Interface and Hardware Component Configuration Guide for Cisco NCS 6000 Series Routers, IOS XR Release 7.4.x - Configuring Tunnel Interfaces [Cisco IOS XR Software Release 7.4] (2024)

This module describes the configuration of Tunnel-IPSec interfaces on the Cisco NCS 6000 Series Router.

Tunnel interfaces are virtual interfaces that provide encapsulation of arbitrary packets within another transport protocol. The Tunnel-IPSec interface provides secure communications over otherwise unprotected public routes.

A virtual interface represents a logical packet switching entity within the router. Virtual interfaces have a global scope and do not have an associated location. The Cisco IOS XR Software uses the rack/slot/module/port notation for identifying physical interfaces, but uses a globally unique numerical ID after the interface name to identify virtual interfaces. Examples of this numerical ID are Loopback 0, Loopback 1, and Null99999. The ID is unique for each virtual interface type so you may simultaneously have a Loopback 0 and a Null 0.

Virtual interfaces have their control plane presence on the active route processor (RP). The configuration and control plane are mirrored onto the standby RP and, in the event of a switchover, the virtual interfaces will move to the standby, which then becomes the newly active RP.

Interface and Hardware Component Configuration Guide for Cisco NCS 6000 Series Routers, IOS XR Release 7.4.x - Configuring Tunnel Interfaces [Cisco IOS XR Software Release 7.4] (1)

Note

Subinterfaces can be physical or virtual, depending on their parent interface.

Virtual tunnels are configured on any RP or distributed RP (DRP), but they are created and operate only from the RP.

Interface and Hardware Component Configuration Guide for Cisco NCS 6000 Series Routers, IOS XR Release 7.4.x - Configuring Tunnel Interfaces [Cisco IOS XR Software Release 7.4] (2)

Note

Tunnels do not have a one-to-one modular services card association.

Feature History for Configuring Tunnel Interfaces

Release

Modification

Release 5.0.0

This feature was introduced.

Prerequisites for Configuring Tunnel Interfaces

You must be in a user group associated with a task group that includes the proper task IDs. The command reference guides include the task IDs required for each command. If you suspect user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Information About Configuring Tunnel Interfaces

To implement tunnel interfaces, you must understand the following concepts:

Tunnel Interfaces Overview

Tunneling provides a way to encapsulate arbitrary packets inside of a transport protocol. This feature is implemented as a virtual interface to provide a simple interface for configuration. The tunnel interfaces are not tied to specific “passenger” or “transport” protocols, but, rather, they represent an architecture that is designed to provide the services necessary to implement any standard point-to-point encapsulation scheme. Because supported tunnels are point-to-point links, you must configure a separate tunnel for each link.

There are three necessary steps in configuring a tunnel interface:

  1. Specify the tunnel interface—interface tunnel-ipsec identifier
  2. Configure the tunnel source—tunnel source {ip-address | interface-id }
  3. Configure the tunnel destination—tunnel destination {ip-address | tunnel-id }

Virtual Interface Naming Convention

Virtual interface names never use the physical interface naming notation rack/slot/module/port for identifying an interface’s rack, slot, module, and port, because they are not tied to any physical interface or subinterface.

Virtual interfaces use a globally unique numerical identifier (per virtual interface type).

Examples of naming notation for virtual interfaces:

Interface IP-Address Status ProtocolLoopback0 10.9.0.0 Up UpLoopback10 10.7.0.0 Up UpTunnel-TE5000 172.18.189.38 Down DownNull10 10.8.0.0 Up Up

Tunnel-IPSec Overview

IPSec (IP security) is a framework of open standards for ensuring secure private communications over the Internet. It can be used to support Virtual Private Network (VPN), firewalls, and other applications that must transfer data across a public or insecure network. The router IPSec protocol suite provides a set of standards that are used to provide privacy, integrity, and authentication service at the IP layer. The IPSec protocol suite also includes cryptographic techniques to support the key management requirements of the network-layer security.

When IPSec is used, there is no need to use Secure Shell (SSH) or Secure Socket Layer (SSL). Their use causes the same data to be encrypted or decrypted twice, which creates unnecessary overhead. The IPSec daemon is running on both the RPs and the DRPs. IPSec is an optional feature on the router. IPSec is a good choice for a user who has multiple applications that require secure transport. On the client side, customers can use “Cisco VPN 3000 Client” or any other third-party IPSec client software to build IPSec VPN.

Interface and Hardware Component Configuration Guide for Cisco NCS 6000 Series Routers, IOS XR Release 7.4.x - Configuring Tunnel Interfaces [Cisco IOS XR Software Release 7.4] (3)

Note

IPSec tunnel exists in the control plane, so you do not have to bring up or bring down the tunnel. Entry into the IPSec tunnel is only for locally sourced traffic from the RP or DRP, and is dictated by the access control lists (ACL) configured as a part of the profile that is applied to the Tunnel-IPSec.

