INTRODUCTION Abstract Today, large-scale communication network development projects are becoming increasingly common. One of the main tasks in implementation of large multiservice networks is the creation of reliable high-performance transport network that will serve as a backbone in multilayer architecture of next-generation networks.
PRODUCT DESCRIPTION Purpose ESR series devices are the high performance multi-purpose network routers. Device combines traditional network features with a complex multi-tier approach to routing security, and ensures robust corporate environment protection. Device has a built-in firewall that enables protection of your network environment and supports latest data security, encryption, authentication and anti-intrusion features.
2.2.2 Functions for MAC address processing Table 2.2 lists MAC address processing functions of the device Table 2.2 —MAC address processing functions MAC address MAC address table sets the correspondence between MAC addresses and device table interfaces and is used for data packet routing. Routers support table capacity up to 16K of MAC addresses and reserve specific MAC addresses for the system use.
2.2.4 Third-layer functions of OSI model Table 2.4 lists third-layer functions (OSI Layer 3). Table 2.4 —Third-layer functions description (OSI Layer 3) Administrator of the router can add or remove static records into/from the routing Static IP routes table. Dynamic routing With dynamic routing protocols, the device will be able to exchange the routing information with neighbouring routers and automatically create a routing table.
2.2.5 Traffic tunnelling functions Table 2.5 —Traffic tunnelling functions Tunnelling Tunnelling is a method of packet conversion during their network transfer that involves the replacement, modification and addition of a new packet network protocols header. This method may be used for negotiation of transport protocols when the data is transferred through the transit network as well as for creation of secured connections where tunnelled data is being encrypted.
Design This section describes the design of the device. Depicted front, rear, and side panels of the device, connectors, LED indicators and controls. The device has a metal housing available for 19” form-factor rack mount; housing size is 1U. 2.4.1 ESR-1000, ESR-1200 design 2.4.1.1 ESR-1200 front panel The front panel of ESR-1200 is depicted in Fig.
Page 14
terminal to factory settings. Console Console port RS-232 for local management of the device. 2.4.1.2 ESR-1000 front panel The front panel layout of the device is depicted in Fig. 2.2. — Fig. 2.2 ESR-1000 front panel Table 2.10 lists sizes, LEDs, and controls located on the front panel of the device. Table 2.10 —Description of connectors, LEDs, and controls located on the front panel Front panel element Description...
Page 15
2.4.1.3 ESR-1000, ESR-1200 rear panel The rear panel layout of ESR-1000, ESR-1200 is depicted in Fig. 2.3 — Fig. 2.3 ESR-1000, ESR-1200 rear panel Table 2.11 lists rear panel connectors of the router. Table 2.11 —Description of rear panel connectors of the router Description Main power supply.
— Fig. 2.7 ESR-200 front panel Table 2.12 lists sizes, LEDs, and controls located on the front panel of ESR-100 and ESR-200 routers. Table 2.12 —Description of connectors, LEDs, and controls located on the front panel Front panel element Description SD memory card installation slot.
Page 17
2.4.2.2 ESR-100, ESR-200 rear panel The rear panel layout of ESR-100 and ESR-200 routers is depicted in Fig. 2.8 — Fig. 2.8 ESR-1000, rear panel Table 2.13 lists rear panel connectors of the router. Table 2.13 —Description of rear panel connectors of the router Description Earth bonding point of the device.
2.4.3 Light Indication 2.4.3.1 ESR-1000, ESR-1200 light indication Gigabit Ethernet copper interface status is represented by two LEDs—green LINK/ACT LED and amber SPEED LED. Location of the copper interface LEDs is depicted in Fig. 2.11. SFP interface status is is represented by two LEDs—RX/ACT and TX/ACT—depicted in Fig.
Page 19
Backup power supply is missing or failed. 2.4.3.2 ESR-100/ESR-200 light indication Gigabit Ethernet copper interface and SFP interface statuses are represented by two LEDs—green LINK/ACT LED and amber SPEED LED. Location of the copper interface LEDs is depicted in Fig. 2.11. SFP interface status is depicted in Fig.
INSTALLATION AND CONNECTION This section describes installation of the device into a rack and connection to a power supply. Support brackets mounting The delivery package includes support brackets for rack installation and mounting screws to fix the device case on the brackets. To install the support brackets: —...
Device rack installation To install the device to the rack: 1. Attach the device to the vertical guides of the rack. 2. Align mounting holes in the support bracket with the corresponding holes in the rack guides. Use the holes of the same level on both sides of the guides to ensure the device horizontal installation.
ESR-1000, ESR-1200 power module installation ESR-1000 router can operate with one or two power modules. The second power module installation is necessary when the device operates under strict reliability requirements. From the electric point of view, both places for power module installation are identical. In the context of device operation, the power module located closer to the edge is considered as the main module, and the one closer to the centre—as the backup module.
