Implementation of Dynamic Multipoint VPN
Implementation of Dynamic Multipoint VPN
TELECOMMUNICATIONS ENGINEERING
Supervised by
Lecturer
Submitted by
th
Engineering and approved as to its style and contents for the examination held on 09
July 2018.
Approved By-
Supervisor
Lecturer
i
Declaration
It is hereby declared that the work presented herein is genuine work done by us and has
not concurrently submitted in candidature for any degree. The result of this thesis that
we have found totally depend on our own investigation/work.
This work was done under the guidance of Abu Zafar Md. Imran, Lecturer of
Electronic and Telecommunications Engineering, International Islamic University
Chittagong.
ii
ii
i
Abstract
iii
Acknowledgement
In the name of Allah, the most Beneficent and the most Merciful
First of all we start by thanking Allah, the Almighty for bondless grace to keep
patience and sincerity of us to end up this thesis paper a successful one.
We would like to thank our supervisor Abu Zafar Md. Imran for his continuous
guidance and advice in order to be successfully finishing the entire thesis work. While
working, he has been a sincere mentor to do a quality research from the very
beginning. He kept us focused on our thesis and helped us improve the quality of our
thesis by giving invaluable feedback.
We would like to thank all faculty members and staff of the Department of Electronic
and Telecommunications Engineering, IIUC for their generous help in various ways
for the completion of this thesis.
An endeavor of this caliber required a lot of support and we would like to proudly
mention that our family kept their support for us all the way. We have to thank our
parents and families for being extremely supportive while we were doing this work.
iv
Table of Contents
Certificate of Approval i
Declaration ii
Abstract iii
Acknowledgement iv
Table of Contents v
List of Figures ix
Chapter1: Introduction 1
1.1 Background 1
1.2.1 Goal 3
1.2.2 Motivation 3
1.3 Objectives 3
2.1 Introduction 6
v
2.3 DMVPN in the view of enterprise 8
4.1.1 Costly 23
vi
Chapter 5: Simulation and simulator Parameter 28
5.2 Simulator 28
5.4.1 Latency 29
5.4.2 Throughput 30
vii
6.4.3 Hot stand-by routing protocols Interface Command 43
Chapter 8 : Conclusion 54
Reference 55
Appendix 57
viii
List of Figure
Figure 6.5 (a) Primary Router HSRP (b) Secondary Router HSRP 40
Figure 6.8 (a) Branch 2 two NHRP Profile (b) Branch 2 two NHRP Profile 42
ix
Figure 6.13 I/O Graph of Secondary Router Interface 46
x
List of Tables
xi
List of Abbreviation
AH Authentication Header
DV Distance Vector
IP Internet Protocol
LS Line State
xii
Chapter 1
INTRODUCTION
1.1 Introduction
In present days computer networks are necessary to operate the majority of companies
and institution. Which allows networks to provide different services, and access to
shares resources of connecting computers and related devices across departments and
workgroup network which are actually called Enterprises networks.
Current computer systems are required to work the greater part of organizations and
foundations. Essential systems administration conventions and components
don't protect against attacks (i.e. wiretapping, information change, and so forth.).
System security is a key issue on the grounds that destructive treatment in the system
develops. Security incorporates numerous angles which include: confirmed,
trustworthiness, non-disavowal, and classification. The creators chose to test the
privacy, in light of the fact that the information exchange between corporate
headquarters (HQ) and Remote Branch (RB) or business accomplices, clients or
contractual workers utilizing open systems (Internet). The issue of information
secrecy in an organization with numerous branches that are dynamic worldwide is
vital.
Enterprises are using the different technique to construct the safe network between
headquarter and many branches and corporate to carry out information, shares
resources data and applications. For secure communication, most of the company use
traditional leased line method to connect remote users and branches. But this method,
leased line is not cheap to plan and take a large amount of time and cost to install and
activate. Enterprise management is bigger and the branches are separate all over the
country. Enterprise, customer, employee are always enhance requested for security
transmission data and availability network. Many enterprise networks are using the
VPN technique to construct a safe enterprise network across the different region. But
IPsec VPN does not support route dynamically. A problem of the traditional VPN that
1
networking and expansion are underhand, maintenance and operation cost is hugely
expensive. [1]
The DMVPN network in this point of view of the author contains a certain number of
branches, DMVPN Headquarter is introduced by authoring the management station.
