IPSEC Multi-Tunnel Backup Test Report
IPSEC Multi-Tunnel Backup Test Report
test report
Test Devices and Versions
MP 2900X
Software Version : 7.5.3.6.1(R)(integrity)
Software Image File : flash0: /flash/rp34-7.5.3.6.1(R).pck
Compiled : Jul 16 2019, 12:16:56
01 IPSEC multi-tunnel backup on
normal configuration
Test No. 01
Test Item IPSEC multi-tunnel backup on normal configuration
Test Sub-item
Test Topology
Test Steps 1. Set up the network environment as shown in the above figure.
2. The router uses g2 to connect PC;
3. Connect the console to the R1, and login in by putty or secureCRT
4. Keep ping 10.1.1.1 on the PC,and shut down the tunnel left.
5. Check if the PC can ping 10.1.1.1 through tunnel right successfully after a
few seconds.
Test Key configuration:
Environment Core router(MP1800X):
Data
crypto ike key 123456 any
crypto policy 1
flow host 10.1.1.1 host 5.5.5.5 ip tunnel left right
set reverse-route
R4(MP2900X):
crypto ike key 123456 address 12.1.1.1
crypto ike key 123456 address 13.1.1.1
crypto ike key 123456 identity CORE-ROUTER
crypto policy p1
flow host 5.5.5.5 host 10.1.1.1 ip tunnel left right
set reverse-route
Expected Result Normally, data is transferred through the tunnel left, and when the left fails, the
tunnel switches to right after a few seconds.
Remarks
Test Result
Before tunnel left break down:
Core router(MP1800X):
R1#sho crypto ike sa
policy name : 1
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
R4(MP2900X):
R4#show crypto ike sa
policy name : p1
f (src, dst, protocol, src port, dst port) : 5.5.5.5/32 10.1.1.1/32 ip any any
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
R4(MP2900X):
R4#show crypto ike sa
policy name : p1
f (src, dst, protocol, src port, dst port) : 5.5.5.5/32 10.1.1.1/32 ip any any
02 SLA
Test No. 02
Test Item SLA
Test Sub-
item
Test
Topology
Test Steps 1. Set up the network environment as shown in the above figure.
2. The router uses G0 to connect PC;
3. Connected the console to the R1, and login in by putty or secureCRT.
4. Configure the SLA on the 2900X router and 1800X router.
5. Keep ping 10.1.1.1 on the PC,and shut down the tunnel left.
6. Check if the PC can ping 10.1.1.1 through tunnel right successfully immediately.
Test Key configuration:
Environment Core router(MP1800X):
Data
crypto ike key 123456 any
encryption 3des
exit
esp 3des
exit
peer any
set local-id CORE-ROUTER
exit
peer any
exit
crypto policy 1
set reverse-route
set peer-track-aware
exit
R4(MP2900X):
crypto ike key 123456 address 12.1.1.1
crypto ike key 123456 address 13.1.1.1
crypto ike key 123456 identity CORE-ROUTER
crypto policy p1
flow host 5.5.5.5 host 10.1.1.1 ip tunnel left right
set reverse-route
set track-aware
exit
rtr enable
rtr 1 icmpecho
set 10.1.1.1 1 70 2 3 extend 24.1.1.4 0 TRUE FALSE
CreatedTime Fri Jul 26 15:21:38 2019
LatestModifiedTime Fri Jul 26 15:31:20 2019
exit
rtr group 1
member 1
exit
policy name : 1
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
0x71cc61c8 / 0x714abf98
R4(MP2900X):
R4#show crypto ike sa
policy name : p1
f (src, dst, protocol, src port, dst port) : 5.5.5.5/32 10.1.1.1/32 ip any any
policy name : 1
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
R4(MP2900X):
R4#show crypto ike sa
policy name : p1
f (src, dst, protocol, src port, dst port) : 5.5.5.5/32 10.1.1.1/32 ip any any
03 BFD
Test No. 03
Test Item BFD
Test Sub-item
Test Topology
Test Steps 1. Set up the network environment as shown in the above figure.
2. The router uses G0 to connect PC;
3. Connected the console to the R1, and login in by putty or secureCrt.
4. Configure the BFD on the 2900X router and 1800X router.
5. Keep ping 10.1.1.1 on the PC,and shut down the tunnel left.
6. Check if the PC can ping 10.1.1.1 through tunnel right successfully
immediately.
Test Key configuration:
Environment Core router(MP1800X):
Data
interface vlan1
exit
interface vlan2
exit
encryption 3des
exit
esp 3des
exit
peer any
peer any
exit
crypto policy 1
set reverse-route
set peer-track-aware
R4(MP2900X):
track 3
bfd dialer interface gigabitethernet0 remote-ip 12.1.1.1
logic operator AND
exit
crypto policy p1
flow host 5.5.5.5 host 10.1.1.1 ip tunnel left right
set reverse-route
set track-aware
exit
Expected Result Normally, data is transferred through the tunnel left, and when the left fails, the
tunnel switches to right immediately.
Remarks
Test Result
Before tunnel left break down:
Core router(MP1800X):
R1#sho crypto ike sa
policy name : 1
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
local tunnel endpoint : 12.1.1.1 remote tunnel endpoint : 24.1.1.4
R4(MP2900X):
R4#show crypto ike sa
policy name : p1
f (src, dst, protocol, src port, dst port) : 5.5.5.5/32 10.1.1.1/32 ip any any
policy name : 1
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
f (src, dst, protocol, src port, dst port) : 10.1.1.1/32 5.5.5.5/32 ip any any
R4(MP2900X):
R4#show crypto ike sa
policy name : p1
f (src, dst, protocol, src port, dst port) : 5.5.5.5/32 10.1.1.1/32 ip any any