SFP transceiver installation and removal Optical modules can be installed when the terminal is turned on or off. Transceiver installation 1. Insert the top SFP module into a slot with its open side down, and the bottom SFP module with its open side up.
— access 192.168.1.1/24. Trusted zone includes the following interfaces: For ESR-100: GigabitEthernet 1/0/2-4; For ESR-200: GigabitEthernet 1/0/2-8; For ESR-1000: GigabitEthernet 1/0/2-24; For ESR-1200: GigabitEthernet 1/0/2-16, TengigabitEthernet 1/0/3-8 By default, the user 'admin' with the password 'password' is defined in factory settings.
IP address from the provider. All incoming connections from this zone to the router are blocked. This security zone includes the following interfaces: For ESR-100 and ESR-200: GigabitEthernet 1/0/1; For ESR-1000 and ESR-1200: GigabitEthernet1/0/1, TengigabitEthernet1/0/1, TengigabitEthernet1/0/2.
To ensure the secure system access, you should change the password for the privileged 'admin' user. 'techsupport' account ('eltex' up to version 1.0.7) is required for service center specialist remote access. 'remote' account — RADIUS, TACACS+, LDAP authentication.
Page 30
5.2.2.2 Creation of new users Use the following commands to create a new system user or configure the username, password, or privilege level: esr(config)# username <name> esr(config-user)# password <password> esr(config-user)# privilege <privilege> esr(config-user)# exit Privilege levels 1–9 allow you to access the device and view its operation status, but the device configuration is disabled.
Page 31
To ensure the correct IP address assigning for the interface, enter the following command when the configuration is applied: esr# show ip interfaces IP address Interface Type ------------------- --------------------------------- ------- 192.168.16.144/24 gigabitethernet 1/0/2.150 static Provider may use dynamically assigned addresses in their network. If the there is DHCP server in the network, you can obtain the IP address via DHCP protocol.
Page 32
esr# configure esr(config)# object-group network clients esr(config-addr-set)# ip address-range 132.16.0.5-132.16.0.10 esr(config-addr-set)# exit esr(config)# object-group network gateway esr(config-addr-set)# ip address-range 40.13.1.22 esr(config-addr-set)# exit esr(config)# object-group service ssh esr(config-port-set)# port-range 22 esr(config-port-set)# exit esr(config)# security zone-pair untrusted self esr(config-zone-pair)# rule 10 esr(config-zone-rule)# action permit esr(config-zone-rule)# match protocol tcp esr(config-zone-rule)# match source-address clients esr(config-zone-rule)# match destination-address gateway...
FIRMWARE UPDATE Updating firmware via system resources To update the firmware, use any of the following servers: TFTP, FTP, SCP. Router firmware files obtained from the manufacturer should be allocated on the server. The router stores two copies of the firmware. To ensure the reliability of the firmware update procedure, only the copy that was not used for the last device startup is available for the update.
esr# show bootvar Image Version Date Status After reboot ----- ------------------------- -------------------- ------------ ------------ 1.0.4 build 94[f812808] date 18/02/2015 time Active 16:12:54 1.0.4 build 94[f812808] date 18/02/2015 time Not Active 16:12:54 Use the following command to select the image: esr# boot system image-[1|2] 6.
Using nae-0-3 device 10.100.100.1 10.100.100.2 TFTP from server ; our IP address is Filename 'esr1000/firmware'. Load address: 0xa800000060000000 Loading: TftpStart:TftpTimeoutMsecs = 10000, TftpTimeoutCountMax = 6 ################################################################# ################################################################# ################################################################# ######################### #################################### done Bytes transferred = 64453909 (3d77d15 hex) Device 0: MT29F8G08ABBCAH4 ...
Page 36
5. Launch firmware update procedure: BRCM.XLP316Lite Rev B0.u-boot# run upd_uboot (or «run tftp_update_uboot» - depends on the bootloader version) Using nae-1 device TFTP from server 10.100.100.1; our IP address is 10.100.100.2 Filename 'esr1000/u-boot.bin'. Load address: 0xa800000078020000 Loading: ########################################################### done Bytes transferred = 852648 (d02a8 hex) SF: Detected MX25L12805D with page size 256, total 16777216 bytes 16384 KiB MX25L12805D at 0:0 is now current device 6.
ROUTER CONFIGURATION EXAMPLES VLAN Configuration VLAN (Virtual Local Area Network) is a logical (virtual) local area network that represents a group of devices which communicate on channel level regardless of their physical location. Objective 1: On the basis of the factory configuration, remove gi1/0/1 port from VLAN 2. —...
Page 38
Configuration has been successfully committed esr-1000# confirm Objective 3: Configure gi1/0/1 ports for packet transmission and reception in VLAN 2, VLAN 64, VLAN 2000 in trunk mode, configure gi1/0/2 port in access mode for VLAN 2 on ESR-100/ESR -200. — Fig. 7.3...