Transmission tunnel between the headquarter and the branches from a logical
structure of connection links the elementary function of links brokers is to provide
communication between network branches by informing branches about the tunnel
parameter. A tunnel between branches and headquarter dynamically on transmission
time only, so the logical structure is conditional to continuous modification. It is
occupied that branches can onwards demand about the parameter of tunnel command
other branches to one of the many knows servers system with tunnel broker
redundancy. There is a primary and secondary server (Hub) in the group of
Headquarter. In the fall of primary hub link down or cut the link the branches have
continuously communicated the Headquarter by secondary hub until the primary hub
are repaired.
2
1.2 Goal and Motivation
1.2.1 Goal
Using Dual Hub Dual DMVPN with HSRP protocol, reduce problem of
availability.
1.2.2 Motivation
Traditional VPN and Leased line method are costly and installed are huge time to
setup a enterprise network for business purpose, but DMVPN are more secure and
faster communication technology and remote access mechanism for safe and business
chain organization. Whenever organization demand to set up branches anywhere
DMVPN are fastest way to connected the center. And hot stand by routing protocols
are using the purpose of redundancy, by using HSRP protocols clients and customers
are satisfactory are using all time connection with their destination end.
1.3 Objective
To implement secure enterprise network based on Dual Hub Dual DMVPN ‘‘Hub
to spoke’’ ‘‘spoke to spoke’’ Network topology.
3
To Configure and simulate EIGRP Routing protocol with required simulator.
Design and configure DMVPN over IPsec to Ensure Data Integrity and
confidentiality.
Creates a distributed (NHRP) mapping database of all the spoke tunnels to real
(public interface) addresses. IPsec is triggered through “tunnel protection”. NHRP
triggers IPsec before installing new mappings. IPsec notifies NHRP when encryption
is ready. NHRP installs mappings, and sends registration if needed. NHRP and IPsec
notify each other when a mapping or service assurance is cleared.
Chapter 1: Introduction.
Chapter 5: simulation and simulator parameter, why simulation are need, overview of
graphical network simulation 3, short overview of wire shark, short overview of
resulting parameter.
Chapter 8: Conclusion
References
5
Chapter 2
Literature Review
2.1 Introduction
Enterprises by methods for VPN procure to a great degree safe network with arranging
execution qualities and network administration, required for remote branch workplaces
in substantial separations. The most up to date VPN arrangement is the standard of
Cisco Corporation – the Dynamic Multipoint VPN (DMVPN) [4]. It is an enhanced
VPN form in view of an arrangement on Cisco routers. The building up the procedure
of IPSec VPN burrows continue as before and standard decided, just the
Arrangement was changed. Remote branch workplaces (spokes) have the lasting IPSec
passage to headquarter, yet not to alternate spokes.
6
2.2 Background OF DMVPN
With the goal for building large IPsec networks interconnecting their sites across the
Internet, we should have the capacity to scale the IPsec network. IPsec encrypts activity
between two endpoints (peers), and the encryption is finished by the two endpoints
utilizing a shared "secret". Since this secret is shared just between these two endpoints,
encrypted networks are intrinsically an accumulation of point-to-point links. Along
these lines, IPsec is inherently a point-to-point tunnel network. The most achievable
technique to scale an expansive point-to-point network is to compose it into a hub-and-
spoke or full (partial) mesh network. In many networks, most of the IP movement is
between the spokes and the hub, and next to no is between the spokes, so the hub and
spoke configuration is regularly the best decision. This outline likewise coordinates
with more seasoned Frame Relay systems since it was restrictively costly to pay for
joins between all sites in these networks. The last are enrolled as clients in NHRP (Next
Hop Resolution Protocol) server. When talking is expected to send the bundle to other
subnet work spoke, it makes a demand to the NHRP server no real (external) route
address. The dynamic IPsec tunnel is built up in such a way. Spoke-to-spoke tunnel is
acknowledged by methods for the mGRE interface.