Tunnel-IPSec Naming Convention

A profile is entered from interface configuration submode for interface tunnel-ipsec. For example:

interface tunnel-ipsec 30 profile <profile name>

Crypto Profile Sets

Crypto profile sets must be configured and applied to tunnel interfaces (or to the crypto IPSec transport). For IPSec to succeed between two IPSec peers, the crypto profile entries of both peers must contain compatible configuration statements.

Two peers that try to establish a security association must each have at least one crypto profile entry that is compatible with one of the other peer's crypto profile entries. For two crypto profile entries to be compatible, they must at least meet the following criteria:

  • They must contain compatible crypto access lists. In the case where the responding peer is using dynamic crypto profiles, the entries in the local crypto access list must be “permitted” by the peer's crypto access list.
  • They must each identify the other peer (unless the responding peer is using dynamic crypto profiles).
  • They must have at least one transform set in common.
Interface and Hardware Component Configuration Guide for Cisco NCS 6000 Series Routers, IOS XR Release 7.4.x - Configuring Tunnel Interfaces [Cisco IOS XR Software Release 7.4] (4)

Note

Crypto profiles cannot be shared; that is, the same profile cannot be attached to multiple interfaces.

How to Configure Tunnel Interfaces

This section contains the following procedures:

Configuring Tunnel-IPSec Interfaces

This task explains how to configure Tunnel-IPSec interfaces.

Before you begin

To use the profile command, you must be in a user group associated with a task group that includes the proper task IDs for crypto commands. To use the tunnel destination command, you must be in a user group associated with a task group that includes the proper task IDs for interface commands.

For detailed information about user groups and task IDs, see the Configuring AAA Services module of System Security Configuration Guide for the Cisco NCS 6000 Series Routers The following tasks are required for creating Tunnel-IPSec interfaces:

  • Setting Global Lifetimes for IPSec Security Associations
  • Configuring Checkpointing
  • Configuring Crypto Profiles

For detailed information on configuring the prerequisite checkpointing and crypto profiles, and setting the global lifetimes for IPSec security associations, refer to the Implementing IPSec Network Security module in System Security Configuration Guide for Cisco NCS 6000 Series Routers .

After configuring crypto profiles, you must apply a crypto profile to each tunnel interface through which IPSec traffic will flow. Applying the crypto profile set to a tunnel interface instructs the router to evaluate all the interface's traffic against the crypto profile set and to use the specified policy during connection or security association negotiation on behalf of traffic to be protected by crypto.

SUMMARY STEPS

  1. configure
  2. interface tunnel-ipsec identifier
  3. profile profile-name
  4. tunnel source {ip-address | interface-id }
  5. tunnel destination {ip-address | tunnel-id }
  6. Do one of the following:
  • end
  • commit
  • show ip route
  • DETAILED STEPS

    Command or Action Purpose

    Step1

    configure

    Example:

    RP/0/RP0/CPU0:router# configure

    Enters XR configuration mode.

    Step2

    interface tunnel-ipsec identifier

    Example:

    RP/0/RP0/CPU0:router(config)# interface tunnel-ipsec 30

    Identifies the IPSec interface to which the crypto profile will be attached and enters interface configuration mode.

    Step3

    profile profile-name

    Example:

    RP/0/RP0/CPU0:router(config-if)# profile user1

    Assigns the crypto profile name to be applied to the tunnel for IPSec processing.

    • The same crypto profile cannot be shared in different IPSec modes.

    Step4

    tunnel source {ip-address | interface-id }

    Example:

    RP/0/RP0/CPU0:router(config-if)# tunnel source Ethernet0/1/1/2

    Specifies the tunnel source IP address or interface ID.

    • This command is required for both static and dynamic profiles.

    Step5

    tunnel destination {ip-address | tunnel-id }

    Example:

    RP/0/RP0/CPU0:router(config-if)# tunnel destination 192.168.164.19

    (Optional) Specifies the tunnel destination IP address.

    • This command is not required if the profile is dynamic.

    Step6

    Do one of the following:

    • end
    • commit

    Example:

    RP/0/RP0/CPU0:router(config-if)# end

    Example:

    Example:

    RP/0/RP0/CPU0:router(config-if)# commit

    Saves configuration changes.

    • When you issue the end command, the system prompts you to commit changes:
    Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:
      • Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to XR EXEC mode.
      • Entering no exits the configuration session and returns the router to XR EXEC mode without committing the configuration changes.
      • Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
    • Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.