QinQ termination configuration QinQ is a technology of packet transmission with two 802.1q tags. The technology is used for extending quantity of VLANs in data networks. 802.1q header, which is closer to payload, is an Inner Tag also known as C-VLAN (Custimer VLAN). 802.1q header, which is comes before C-VLAN, is an Outer Tag also known as S-VLAN (Service VLAN).
192.168.1.100-192.168.1.125 esr(config-dhcp-server)# default-lease-time 1:00:00 Configure transfer of additional network parameters to clients: default route: 192.168.1.1 domain name: eltex.loc DNS server list: DNS1: 172.16.0.1, DNS2: 8.8.8.8. esr(config-dhcp-server)# domain-name "eltex.loc" esr(config-dhcp-server)# default-router 192.168.1.1 esr(config-dhcp-server)# dns-server 172.16.0.1 8.8.8.8...
Page 42
esr(config-dhcp-server)# exit To enable IP address distribution from the configurable pool by DHCP server, IP interface should be created on the router that belongs to the same subnet as the pool addresses. esr(config)# interface gigabitethernet 1/0/1 esr(config-if-gi)# security-zone trusted esr(config-if-gi)# ip address 192.168.1.1/24 esr(config-if-gi)# exit To enable DHCP protocol message transmission to the server, you should create the respective port profiles including source port 68 and destination port 67 used by DHCP protocol and create the allowing...
Destination NAT configuration Destination NAT (DNAT) function includes destination IP address translation for packets transferred through the network gateway. DNAT is used for redirection of traffic, coming to a specific 'virtual' address in a public network, to a 'real' server in LAN located behind the network gateway. This function may be used for establishing a public access to servers located within the private network without any public network address.
Page 44
Proceed to DNAT configuration mode and create destination address and port pool that will be used for translation of packet addresses coming to address 1.2.3.4 from the external network. esr(config)# nat destination esr(config-dnat)# pool SERVER_POOL esr(config-dnat-pool)# ip address 10.1.1.100 esr(config-dnat-pool)# ip port 80 esr(config-dnat-pool)# exit Create 'DNAT' rule set which will be used for address translation.
Source NAT configuration Source NAT (SNAT) function substitutes source address for packets transferred through the network gateway. When packets are transferred from LAN into public network, source address is substituted to one of the gateway public addresses. Additionally, source port substitution may be added to the source address.
Page 46
To transfer traffic from 'TRUST' zone into 'UNTRUST' zone, create a pair of zones and add rules allowing traffic transfer in this direction. Additionally, there is a check in place to ensure that data source address belongs to 'LOCAL_NET' address range in order to limit the access to public network. Rules are applied with enable command.
Page 47
Objective 2: Configure access for users in LAN 21.12.2.0/24 to public network using Source NAT function without the firewall. Public network address range for SNAT 200.10.0.100-200.10.0.249. Fig. 7.6—Network structure Solution: Begin configuration with network interface configuration and disabling the firewall: esr(config)# interface gigabitethernet 1/0/1 esr(config-if-gi)# ip address 21.12.2.1/24 esr(config-if-gi)# ip firewall disable...
In order the router could response to the ARP requests for addresses from the public pool, you should launch ARP Proxy service. ARP Proxy service is configured on the interface that IP address from 'PUBLIC_POOL' public network address profile subnet belongs to: esr(config)# interface tengigabitethernet 1/0/1 esr(config-if-te)# ip nat proxy-arp PUBLIC_POOL —...
Page 49
For definition of rules for security zones, create 'LAN' address profile that includes addresses which are allowed to access WAN network and 'WAN' network address profile. esr(config)# object-group network WAN esr(config-object-group-network)# ip address-range 192.168.23.2 esr(config-object-group-network)# exit esr(config)# object-group network LAN esr(config-object-group-network)# ip address-range 192.168.12.2 esr(config-object-group-network)# exit esr(config)# object-group network LAN_GATEWAY...
esr(config-zone-rule)# match destination-address LAN esr(config-zone-rule)# match source-address LAN_GATEWAY esr(config-zone-rule)# enable esr(config-zone-rule)# exit esr(config-zone-pair)# exit esr(config)# exit Configuration changes will take effect when the following commands are executed: esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed esr# To view port membership in zones, use the following command: esr# show security zone...
esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed esr# To view the detailed information on access control list, use the following command: esr# show ip access-list white 7.10 Static routes configuration Static routing is a type of routing in which routes are defined explicitly during the router configuration without dynamic routing protocols.
Page 52
For gi1/0/3 interface, specify 128.107.1.2/30 address and 'WAN' zone. R1 will be connected to the Internet through this interface: R1(config)# interface gi1/0/3 R1(config-if-gi)# security-zone WAN R1(config-if-gi)# ip address 128.107.1.2/30 R1(config-if-gi)# exit Create a route for interaction with 10.0.0.0/8 network using R2 device (192.168.100.2) as a gateway: R1(config)# ip route 10.0.0.0/8 192.168.100.2 Create a route for interaction with the Internet using provider gateway (128.107.1.1) as a nexthop:...