When utilizing the Internet as the interconnection between the hub and spokes, the
spokes likewise have direct access to each other with no extra cost, however, it has been
extremely troublesome, if certainly feasible, to set up as well as deal with a full (partial)
7
mesh network. Full or partial network systems are frequently alluring on the grounds
that there can be taken a toll investment funds if addressed talked activity can go
straightforwardly through rather than by means of the hub. Addressed spoke-to-spoke
traffic navigating the hub utilizes hub assets and can cause additional deferrals,
particularly when utilizing IPSec encryption since the hub should unscramble the
approaching bundles from the sending spokes and after that re-encrypt the movement
to send it to the accepting spoke. Another illustration where guide spoke-to-spoke
movement would be helpful is where two spokes are in a similar city and the hub is the
across the country.
The Dynamic Multipoint VPN (DMVPN) technology is utilized for scaling IPsec VPN
arranges by offering a huge scale IPSec VPN sending model that enables the system to
grow and understand its maximum capacity. DMVPN offers adaptability that empowers
zero-contact sending models [5]. A DMVPN cloud is a gathering of switches that is
arranged either with a multipoint GRE (mGRE) interface or point-to-point (p2p) GRE
interface (or mix of the two) that offer a similar address subnet. High accessibility is
given using a second center point router, which might be on the same DMVPN subnet
as the essential switch. This is normally alluded to as a single DMVPN cloud topology.
The second center router can likewise serve its own DMVPN subnet, which is known
as a double DMVPN cloud topology [4]. A double center single DMVPN topology is
by and large not suggested on the grounds that it depends on systems outside of the
passage to decide the suitable center for failover. Interestingly, head closes utilizing
double DMVPN subnets (double DMVPN cloud topology) depend on steering
conventions running within the passage to decide way choice.
Three principle issues have been recognized in the current writing in connection to
spine organize security, in particular: information encryption, information detachment
and dynamic routing sections transmission. To address these issues examines on
security conventions and advancements have been completed, concentrating on VPN,
IPSEC and DMVPN and the part they play in information segregation, information
encryption and routing information transmission separately.
8
2.3.1 HUB – Spoke topology for enterprise
To ensure the privacy of information transmission and routing data, each site arranges
two protocols: IPSEC what's more, DMVPN. This structure is known as a plan of
DMVPN over IPSEC. While IPSec is utilized to scramble information from the third
layer of the TCP/IP demonstrate [7], DMVPN is utilized to assemble multipoint GRE
(Generic Routing Encapsulation) tunnels to exchange dynamic directing data. With a
specific end goal to ensure data integrity and confidentiality, AH (authentication
header) and ESP (encapsulating security payload) are separately determined as IPSEC's
essential structures .With respect to DMVPN,
It fuses the upsides of GRE into NHRP (Next Hop Resolution Protocol), being, in this
way, an exceedingly versatile VPN .Since in this structure the inner network asks for
the ISP to convey the steering data of the private network scramble it, the ISP needs to
9
utilize DMVPN over IPSEC to change the IP header from communicate into unicast.
