This blog explores data science and networking, combining theoretical concepts with practical implementations. Topics include routing protocols, network operations, and data-driven problem solving, presented with clarity and reproducibility in mind.
Thursday, November 28, 2024
Dual Hub Dual DMVPN Setup: Comparing Old vs New Cisco IOS Versions
Tuesday, November 26, 2024
Setting Up Dual Hub DMVPNs: Redundancy Made Easy with Modern Cisco IOS
Dual Hub DMVPN: Complete Configuration & Optimization Guide
๐ Table of Contents
๐ Introduction
Dynamic Multipoint Virtual Private Network (DMVPN) is a scalable VPN solution that allows secure communication over public networks. When combined with a dual hub architecture, it provides high availability and redundancy.
๐ Why Dual Hub DMVPN?
- High Availability
- Fault Tolerance
- Load Sharing
- Reduced Downtime
๐ฝ Expand: Real-world Scenario
If Hub1 fails, spokes automatically reroute traffic to Hub2, ensuring uninterrupted service.
๐งฉ Deployment Models
1. Single DMVPN Cloud
- One tunnel interface
- Two hubs (dual NHS)
- Simple design
2. Dual DMVPN Cloud
- Two tunnel interfaces
- Separate routing domains
- Advanced traffic control
๐ก Single DMVPN Configuration
In this model, all routers belong to the same DMVPN cloud.
Configuration Code
interface Tunnel0 ip address 192.168.1.2 255.255.255.0 tunnel source GigabitEthernet0/0 tunnel mode gre multipoint tunnel key 100 tunnel protection ipsec profile IPSEC_PROFILE ip nhrp map 192.168.1.1 HUB1_PUBLIC_IP ip nhrp map 192.168.1.3 HUB2_PUBLIC_IP ip nhrp network-id 1 ip nhrp nhs 192.168.1.1 ip nhrp nhs 192.168.1.3
๐ฝ Expand Explanation
NHRP maps logical tunnel IPs to physical IPs. Dual NHS ensures redundancy.
๐ Dual DMVPN Configuration
Each spoke connects to two hubs using separate tunnels.
interface Tunnel0 ip address 192.168.1.2 255.255.255.0 tunnel source GigabitEthernet0/0 tunnel key 100 ip nhrp nhs 192.168.1.1 interface Tunnel1 ip address 192.168.2.2 255.255.255.0 tunnel source GigabitEthernet0/1 tunnel key 200 ip nhrp nhs 192.168.2.1
๐ฝ Expand Benefits
Provides granular control and allows traffic engineering using routing metrics.
๐ Routing Protocols
EIGRP
- Easy metric manipulation
- Fast convergence
OSPF
- More complex
- Requires tuning
๐ฝ Expand Deep Comparison
EIGRP allows delay/bandwidth tuning, while OSPF uses cost-based routing requiring more manual adjustments.
⚙️ Cisco IOS 15.9 Enhancements
- Improved NHRP convergence
- DMVPN Phase 3 optimization
- Enhanced IPsec encryption
- Advanced logging tools
๐ป CLI Output Examples
Show DMVPN Status
show dmvpn Legend: Attrb --> S - Static, D - Dynamic Tunnel0, NHRP Details Type:Spoke, NHRP Peers:2 Peer NBMA Addr: 10.1.1.1 Peer NBMA Addr: 10.1.1.2
Debug Output
*Mar 1 12:00:01: NHRP: Resolution request sent *Mar 1 12:00:02: NHRP: Resolution reply received
๐ฝ Expand CLI Explanation
Shows tunnel peers and NHRP resolution process.
๐ฏ Key Takeaways
- Dual Hub DMVPN ensures redundancy
- Single cloud = simple, less control
- Dual cloud = complex, more control
- EIGRP preferred for flexibility
- IOS 15.9 improves performance significantly
๐ Conclusion
Dual hub DMVPN designs provide scalable, resilient, and efficient networking solutions. Choosing between single and dual DMVPN depends on complexity vs control requirements.
Thursday, November 21, 2024
The Evolution of GRE over IPsec: Old Way vs. New Way Post-ASA 9.7
๐ GRE over IPsec (Cisco ASA 9.7) – Old vs New Way Explained
This guide explains how GRE over IPsec evolved in Cisco ASA environments. We will break down the old complex method and the new simplified ASA 9.7 method in a structured, beginner-friendly way.
๐ Table of Contents
- Introduction
- What is GRE?
- What is IPsec?
- Simple Networking Math (Encapsulation Model)
- Old Way (Pre-ASA 9.7)
- New Way (ASA 9.7+)
- Comparison Table
- CLI Output Examples
- Key Takeaways
- Related Articles
๐ Introduction
GRE over IPsec is used to securely connect remote networks over the internet.