    Step7

    show ip route

    Example:

    RP/0/RP0/CPU0:router# show ip route

    Displays forwarding information for the tunnel.

    • The command show ip route displays what was advertised and shows the routes for static and autoroute.

    Configuration Examples for Tunnel Interfaces

    This section contains the following example:

    Tunnel-IPSec: Example

    This example shows the process of creating and applying a profile to an IPSec tunnel. The necessary preliminary steps are also shown. You must first define a transform set and then create a profile before configuring the IPSec tunnel.

    RP/0/RP0/CPU0:router# configureRP/0/RP0/CPU0:router(config)# crypto ipsec transform-set tset1RP/0/RP0/CPU0:router(configtransform-set tset1)# transform esp-sha-hmacRP/0/RP0/CPU0:router(config-transform-set tset1)# endUncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]: yes
    RP/0/RP0/CPU0:router# configureRP/0/RP0/CPU0:router(config)# crypto ipsec profile user1RP/0/RP0/CPU0:router(config-user1)# match sampleac1 transform-set tset1RP/0/RP0/CPU0:router(config-user1)# set pfs group5RP/0/RP0/CPU0:router(config-user1)# set type dynamicRP/0/RP0/CPU0:router(config-user1)# exit
    RP/0/RP0/CPU0:router# configureRP/0/RP0/CPU0:router(config)# interface tunnel-ipsec 30RP/0/RP0/CPU0:router(config-if)# profile user1RP/0/RP0/CPU0:router(config-if)# tunnel source MgmtEth 0/RP0/CPU0/0RP/0/RP0/CPU0:router(config-if)# tunnel destination 192.168.164.19RP/0/RP0/CPU0:router(config-if)# endUncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]: yes

    Where to Go Next

    You now must apply a crypto profile to each transport. Applying the crypto profile set to a transport instructs the router to evaluate all the interface's traffic against the crypto profile set and to use the specified policy during connection or security association negotiation on behalf of traffic to be protected by crypto.

    For information on applying a crypto profile to each transport, see the Implementing IPSec Network Security on module of System Security Configuration Guide .

    Interface and Hardware Component Configuration Guide for Cisco NCS 6000 Series Routers, IOS XR Release 7.4.x  - Configuring Tunnel
	 Interfaces [Cisco IOS XR Software Release 7.4] (2024)
    Top Articles
    Penalties
    Import PGP keys with PGP Encryption Desktop for Windows (Symantec Encryption Desktop)
    English Bulldog Puppies For Sale Under 1000 In Florida
    Katie Pavlich Bikini Photos
    Gamevault Agent
    Pieology Nutrition Calculator Mobile
    Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
    Hendersonville (Tennessee) – Travel guide at Wikivoyage
    Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
    Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
    Craigslist Dog Kennels For Sale
    Things To Do In Atlanta Tomorrow Night
    Non Sequitur
    Crossword Nexus Solver
    How To Cut Eelgrass Grounded
    Pac Man Deviantart
    Alexander Funeral Home Gallatin Obituaries
    Energy Healing Conference Utah
    Geometry Review Quiz 5 Answer Key
    Hobby Stores Near Me Now
    Icivics The Electoral Process Answer Key
    Allybearloves
    Bible Gateway passage: Revelation 3 - New Living Translation
    Yisd Home Access Center
    Home
    Shadbase Get Out Of Jail
    Gina Wilson Angle Addition Postulate
    Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
    Walmart Pharmacy Near Me Open
    Marquette Gas Prices
    A Christmas Horse - Alison Senxation
    Ou Football Brainiacs
    Access a Shared Resource | Computing for Arts + Sciences
    Vera Bradley Factory Outlet Sunbury Products
    Pixel Combat Unblocked
    Movies - EPIC Theatres
    Cvs Sport Physicals
    Mercedes W204 Belt Diagram
    Mia Malkova Bio, Net Worth, Age & More - Magzica
    'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
    Teenbeautyfitness
    Where Can I Cash A Huntington National Bank Check
    Topos De Bolos Engraçados
    Sand Castle Parents Guide
    Gregory (Five Nights at Freddy's)
    Grand Valley State University Library Hours
    Holzer Athena Portal
    Hello – Cornerstone Chapel
    Stoughton Commuter Rail Schedule
    Nfsd Web Portal
    Selly Medaline
    Latest Posts
    Article information

    Author: Duane Harber

    Last Updated:

    Views: 6722

    Rating: 4 / 5 (71 voted)

    Reviews: 86% of readers found this page helpful

    Author information

    Name: Duane Harber

    Birthday: 1999-10-17

    Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

    Phone: +186911129794335

    Job: Human Hospitality Planner

    Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

    Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.