In the door, the device is designed with the goal that one virtual GRE tunnel can carry
interior activity, with all information embodied in the GRE tunnel before being
transmitted to the Web. Amid this procedure, to every bundle is included a GRE header
which changes either communicate or multicast parcel into a unicast. As Fig. 2.1
depicts, GRE utilizes an indistinguishable connection from IPSEC. An IPSEC header
is connected to scramble all GRE information, however, is unequipped for evolving the
physical IP address since the IPSEC needs a settled IP to deliver to make the IPSEC
tunnel. In this way, when DMVPN works with IPSEC the IP address of the GRE tunnel
is perpetual. [6]
Fit for adjusting for this inadequacy as it is a remote get to VPN, which expands
versatility and adaptability while diminishing arrangement unpredictability. One of its
exceptional preferences is its fittingness for a condition in which dynamic address
customers convey with a settled focal site. EZVPN embraces a customer server design,
whereby the essential components incorporate EZVPN Remote and EZVPN Server.[7]
Dynamic routing protocols are "capable" for the making of routing tables and
supporting their content [9]. The router trade data between themselves about network
topology by methods for the tables made, and they examine information and
characterize the ideal course for information transmission. Important normal for routing
protocol is its capacity to identify of network blames and reestablish network data.
EIGRP depends on separate vector and line state calculations. This routing protocol
empowers to consider the real-time network changes, e.g. packet delay value, paths
bandwidth, when it chooses the route. RIP characterizes the rundown of attributes that
are proposed for better execution dependability when the topology of organize is
precarious, and it permits a most extreme 15 travels. OSPF is the line state calculation,
and it varies from RIP and IGRP that is the routing protocols, in light of the separation
vector. OSPF employments extra attribute, i.e. measure up to costs, multipath routing
and the larger amount of routing, and it relies upon the solicitations of the type of
service (TOS).
11
Table 2.1 Routing Protocol for DMVPN
12
2.4.1 Routing Protocol Authentication
Authentication Methods
B. MD5authentication
The plain text authentication [10] [11] process follows a procedure that can generally
be summarized as follows:
Step 1: A routing update is sent starting with one router then onto the next. That routing
update incorporates a key (that is, a secret word) and a key number since some routing
protocols bolster the arrangement of different keys. Note that if a routing protocol does
not bolster different keys, the key number related with a routing refresh is 0.
Step 2: A neighboring router gets the routing update. That router decides if the got key
matches its arranged key (with a coordinating key number).
Step 3: On the off chance that the neighboring router discovers that the keys coordinate,
it acknowledges the routing update. Notwithstanding, the routing update is rejected if
the keys don't coordinate.
13
MD5 Authentication
The MD5 authentication process follows a procedure that can generally be summarized
as follows:
Step 2: The neighboring router gets the refresh and runs an MD5 calculation on the
routing update joined with its privately arranged key, which brings about a message
process.
Step 3: On the off chance that the privately designed message process coordinates the
got message process, the getting router acknowledges the parcel. In the event that the
freely figured message process esteems don't coordinate, the update is rejected.
The Hot Standby Router Protocol (HSRP), gives a component which is intended to help
non-problematic failover of IP activity in specific conditions. Specifically, the protocols
secure against the disappointment of the principal hop router at the point when the
source have can't take in the IP address of the first hop router progressively. The
convention is intended for use over multi-get to, multicast or communicates competent
LANs (e.g., Ethernet).HSRP isn't proposed as a swap for existing dynamic router
discovery mechanisms and those protocols ought to be utilized rather at whatever point
conceivable. Extensive classes of inheritance have users that don't bolster dynamic
revelation is equipped for designing a default router. HSRP gives failover
administrations to those hosts. The greater part of the switches taking an interest in
HSRP is thought to run IP routing protocols and have a reliable arrangement of courses.
The talk of which protocols are proper and in the case of routing is reliable is past the
extent of this determination. Utilizing HSRP, an arrangement of routers work in the
show to display the fantasy of a solitary virtual router to the hosts on the LAN. This set
is known as an HSRP group or a standby group. A single router chose from the group
is in charge of sending the parcels that hosts send to the virtual routers. This switch is
14
known as the active router. Another router is chosen as the standby router. If the active
router comes up short, the standby accepts the parcel sending obligations of the routers
may run HSRP, just the active router advances the bundles sent to the virtual router. T o
limit organize a movement, just the active and the standby routers send occasional
HSRP messages once the convention has finished the decision procedure. On the off
chance that the active routers come up short, the standby routers assume control as the
active routers. On the off chance that the backup switch falls flat or turns into the active
routers another router is chosen as the standby router. [12]
• Active Router - The router that is currently forwarding packets for the virtual router.