To check the routing table, use the following command: esr# show ip route 7.11 MLPP configuration Multilink PPP (MLPPP) is an aggregated channel that encompasses methods of traffic transition via multiple physical channels while having a single logical connection. This option allows to enhance bandwidth and enables load balancing.
7.12 Bridge configuration Bridge is a method of connection for two Ethernet segments on data-link level without any higher level protocols, such as IP. Packet transmission is based on Ethernet addresses, not on IP addresses. Given that the transmission is performed on data-link level (Level 2 of the OSI model), higher level protocol traffic passes through the bridge transparently.
Page 55
Objective 2: Configure routing between VLAN 50 (10.0.50.0/24) and VLAN 60 (10.0.60.1/24). VLAN — 50 should belong to 'LAN1', VLAN 60 to 'LAN2', enable free traffic transmission between zones. — Fig. 7.11 Network structure Solution: Create VLAN 50 and 60: esr(config)# vlan 50,60 esr(config-vlan)# exit Create 'LAN1' and 'LAN2' security zones.
esr(config-zone-rule)# action permit esr(config-zone-rule)# match protocol any esr(config-zone-rule)# match source-address any esr(config-zone-rule)# match destination-address any esr(config-zone-rule)# enable esr(config-zone-rule)# exit esr(config-zone-pair)# exit esr(config)# security zone-pair LAN2 LAN1 esr(config-zone-pair)# rule 1 esr(config-zone-rule)# action permit esr(config-zone-rule)# match protocol any esr(config-zone-rule)# match source-address any esr(config-zone-rule)# match destination-address any esr(config-zone-rule)# enable esr(config-zone-rule)# exit...
Enter the RIP configuration mode: esr(config)# router rip Define subnets that will be announced by the protocol: 115.0.0.0/24, 14.0.0.0/24 and 10.0.0.0/24: esr(config-rip)# network 115.0.0.0/24 esr(config-rip)# network 14.0.0.0/24 esr(config-rip)# network 10.0.0.0/24 To announce static routes by the protocol, execute the following command: esr(config-rip)# redistribute static Configure timer, responsible for routing information transmission: esr(config-rip)# timers update 25...
Page 58
— Fig. 7.13 Network structure Solution: Pre-configure IP addresses on interfaces according to the network structure shown in Fig. 7.13. Create OSPF process with identifier 10 and proceed to the OSPF protocol configuration mode: esr(config)# router ospf 10 Create and enable the required area: esr(config-ospf)# area 1.1.1.1 esr(config-ospf-area)# enable esr(config-ospf-area)# exit...
Page 59
Configuration changes will take effect when the configuration is applied: esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed Objective 2: Change 1.1.1.1 area type, area should be stub. Stub router should announce routes received via RIP. —...
For R1 router, proceed to 1.1.1.1 area configuration mode: esr(config-ospf)# area 1.1.1.1 Create and enable virtual link with the identifier 0.0.0.3: esr(config-ospf-area)# virtual-link 0.0.0.3 esr(config-ospf-vlink)# enable For R3 router, proceed to 1.1.1.1 area configuration mode: esr(config-ospf)# area 1.1.1.1 Create and enable virtual link with the identifier 0.0.0.1: esr(config-ospf-area)# virtual-link 0.0.0.1 esr(config-ospf-vlink)# enable Configuration changes will take effect when the configuration is applied:...
Page 61
Objective: Configure BGP on the router with the following parameters: — Fig. 7.16 Network structure – proprietary subnets: 80.66.0.0/24, 80.66.16.0/24; – announcing of directly connected subnets; – proprietary AS 2500; — – first neighbouring subnet 219.0.0.0/30, proprietary IP address 219.0.0.1, neighbour IP address 219.0.0.2, AS 2500;...
Page 62
esr(config-bgp-af)# neighbor 219.0.0.2 esr(config-bgp-neighbor)# remote-as 2500 esr(config-bgp-neighbor)# enable esr(config-bgp-neighbor)# exit Enable protocol operation: esr(config-bgp-af)# enable esr(config-bgp-af)# exit esr(config)# exit Configuration changes will take effect when the configuration is applied: esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed esr# To view BGP peer information, use the following command: esr# show ip bgp 2500 neighbors...
7.16 PBR routing policy configuration 7.16.1 Route-map for BGP configuration Route-maps may serve as filters processing routing information when it is received from or sent to the neighbouring device. Processing may include filtering based on various route criteria and setting attributes (MED, AS-PATH, community, LocalPreference, etc.) for the respective routes.
Page 64
Map the policy to routing information: esr(config-bgp-neighbor)# route-map from-as20 in Objective 2: For the whole transmitted routing information (from community 2500:25), assign MED equal to 240 and define EGP routing information source: First: Configure BGP with AS 2500 on ESR Solution: Create a policy: esr(config)# route-map to-as20...
