l2tpv3 configuration reference
Reference Comparing , Designing and Deploying VPNs chap - 02 :
L2TPv3 is the enhanced version of L2TPv2 protocol. Mikrotik uses L2TPv2 i suppose but it offer another similar tunneling mechanism as EOIP.
L2TPv3 in cisco provides Pseudo-wire services to the customer. L2TPv3 only require the IP connectivity between peers but it can transport Ethernet, 802.1Q , HDLC, PPP framerelay etc.
Advantage over MPLS is the customer having the full control of their routing domain.
L2TP depolyment methods having 3 topologies
LAC - LNS , LNS - LNS , LAC - LAC
Following Diagram explain simple LAC - LAC L2TPv3 setup.
It uses two types of messages:
control connection messages - used for signaling between LCEs
session data messages - Used to transport layer 2 protocols and connections
Data channel Message Header having Session ID & cookie to correctly associate with the tunnel
Deploying dynamic Pseudowires session
1) configure CEF - Its default in IOSs now.
2) configure a loopback interface to use as the pseduowire endpoint ( need to have the connectivity)
3) configure an L2TP class ( optional)
L2TPv3 Class enables to configure number of control channel configurations.
authentication , keepalive intervals , receive window size, retransmission parameters, timeouts
4) configure a pseudowire class
5) bind attachment circuits to pseudowires
R1:
R2:
Between Two Circuits
CDP from remote devices :
Have to try the interoperability between cisco & mikrotik
L2TPv3 is the enhanced version of L2TPv2 protocol. Mikrotik uses L2TPv2 i suppose but it offer another similar tunneling mechanism as EOIP.
L2TPv3 in cisco provides Pseudo-wire services to the customer. L2TPv3 only require the IP connectivity between peers but it can transport Ethernet, 802.1Q , HDLC, PPP framerelay etc.
Advantage over MPLS is the customer having the full control of their routing domain.
L2TP depolyment methods having 3 topologies
LAC - LNS , LNS - LNS , LAC - LAC
Following Diagram explain simple LAC - LAC L2TPv3 setup.
It uses two types of messages:
control connection messages - used for signaling between LCEs
session data messages - Used to transport layer 2 protocols and connections
Data channel Message Header having Session ID & cookie to correctly associate with the tunnel
Deploying dynamic Pseudowires session
1) configure CEF - Its default in IOSs now.
2) configure a loopback interface to use as the pseduowire endpoint ( need to have the connectivity)
3) configure an L2TP class ( optional)
L2TPv3 Class enables to configure number of control channel configurations.
authentication , keepalive intervals , receive window size, retransmission parameters, timeouts
4) configure a pseudowire class
5) bind attachment circuits to pseudowires
R1:
l2tp-class digest_r1 digest secret 7 096F673A3A2A hash SHA1
pseudowire-class R1toR2 encapsulation l2tpv3 sequencing both protocol l2tpv3 digest_r1 ip local interface Loopback0xconnect peer-address VCID ( should be unique) pw-class [name]
interface FastEthernet1/0 no ip address duplex auto speed auto xconnect 172.16.0.2 100 pw-class R1toR2 sequencing both
R2:
l2tp-class digest_r2 digest secret 7 062526126F61 hash SHA1
pseudowire-class R2toR1 encapsulation l2tpv3 sequencing both protocol l2tpv3 digest_r2 ip local interface Loopback0
interface FastEthernet1/1 no ip address duplex auto speed auto xconnect 172.16.0.1 100 pw-class R2toR1 sequencing both
Between Two Circuits
R6#ping 192.168.20.2 size 1500 repeat 2 df-bit Type escape sequence to abort. Sending 2, 1500-byte ICMP Echos to 192.168.20.2, timeout is 2 seconds: Packet sent with the DF bit set !! Success rate is 100 percent (2/2), round-trip min/avg/max = 72/94/116 ms
CDP from remote devices :
R6#show cdp neighbors detail | inc Device|IP|Int Device ID: R1 IP address: 172.16.0.1 Interface: FastEthernet1/0, Port ID (outgoing port): FastEthernet1/0 Device ID: R7 IP address: 192.168.20.2 Interface: FastEthernet1/0, Port ID (outgoing port): FastEthernet1/0
R1#show l2tun session all
L2TP Session Information Total tunnels 1 sessions 1
Session id 56564 is up, tunnel id 23863
Remote session id is 61449, remote tunnel id 53859
Remotely initiated session
Call serial number is 10785
Remote tunnel name is R2
Internet address is 172.16.0.2
Local tunnel name is R1
Internet address is 172.16.0.1
IP protocol 115
Session is L2TP signaled
Session state is established, time since change 00:58:25
DF bit off, ToS reflect disabled, ToS value 0, TTL value 255
UDP checksums are disabled
FS cached header information:
encap size = 28 bytes
45000014 00000000 FF736353 AC100001
AC100002 0000F009 00000000
881 Packets sent, 881 received
744359 Bytes sent, 744061 received
Last clearing of counters never
Counters, ignoring last clear:
881 Packets sent, 881 received
744359 Bytes sent, 744061 received
Receive packets dropped:
out-of-order: 0
total: 0
Send packets dropped:
exceeded session MTU: 0
total: 0
Sequencing is on
Ns 872, Nr 872, 0 out of order packets received
Packets switched/dropped by secondary path: Tx 0, Rx 0
Conditional debugging is disabled
Unique ID is 1
Session Layer 2 circuit, type is Ethernet, name is FastEthernet1/0
Session vcid is 100
Circuit state is UP
Local circuit state is UP
Remote circuit state is UP
Have to try the interoperability between cisco & mikrotik

Comments