• Standby Group - The set of routers participating in HSRP that jointly emulate a virtual
router.
15
Chapter 3
DMVPN Technologies
Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software answer for building
adaptable IPsec Virtual Private Networks (VPNs). Cisco DMVPN utilizes an
incorporated design to give simpler usage and administration to organizations that
require granular access controls for various client networks, including portable
specialists, remote workers, and extranet clients.
Dynamic Multipoint VPN (DMVPN) is a blend of GRE, NHRP, and IPsec. NHRP
empowers the associates to have dynamic areas with GRE/IPsec tunnels spine is a
center and talked topology empowers control tended to talk tunneling by means of
auto leveling to an inadequate squash. Dynamic Multipoint burrowing kind of a
virtual private system (VPN) maintained on Cisco IOS based switches, Hawaii AR
G3 switches, and USG firewalls, on a Unix-like working structure.
Cisco DMVPN permits branch areas to discuss straightforwardly with each other over
the general population WAN or Internet, for example, when utilizing voice over IP
(VOIP) between two branch workplaces yet doesn't require a lasting VPN association
between locales. It empowers zero-contact sending of IPsec VPNs and enhances
organize execution by lessening dormancy and jitter while advancing head office
transfer speed use.
16
Figure 3.1 A DMVPN Topology. [16]
DMVPN based on four proven technologies. The four technologies are discussed
below.
NHRP gives a mapping between within and outside address of a passage endpoint.
These mappings can be static or dynamic. In a dynamic situation, a next-hop server
(NHS) is utilized to keep up a rundown of conceivable passage endpoints. Every
endpoint utilizing the NHS enrolls its own public and private mapping with the NHS.
The neighborhood mapping of the NHS should dependably be static. Note that the
branch focuses to within or secured address of the NHS server. The NHRP hold time
is utilized to decide to what extent adjoining routers ought to consider the reserved
passage of this device to be legitimate.
17
The designed esteem is passed to the remote spoke when the addressed spoke-to-
spoke session is started. The remote spoke begins a commencement clock. At the
point when this clock terminates, the remote router evacuates the reserved section to
the neighborhood router. On the off chance that movement is as yet streaming, the
remote router must demand the mapping from the NHS server once more. spoke
routers may have diverse hold times, despite the fact that this training isn't normal. On
the off chance that two spokes are in session, and one clock lapses before the other,
the spoke tells the adjoining talked that NHRP reserve passage ought to be matured
out. Every device additionally evacuates the addressed spoke-to-spoke encryption
session. [1] [2]
At the point when a branch router is first settled onto a DMVPN network, it enlists its
IP address with the head end router whose IP address is as of now pre-configured on
the branch router. This enrollment enables the mGRE interface on the head end router
to construct a dynamic tunnel back to the enlisting branch router without knowing the
branch tunnel destination through a CLI arrangement.
NHRP maps a tunnel IP deliver to an NBMA IP address. NHRP advises the mGRE
interface where to tunnel a packet to achieve a specific address. At the point when the
bundle is encapsulated in the mGRE packet, the IP destination address is the NBMA
address. Figure 1.1 demonstrates a case of NHRP and mGRE tunneling. [3] [4]
18
Figure 3.2 NHRP and mGRE addressing [13].
The setup of mGRE enables a tunnel to have numerous destinations. The setup of
mGRE on one side of a tunnel does not have any connection to the tunnel properties
that may exist at the leave points. This implies a mGRE tunnel on the center point
(hub) may be connected with a point-to-point tunnel on the branch. Alternately, a
point-to-point GRE tunnel may interface with mGRE tunnel. The recognizing feature
between mGRE interface and a point-to-point GRE interface is the tunnel destination.
An mGRE interface does not have a configured destination. Rather, the GRE burrow
is configured with the command tunnel mode GRE multipoint. This charge is utilized
rather than the tunnel destination found with shared GRE tunnels.