7.16.2 Route-map based on access control lists (Policy-based routing) — Fig. 7.18 Network structure Objective 1: Distribute traffic between Internet service providers based on user subnets. First, do the following: – Assign IP address to interfaces. Route traffic from addresses 10.0.20.0/24 through ISP1 (184.45.0.150), and traffic from addresses 10.0.30.0/24 trough ISP2 (80.16.0.23).
Page 66
esr(config-route-map-rule)# match ip access-group sub20 Specify nexthop for sub20: esr(config-route-map-rule)# action set ip next-hop verify-availability 184.45.0.150 10 esr(config-route-map-rule)# action set ip next-hop verify-availability 80.16.0.23 esr(config-route-map-rule)# exit esr(config-route-map)# exit Rule 1 should provide traffic routing from the network 10.0.20.0/24 to address 184.45.0.150, and in —...
7.17 GRE tunnel configuration GRE (Generic Routing Encapsulation) is a network packet tunnelling protocol. Its main purpose is to encapsulate packets of the OSI model network layer into IP packets. GRE may be used for VPN establishment on 3rd level of OSI model. In ESR router implemented static unmanageable GRE tunnels, i.e. tunnels are created manually via configuration on local and remote hosts.
Page 68
To apply configuration changes, execute the following commands: esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed When settings are applied, traffic will be encapsulated into the tunnel and sent to the partner regardless of their GRE tunnel existence and settings validity. Alternatively, you may specify the following parameters for GRE tunnel: ...
7.18 L2TPv3 tunnel configuration L2TPv3 (Layer 2 Tunneling Protocol Version 3) is a protocol used for tunnelling of 2nd level OSI model packets between two IP nodes. IP or UDP is used as an encapsulation protocol. L2TPv3 may be used as an alternative to MPLS P2P L2VPN (VLL) for L2 VPN establishment.
Page 70
Specify identifiers for session inside the tunnel for local and remote sides: esr(config-l2tpv3)# local session-id 100 esr(config-l2tpv3)# remote session-id 200 Define the inherence of L2TPv3 tunnel to a bridge that should be mapped to remote office network (for bridge configuration, see Paragraph 7.11): esr(config-l2tpv3)# bridge-group 333 Enable previously created tunnel and exit: esr(config-l2tpv3)# enable...
7.19 IPsec VPN configuration IPsec is a set of protocols that enable security features for data transferred via IP protocol. This set of protocols allows for identity validation (authentication), IP packet integrity check and encryption, and also includes protocols for secure key exchange over the Internet. —...
Page 72
esr(config-object-group-service)# port-range 500 esr(config-object-group-service)# exit Create a static route to the remote LAN. For each subnet located behind an IPsec tunnel, specify a route via VTI tunnel: esr(config)# ip route 192.0.2.0/24 tunnel vti 1 Create IKE protocol profile. In the profile, select Diffie-Hellman group 2, AES 128 bit encryption algorithm, MD5 authentication algorithm.
Page 73
esr(config)# exit 2. R2 configuration Configure external network interface and identify its inherence to a security zone: esr# configure esr(config)# interface gi 1/0/1 esr(config-if)# ip address 120.11.5.1/24 esr(config-if)# security-zone untrusted esr(config-if)# exit Create VTI tunnel. Traffic will be routed via VTI into IPsec tunnel. Specify IP addresses of WAN border interfaces as a local and remote gateways: esr(config)# tunnel vti 1 esr(config-vti)# remote address 180.100.0.1...
Create security parameters' profile for IPsec tunnel. For the profile, select AES 128 bit encryption algorithm, MD5 authentication algorithm. Use the following parameters to secure IPsec tunnel: esr(config)# security ipsec proposal ipsec_prop1 esr(config-ipsec-proposal)# authentication algorithm md5 esr(config-ipsec-proposal)# encryption algorithm aes128 esr(config-ipsec-proposal)# exit Create policy for IPsec tunnel.
Page 75
Create IKE profile. In the profile, specify Diffie-Hellman group as 2, encryption algorithm - AES 128 bit, authentication algorithm - MD5. This security parameters is used for protection of IKE connection: esr(config)# security ike proposal ike_prop1 esr(config-ike-proposal)# dh-group 2 esr(config-ike-proposal)# authentication algorithm md5 esr(config-ike-proposal)# encryption algorithm aes128 esr(config-ike-proposal)# exit Create IKE protocol policy.
