.1.3.0 0.0.0.255 # return