19
Figure 3.3 GRE packet formatting [6].
Other than taking into consideration various goals, an mGRE tunnel requires NHRP
to determine the tunnel endpoints. The protocol header for an mGRE packet is four
bytes bigger than a point-to-point GRE packet. The extra four bytes constitute a
passage key esteem, which is used to separate between various mGRE interfaces in a
similar router.
Without a tunnel key, routers can bolster just a single mGRE interface relating to one
IP network. Tunnel keys enable a branch router to have an alternate mGRE interface
relating to each DMVPN cloud in the network topology. A head end router can be
designed too with two mGRE interfaces indicating each DMVPN cloud for high
accessibility and repetition. [5] [6]
This outline suggests the utilization of a dynamic routing protocol to spread routes
from the head end to the branch workplaces. Utilizing a routing protocol has a few
focal points over the present components in IPsec Direct Encapsulation alone.
In a VPN, routing protocols give a similar level of advantages when contrasted with a
customary network, which incorporates the accompanying
20
A few routing protocols can be utilized as a part of a DMVPN configuration,
including EIGRP, OSPF, RIPv2, and ODR (DMVPN hub-and-spoke as it were).
Outlines displayed in this plan control utilize EIGRP as the routing protocol, in light
of the fact that EIGRP was utilized amid the adaptability testing. EIGRP is prescribed
as the dynamic routing protocol due to its protection of switch CPU cycles and
network data transfer capacity, and additionally its bandwidth. EIGRP likewise gives
a scope of choices to address outline and default route propagation. Other routing
protocols, for example, OSPF have additionally been confirmed, however, are not
talked about in extraordinary detail. ODR can't be utilized as a part of the addressed
spoke-to-spoke network show on the grounds that ODR does not bolster split
tunneling. Routing protocols increment the CPU use on a network gadget, so this
effect must be considered when measuring those devices. [7]
In 2007 Cisco Systems are described the dynamic routing protocols and their network
type, route control, and converge in DMVPN overview guide.
But the EIGRP dynamic routing protocols are best to route control and converge are
very faster than other dynamic routing protocols. The table show in 3.1 the Dynamic
routing protocols controls used in DMVPN technologies to reliably routing the
information and faster communication way to design enterprises.
21
The description are arranged in Table 3.1
22
Chapter 4
As useful as it may be, a VPN is not fail-proof. Therefore, let’s take a look at VPN
disadvantages as well:
4.1.1 Costly
Traditional VPN are costly to set up n the purpose of organization basis.we may
subscribe in to a free Virtual Private Network, however for security reasons, you
might need to decide on a paid month to month membership. Consider the
accompanying – no online administration is really "free", which may imply that a
complimentary VPN may accompany a concealed reward – i.e. it may pitch
information from company online action to advertisement suppliers, among other
terrible amazements and set up it to very huge amount of cost.
4.1.2 Poor connection
That is to say that a VPN, by encrypting all your network traffic for anonymity
reasons, usually takes a lot of resources which means that it might become annoyingly
slow. It isn’t always the case though, but for good speed connection, we may have to
operation for a paid VPN or extra speedy method.
4.1.3 Not Reliable
To develop past focuses, you ought to be additionally mindful of the way that VPN
IPs aren't one of a kind, yet shared by different individuals, which may prompt a few
offensive situations, for example, IP address boycotting and IP caricaturing, to give
some examples. Along these lines, it is vital to buy in just respectable, dependable
VPNs that you've looked into completely previously.
4.1.4 More Complex
To develop past focuses, you ought to be additionally mindful of the way that VPN
IPs aren't special, however shared by different individuals, which may prompt a few
disagreeable situations, for example, IP address boycotting and IP satirizing, to give
some examples. In this way, it is critical to buy in just legitimate, dependable VPNs
that you've inquired about altogether heretofore.