Page 76
esr# configure esr(config)# interface gi 1/0/1 esr(config-if)# ip address 120.11.5.1/24 esr(config-if)# security-zone untrusted esr(config-if)# exit Create ISAKMP port profile in order to configure security zone rules: esr(config)# object-group service ISAKMP esr(config-addr-set)# port-range 500 esr(config-addr-set)# exit Create IKE profile. In the profile, specify Diffie-Hellman group as 2, encryption algorithm - AES 128 bit, authentication algorithm - MD5.
esr(config)# security ipsec vpn ipsec1 esr(config-ipsec-vpn)# mode ike esr(config-ipsec-vpn)# ike establish-tunnel immediate esr(config-ipsec-vpn)# ike gateway ike_gw1 esr(config-ipsec-vpn)# ike ipsec-policy ipsec_pol1 esr(config-ipsec-vpn)# enable esr(config-ipsec-vpn)# exit esr(config)# exit You can view the state of the tunnel using following command: esr# show security ipsec vpn status ipsec1 You can view the configuration of the tunnel using following command: esr# show security ipsec vpn configuration ipsec1 It is necessery to enable ESP and ISAKMP (UDP - port 500) in firewall.
Designate LT-tunnel from VRF, which is necessary to establish link with, for each LT-tunnel and activate them. esr(config)# tunnel lt 1 esr(config-lt)# peer lt 2 esr(config-lt)# enable esr(config-lt)# exit esr(config)# tunnel lt 2 esr(config-lt)# peer lt 1 esr(config-lt)# enable esr(config-lt)# exit If NONE of dynamic routing protocols works in VRF, specify static routes for each VRF: esr(config)# ip route vrf vrf_1 0.0.0.0/0 192.168.100.2 esr(config)# ip route vrf vrf_2 0.0.0.0/0 192.168.100.1...
Page 79
esr# configure esr(config)# object-group network pptp_outside esr(config-object-group-network)# ip address-range 120.11.5.1 esr(config-object-group-network)# exit Create address profile that contains local gateway address: esr(config)# object-group network pptp_local esr(config-object-group-network)# ip address-range 10.10.10.1 esr(config-object-group-network)# exit Create address profile that contains client addresses: esr(config)# object-group network pptp_remote esr(config-object-group-network)# ip address-range 10.10.10.5-10.10.10.25 esr(config-object-group-network)# exit Create address profile that contains DNS servers:...
To end PPTP server session for user 'fedor', use one of the following commands: esr# clear remote-access session pptp username fedor esr# clear remote-access session pptp server remote-workers username fedor To view PPTP server configuration, use the following command: esr# show remote-access configuration pptp remote-workers In addition to PPTP server creation, you should open TCP port 1723 designed for connection handling and enable GRE protocol (47) for the tunnel traffic in the firewall.
Page 81
esr(config)# object-group network pptp_dns esr(config-object-group-network)# ip address-range 8.8.8.8 esr(config-object-group-network)# ip address-range 8.8.4.4 esr(config-object-group-network)# exit Create L2TP server and map profiles listed above to it: esr(config)# remote-access l2tp remote-workers esr(config-l2tp)# local-address ip-address 10.10.10.1 esr(config-l2tp)# remote-address address-range 10.10.10.5-10.10.10.15 esr(config-l2tp)# outside-address ip-address 120.11.5.1 esr(config-l2tp)# dns-server object-group l2tp_dns Select authentication method for L2TP server users: esr(config-l2tp)# authentication mode radius...
7.23 Configuring remote access to corporate network via OpenVPN protocol OpenVPN is a sophisticated tool based on SSL that implements Virtual Private Networks (VPN), enables remote access and solves many different tasks related to data transmission security. Objective: Configure Open VPN server in L3 mode on a router for remote user connection to LAN. ...
Specify previously imported certificates and keys that will be used with OpenVPN server: esr(config-openvpn)# certificate ca ca.crt esr(config-openvpn)# certificate dh dh.pem esr(config-openvpn)# certificate server-key server.key esr(config-openvpn)# certificate server-crt server.crt esr(config-openvpn)# certificate ta ta.key Specify security zone that user sessions will be related to: esr(config-openvpn)# security-zone VPN Select aes128 encryption algorithm: esr(config-openvpn)# encryption algorithm aes128...
Objective: Establish redundancy of the ESR router L2 connections for VLAN 50-55 using SW1 and SW2 devices. — Fig. 7.25 Network structure Solution: 1. First, do the following: Create VLAN 50-55: esr-1000(config)# vlan 50-55 You should disable STP for gigabitethernet 1/0/9 and gigabitethernet 1/0/10 interfaces, i.e. these protocols cannot operate simultaneously.
7.25.1 Basic QoS Objective: Configure the following restrictions on gigabitethernet 1/0/8 interface: transfer DSCP 22 traffic into 8th priority queue, DSCP 14 traffic into 7th weighted queue, limit transfer rate to 60Mbps for 7th queue. — Fig. 7.26 Network structure Solution: In order to make 8th queue a priority queue, and 1st to 7th queues weighted ones, limit the quantity of priority queues to 1.
7.25.2 Extended QoS Objective: Classify incoming traffic by a subnet (10.0.11.0/24, 10.0.12.0/24), label it by DSCP (38 and 42) and segregate by a subnet (40Mbps and 60Mbps), limit general bandwidth to 250Mbps, process the rest of traffic using SFQ mechanism. —...