It combines:
- GRE → for encapsulating multiple protocols
- IPsec → for encryption and security
Together, they create a secure tunnel between sites.
๐ฆ What is GRE?
Generic Routing Encapsulation (GRE) is a tunneling protocol.
Example:
Original Packet → [IP Packet] GRE Tunnel → [GRE Header + IP Packet]
๐ What is IPsec?
IPsec encrypts traffic so it cannot be read during transmission.
It ensures:
- Confidentiality ๐
- Integrity ๐งพ
- Authentication ✔️
๐ Simple Math Behind GRE + IPsec Encapsulation
Let’s understand overhead in simple form.
Original Packet Size:
\[ P = 1500 \text{ bytes} \]
GRE adds overhead:
\[ G = 24 \text{ bytes} \]
IPsec adds overhead:
\[ I = 50 \text{ bytes} \]
Total Packet Size:
\[ T = P + G + I \]
\[ T = 1500 + 24 + 50 = 1574 \text{ bytes} \]
⚠️ Old Way (Pre-ASA 9.7)
This method was complex and required multiple devices.
Key Problems
- GRE handled by routers
- IPsec handled by ASA
- More configuration effort
- Higher latency
Configuration Example
interface Tunnel0
ip address 192.168.1.1 255.255.255.0
tunnel source 10.1.1.1
tunnel destination 10.2.2.2
access-list GRE_ACL permit gre host 10.1.1.1 host 10.2.2.2
crypto map GRE_MAP 10 match address GRE_ACL
crypto map GRE_MAP 10 set peer 10.2.2.2
crypto map GRE_MAP interface outside
CLI Output
Show Output
Tunnel Status: UP Crypto Map Applied: YES Routing: STATIC
๐ New Way (ASA 9.7+)
Cisco introduced native GRE support in ASA 9.7.
Benefits
- Less configuration
- No external router required
- Better performance
- Supports dynamic routing
Configuration Example
interface Tunnel0
ip address 192.168.1.1 255.255.255.0
tunnel source interface outside
tunnel destination 10.2.2.2
tunnel protection ipsec profile GRE_IPSEC_PROFILE
๐ Old vs New Comparison
| Feature | Old Way | New Way (ASA 9.7+) |
|---|---|---|
| GRE Handling | Router | ASA |
| IPsec Handling | ASA | ASA |
| Complexity | High | Low |
| Routing Support | Static mostly | Dynamic (OSPF/BGP) |
| Performance | Lower | Higher |
๐ฅ️ CLI Output Simulation
New ASA Output
Tunnel0 is UP IPsec SA Established GRE encapsulation active Dynamic Routing: OSPF Enabled
Old Setup Output
Tunnel0 is UP Crypto Map Applied External Router Required Routing: STATIC ONLY
๐ก Key Takeaways
- GRE = packet encapsulation
- IPsec = encryption layer
- Old method = complex multi-device setup
- New method = unified ASA solution
- Performance improves with ASA 9.7+
๐ฏ Final Conclusion
The transition from the old GRE-over-IPsec method to ASA 9.7’s integrated approach significantly reduces complexity and improves performance.
For modern enterprise networks, the new method is clearly the recommended design.
Featured Post
How HMT Watches Lost the Time: A Deep Dive into Disruptive Innovation Blindness in Indian Manufacturing
The Rise and Fall of HMT Watches: A Story of Brand Dominance and Disruptive Innovation Blindness The Rise and Fal...
Popular Posts
-
EIGRP Stub Routing In complex network environments, maintaining stability and efficienc...
-
Modern NTP Practices – Interactive Guide Modern NTP Practices – Interactive Guide Network Time Protocol (NTP)...
-
DeepID-Net and Def-Pooling Layer Explained | Interactive Guide DeepID-Net and Def-Pooling Layer Explaine...
-
GET VPN COOP Explained Simply: Key Server Redundancy Made Easy GET VPN COOP Explained (Simple + Practica...
-
Modern Cisco ASA Troubleshooting (Post-9.7) Modern Cisco ASA Troubleshooting (Post-9.7) With evolving netwo...
-
When Machine Learning Looks Right but Goes Wrong When Machine Learning Looks Right but Goes Wrong Picture a f...
-
Latent Space & Vector Arithmetic Explained | AI Image Transformations Latent Space & Vector Arit...
-
Process Synchronization – Interactive OS Guide Process Synchronization – Interactive Operating Systems Guide In an operati...
-
Event2Mind – Teaching Machines Human Intent and Emotion Event2Mind: Teaching Machines to Understand Human Intent...
-
Linear Regression vs Classification – Interactive Guide Linear Regression vs Classification – Interactive Theory Guide Line...