23
4.2 Administrative Fault
The usage of VPN technique can easily expand administration and application
capacity of big business organize from LAN to open system. The system assets of big
business central station and branches can be connected in wellbeing and not be
limited by zone. And after that, endeavor can spare to the costly lease for the
exceptional line. It is a sort of situation that is more financial and adaptable to execute
association of various system assets. Passages in VPN are actualized utilizing
Tunneling conventions. Tunneling conventions are partitioned into layer 2 burrowing
conventions and layer 3 Tunneling conventions relying upon at which layer of OSI
display burrow is actualized. The current VPN arrangements regularly utilize
nonspecific directing epitome (GRE) or multiprotocol name exchanging/fringe
entryway convention (MPLS/BGP), and the VPNs developed by utilizing either
innovation experience the ill effects of the accompanying downsides:
3) GRE can't cross NAT (Network Address Translation) passages. VPNs set up
utilizing early forms of IPsec (IP Security) does not bolster NAT traversal either.
NAT traversal is executed by embodying IPsec parcels in UDP bundles now.
5) Layer 2 burrowing convention (L2TP) and GRE don't scramble the transmitted
parcels. Though, IPsec gives the most secure assurance to bundles sent crosswise over
IPsec VPNs.
6) IPsec VPN does not bolster dynamical courses. VPN burrows that are set up
utilizing GRE and L2TP are interface based, though those that are built up utilizing
IPsec are flow based.
Different kinds of tunneling protocols can be used for the VPN implementation that
gives secure correspondence condition like devoted communication network.
However, choosing legitimate VPN arrangements as indicated by hierarchical
application necessities are not expressly characterized. To execute site to site secure
communication, the expansion of an association's intranet and extranet idea is applied.
To interface remote client with focal office or branch office, the remote access VPN
tunneling techniques are used. The basic VPN application situations are
communication with branch office, business accomplice or provider's networks and in
addition remote clients. To simulate the actual network condition one site to site and
one remote access VPN has been executed in GNS3 which is depicted in the
accompanying area. The simulation condition of GRE is one correspondence end has
a few systems and other site has another three systems. Configuring the GRE tunnel
includes making a tunnel interface which is a consistent interface. To configure the
tunnel source and destination, issue the tunnel source and tunnel destination
commands under the interface configuration mode for the tunnel. The IPsec tunneling
protocol is implemented in a same network topology of the GRE. The Site-to-Site
IPsec VPN tunnel configuration can be separated into two stage, for example, Phase
1, Phase 2. In ISAKMP Phase 1, the encryption technique (3DES), the authentication
method (Pre share), the hashing algorithm (MD5) are used for make first tunnel. In
Phase 2, distinct sorts of task, for example creation broadened ACL, creation IPsec
Transform, creation Crypto Map and applying crypto map to public in general
interface are happened. In this implementation just N 1 network of one end and N4
network of opposite end use IPsec tunnel for secure communication that means
25
different network get to is denied using access control list. The PPTP is a remote
access VPN tunneling protocol that creates private virtual point to point connection.
This is generally implemented between a server and a client where the server having a
place with the undertaking system and the customer being a remote workstation.
Cisco routers can be set up to go about as PPTP servers, on the other hand known as
Virtual Private Dialup Network (VPDN) servers. In this reenactment, cloud is utilized
as home client that utilizations windows 7 and router 1 goes about as a PPTP server.
In remote access PPTP, remote client gets to its focal office through open system by
means of PPTP server safely. The L2TP is another exceptionally secure remote access
tunneling convention that conveys layer 2 traffics that joined with IPsec. To arrange
L2TP over IPsec, first we designed IPsec transport mode to empower IPsec with
L2TP. At that point we arranged L2TP with a Virtual Private Dial-up Network VPDN
gathering. The setup of L2TP with IPsec bolsters endorsements utilizing the pre-
shared keys. The L2TP with IPsec is executed in same system topology as PPTP
utilizing same systems administration gadgets. [5][11]
26
NHRP server. When spoke router comes to online, it automatically registers relational
information with the hub router according to the external net public IP address of hub
router and NHRP protocol. So, the problems are solved that branch node uses
dynamic IP address and NAT.