Page 87
esr(config-class-policy-map)# exit esr(config-policy-map)# class fl2 esr(config-class-policy-map)# shape average 60000 esr(config-class-policy-map)# exit For the rest of traffic, configure a class with SFQ mode: esr(config-policy-map)# class class-default esr(config-class-policy-map)# mode sfq esr(config-class-policy-map)# fair-queue 800 esr(config-class-policy-map)# exit esr(config-policy-map)# exit Enable QoS on the interfaces, policy on gi 1/0/19 interface ingress for classification purposes and gi1/0/20 egress for applying restrictions and SFQ mode for default class: esr(config)# interface gigabitethernet 1/0/19 esr(config-if-gi)# qos enable...
7.26 Mirroring configuration Traffic mirroring is a feature of the router that allows for redirection of traffic from a specific port of the router to another port of the same router (local mirroring) or to a remote device (remote mirroring). Objective: Establish remote mirroring of traffic through VLAN 50 from gi1/0/11 interface to be sent to server for processing purposes.
7.27 Netflow configuration Netflow is a network protocol designed for traffic accounting and analysis. Netflow allows to transfer traffic information (source and destination address, port, quantity of information) from the network equipment (sensor) to the collector. Common server may serve as a collector. Objective: Establish accounting for traffic from gi1/0/1 interface to be sent to the server via gi1/0/8 interface for processing purposes.
7.28 sFlow configuration Sflow is a computer network, wireless network and network device monitoring standard designed for traffic accounting and analysis. Objective: Establish accounting for traffic between 'trusted' and 'untrusted' zones. — Fig. 7.30 Network structure Solution: Create two security zones for ESR networks: esr# configure esr(config)# security zone TRUSTED esr(config-zone)# exit...
esr(config-zone-pair-rule)# match protocol any esr(config-zone-pair-rule)# match source-address any esr(config-zone-pair-rule)# match destination-address any esr(config-zone-pair-rule)# enable Enable sFlow on the router: еsr(config)# sflow enable Configuration changes will take effect when the configuration is applied: esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed sFlow configuration for traffic accounting from the interface is performed by analogy to 7.27 Netflow configuration.
Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed Further port-channel configuration is performed by analogy to the common physical interface. 7.30 VRRP configuration VRRP (Virtual Router Redundancy Protocol) is a network protocol designed for increased availability of routers, acting as a default gateway.
Page 93
Configuration has been successfully committed R1# confirm Configuration has been successfully confirmed Configure R2 in the same manner. Objective 2: Establish virtual gateways for 192.168.20.0/24 subnet in VLAN 50 and 192.168.1.0/24 in VLAN 60 using VRRP with Master sync feature. To do this, you have to group VRRP processes. IP addresses 192.168.1.1 and 192.168.20.1 are used as virtual gateways.
Enable VRRP: R1(config-subif)# vrrp R1(config-subif)# exit Configure VRRP for 192.168.20.0/24 subnet in the created sub-interface. Specify unique VRRP identifier: R1(config-sub)#interface gi 1/0/6.60 R1(config-subif)# vrrp id 20 Specify virtual gateway IP address 192.168.20.1: R1(config-subif)# vrrp ip 192.168.20.1 Specify VRRP group identifier: R1(config-subif)# vrrp group 5 Enable VRRP: R1(config-subif)# vrrp...
Page 95
Initial configurations of the routers: Router R1: hostname R1 interface gigabitethernet 1/0/1 switchport forbidden default-vlan exit interface gigabitethernet 1/0/1.741 ip firewall disable ip address 192.168.0.2/24 vrrp ip 192.168.0.1/24 vrrp exit interface gigabitethernet 1/0/2 switchport forbidden default-vlan exit interface gigabitethernet 1/0/2.742 ip firewall disable ip address 192.168.1.1/30 exit...
vrrp ip 192.168.0.1/24 vrrp exit interface gigabitethernet 1/0/2 switchport forbidden default-vlan exit interface gigabitethernet 1/0/2.742 ip firewall disable ip address 192.168.1.2/30 exit interface gigabitethernet 1/0/4 ip firewall disable ip address 10.0.1.1/24 exit Solution: There is no need in any changes in router R2, since subnet 10.0.1.0/24 is terminated on it and as soon as router R1 is vrrp master, packets will be transmitted to corresponding interface.
Page 97
Solution: Create VRF: esr(config)# ip vrf bit esr(config-vrf)# exit Create security zone: esr(config)# security zone vrf-sec esr(config-zone)# ip vrf forwarding bit esr(config-zone)# exit Create rule for a pair of zones and allow all TCP/UDP traffic: esr(config)# security zone-pair vrf-sec vrf-sec esr(config-zone-pair)# rule 1 esr(config-zone-rule)# match source-address any esr(config-zone-rule)# match destination-address any...
esr# show ip route vrf bit 7.33 MultiWAN configuration MultiWAN technology establishes a fail-safe connection with redundancy of links from multiple providers and solves the problem involving traffic balancing between redundant links. Objective: Configure route to the server (108.16.0.1/28) with the load balancing option. —...
