10.1 9. Flex VPN
10.1 9. Flex VPN
Flex VPN
KHAWAR BUTT
CCIE # 12353 [R/S, SECURITY, SP, DC, VOICE, STORAGE & CCDE]
Outline
Flex VPN
Configuring Flex VPN – Point – To – Point using S-VTI / D-VTI Interfaces.
Configuring Flex VPN – Spoke – To –c Spoke using NHRP
Flex Overview
Flex VPN allows you the ability to configure different types of VPNs under
one configuration set.
Flex VPN allows you to combine the capability of all these VPNs under one
common configuration set.
Flex VPN – Site – To – Site using S-VTI / D-VTI
Internet
10.1.1.0/24 10.2.2.0/24
c
199.1.1.0/24 Dynamic IP
R1 R2
10.1.2.0/24 10.2.1.0/24
Configure an IPSec LAN – To – LAN VPN to encrypt the traffic between the internal private
networks using Flex VPN. R2 has a Dynamic Public IP assigned.
Flex VPN Site – To Site – Step # 1
Step 1. Configure Phase I Parameters
R1 R2
! 1B. Configure an IKEv2 Policy and call the proposal ! 1B. Configure an IKEv2 Policy and call the proposal
R1
c
Crypto ipsec transform-set TSET esp-3des esp-sha-hmac
R2
R1
c
Crypto ipsec profile IPROF
set transform-set TSET
set ikev2-profile IKEv2-PROF
R2
R1 R2
R1
R2
Los
Angeles
150.5.5.0/24
10.1.1.0/24 c10.2.2.0/24
199.1.1.0/24
Internet 200.1.1.0/24
Dubai London
75.1.1.0/24
Sydney
10.4.4.0/24
Flex VPN Spoke – To – Spoke - Hub
Step 1. Configure Phase I Parameters
R1
R1
c
Crypto ipsec transform-set TSET esp-3des esp-sha-hmac
Flex VPN Spoke – To – Spoke - Hub
Step 3. Configure an IPSec Profile to link the Transform-set and the IKEv2 Profile to it.
R1
c
Crypto ipsec profile IPROF
set transform-set TSET
set ikev2-profile IKEv2-PROF
R2
Crypto ipsec profile IPROF
set transform-set TSET
set ikev2-profile IKEv2-PROF
Flex VPN Spoke – To – Spoke - Hub
Step 4. Create the Virtual Tunnel based on NHRP
R1
Interface Loopback11 c
ip address 192.168.1.1 255.255.255.0
!
Interface virtual-template 1 type tunnel
ip unnumbered Loopback 11
tunnel source E 0/0
ip nhrp network-id 111
ip nhrp redirect
tunnel protection ipsec profile IPROF
!
crypto ikev2 profile IKEv2-PROF
virtual-template 1
Flex VPN Spoke – To – Spoke - Hub
Step 5. Configure a Dynamic Routing Protocol to route the internal LAN Segments
R1
! 6A. Configure a Pool of IP Addresses to be assigned to the Tunnel Interfaces of the spokes
c
ip local pool POOL-A 192.168.1.11 192.168.1.254
! 6B. Configure an IKEv2 Authorization policy. This policy will be used to push configuration to the peers
aaa new-model
aaa authorization network default local
crypto ikev2 authorization policy default
pool POOL-A
route set interface
R2 – R3 – R4
c
Crypto ipsec transform-set TSET esp-3des esp-sha-hmac
Flex VPN Spoke – To – Spoke - Spokes
Step 3. Configure an IPSec Profile to link the Transform-set and the IKEv2 Profile to it.
R2 – R3 – R4
c
Crypto ipsec profile IPROF
set transform-set TSET
set ikev2-profile IKEv2-PROF
Flex VPN Spoke – To – Spoke - Spokes
Step 4. Create the S-VTI and the D-VTI Template on the Spokes
R2 – R3 – R4
Interface tunnel 1 c
ip address negotiated
tunnel source E 0/0
tunnel destination 150.5.5.1
ip nhrp network-id 111
ip nhrp shortcut virtual-template 1
tunnel protection ipsec profile IPROF
Flex VPN Spoke – To – Spoke - Spokes
Step 4. Create the S-VTI and the D-VTI Template on the Spokes
R2 – R3 – R4
R2 – R3 – R4
aaa new-model
aaa authorization network default local
!
crypto ikev2 authorization policy default
route set interface