Page 99
Create integrity check target: esr(config-target-list)# target 1 Specify address to be checked, enable check for the specified address and exit: еsr(config-wan-target)# ip address 8.8.8.8 еsr(config-wan-target)# enable еsr(config-wan-target)# exit Configure interfaces. In te1/0/1 interface configuration mode, specify nexthop: еsr(config)# interface tengigabitethernet 1/0/1 еsr(config-if)# wan load-balance nexthop 203.0.0.1 In te1/0/1 interface configuration mode, specify a list of targets for link check: еsr(config-if)# wan load-balance target-list google...
7.34 SNMP configuration SNMP (Simple Network Management Protocol)is a protocol designed for device management in IP networks featuring TCP/UDP architecture. SNMP provides management data as variables that describe the configuration of a system being managed. Objective: Configure SNMPv3 server with authentication and data encryption for 'admin' user. ESR router IP address: 192.168.52.41, server IP address: 192.168.52.8.
Fig. 7.3 – Network structure Solution: SoftWLC server keeps accounts data and tariff plan parameters. You can obtain more detailed information on installation and configuring SoftWLC server using following links: http://kcs.eltex.nsk.ru/articles/960 general article of SoftWLC http://kcs.eltex.nsk.ru/articles/474 SoftWLC installation from repositories.
Page 102
Location parameter (see bridge 2 configuration). The module which is control AAA operations is based on eltex-radius and available by SoftWLC IP address. Numbers of ports for authentication and accounting in the example below are the default values for SoftWLC.
Page 103
Specify web resources which are available without authorization: esr(config)# object-group url defaultservice esr(config-object-group-url)# url http://eltex.nsk.ru esr(config-object-group-url)# exit The URL filtering lists are kept on SoftWLC server (you need to change only IP address of SoftWLC server, if addressing is different from the example. Leave the rest of URL without changes): esr(config)# subscriber-control filters-server-url http://192.0.2.20:7070/Filters/file/...
Page 104
esr(config-subscriber-control)# bypass-traffic-acl DHCP esr(config-subscriber-control)# default-service esr(config-subscriber-default-service)# class-map INTERNET esr(config-subscriber-default-service)# filter-name local defaultservice esr(config-subscriber-default-service)# filter-action permit esr(config-subscriber-default-service)# default-action redirect http://192.0.2.20:8080/eltex_portal/ esr(config-subscriber-default-service)# session-timeout 3600 esr(config-subscriber-default-service)# exit esr(config-subscriber-control)# enable esr(config-subscriber-control)# exit Configure rules for transition among security zones. esr(config)# object-group service telnet esr(config-object-group-service)# port-range 23 esr(config-object-group-service)# exit esr(config)# object-group service ssh...
Page 105
esr(config-zone-pair-rule)# match source-port dhcp_client esr(config-zone-pair-rule)# match destination-port dhcp_server esr(config-zone-pair-rule)# enable esr(config-zone-pair-rule)# exit esr(config-zone-pair)# exit Enable ICMP transmission to the device. For BRAS operation you need to open ports for web proxying - TCP 3129/3128 (NetPortDiscovery Port/Active API Server port: esr(config)# object-group service bras esr(config-object-group-service)# port-range 3129 esr(config-object-group-service)#...
Page 106
esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed ESR Series Routers Operation Manual...
FREQUENTLY ASKED QUESTIONS Configuration changes will take effect when the configuration is applied: esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed Receiving of routes, which are configured in VRF via BGP or/and OSPF, failed. The neighboring is successfully installed, but record of routes in RIB is denied: %ROUTING-W-KERNEL: Can not install route.
Page 108
How to configure ip-prefix-list 0.0.0.0./0? Example of prefix-list configuration is shown below. The configuration allows route reception by default. esr(config)# ip prefix-list eltex esr(config-pl)# permit default-route Problem of asynchronuous traffic transmission is occurred In case of asynchronous routing, Firewall will forbid "incorrect" ingress traffic (which does not open new connection and does not belong any established connection) for security reasons.
Page 109
+7(383) 274-47-87 +7(383) 272-83-31 E-mail: techsupp@eltex.nsk.ru Visit Eltex official website to get the relevant technical documentation and software, benefit from our knowledge base, send us online request or consult a Service Centre Specialist in our technical forum. http://www.eltex.nsk.ru/en/support/downloads/ http://www.eltex.nsk.ru/en/search/ http://www.eltex.nsk.ru/en/support/knowledge/...
Need help?
Do you have a question about the ESR-100 and is the answer not in the manual?
Questions and answers