3) When need to add a new node, there is needless for modifying the configuration on
the hub and spoke routers, so that maintenance and expansion of network become
better. In the DMVPN solution, the tunnels from spoke router to hub router stay up
continuously since they create, and spoke routers don’t need configuration for direct
tunnels to any of the other spoke routers. By a simple configuration on the router
(spoke router) which is newer added to the node, it can automatically register with
hub router. At the same time, the hub router acts as the NHRP server and handles the
NHRP request of the source spoke router, provides the public net address of the
target spoke router to source spoke router. Thereby, the two spoke routers then
dynamically create an IPsec tunnel between them (via the mGRE interface) and data
can be directly transferred. This dynamic tunnel from spoke router to spoke router
will be automatically torn down after a configurable period of inactivity. In this way,
the configuration on spoke router is simplified, the costs of setting up network and
maintenance are reduced. And then, all other spoke routers can learn this new route
through dynamic routing protocol and dynamic route, the new added spoke router can
also learn the information of routing which reaches all other routers. So, maintenance
and expansion of network become better.
4) How to support dynamic route, in order to ensure the haleness and reliability of
network operation. Although IPsec tunnel can’t support encapsulation of IP
multicast/broadcast packets, GRE tunnel can encapsulate multicast/broadcast packets
into GRE packets. And GRE packets are unicast packets, so they can be encrypted by
IPsec. We implement multicast or broadcast by using GRE tunnel and the encryption
of data packets by using IPsec. In this way, we can run dynamic routing protocols
over mGRE tunnels, such as EIGRP, OSPF, RIP and so on. We update routing table
on the routers of two endpoints on encrypted tunnels by using dynamic routing
protocols. In this way, while network of either endpoint on tunnel changes, the other
endpoint can dynamically learn this changing, and keep the connectivity of network,
but needn’t modify the configuration on routers. Thereby, the haleness and reliability
of network operation are ensured.
27
Chapter 5
5.1 Simulation
Simulation is defined as the process of creating a model of an existing or proposed
system in order to identify and understand their functioning. We can predict the
estimation and assumption of the real system by using simulation results.
5.2 Simulator
Wire shark is a network packet analyzer. A network packet analyzer will try to
capture network packets and tries to display that packet data as detailed as possible.
You could think of a network packet analyzer as a measuring device used to examine
what’s going on inside a network cable, just like a voltmeter is used by an electrician
to examine what’s going on inside an electric cable (but at a higher level, of
course).In the past, such tools were either very expensive, proprietary, or both.
However, with the advent of Wire shark, all that has changed.
28
5.3 Design and Analysis inGNS3
When implementing a real model of the system in the GNS3, some steps are to be
followed to design on simulator. Following steps are needed to work with GNS3.
These are —
Loading Cisco
ISO Image
Analysis Network
Result Design
Applying
Run Simulator
Cisco Comand
5.4.1 Latency
Latency is a networking term to describe the total time it takes a data packet to travel
from one node to another. In other contexts, when a data packet is transmitted and
returned back to its source, the total time for the round trip is known as latency.
Latency refers to time interval or delay when a system component is waiting for
another system component to do something. This duration of time is called latency.
Latency = delay. It’s the amount of delay (or time) it takes to send information from
one point to the next. Latency is usually measured in milliseconds or ms. It’s also
referred to (during speed tests) as a ping rate.
29
5.4.2 Throughput
Throughput is the maximum rate of production or the most extreme rate at which
something can be processed. When used in the context of communication networks,
such as Ethernet or packet radio, throughput or network throughput is the rate of
Successful message delivery over a communication channel. The data these messages
belong to may be delivered over a physical or logical link, or it can pass through a
certain network node. Similarly, for network communications, throughput is measured
by calculating the amount of data transferred between locations during a specified
period, generally resulting as bits per second (bps), which has evolved to bytes per
second (Bps), kilobytes per second (Kbps), megabytes per second (Mbps) and
gigabytes per second (Gbps) .
30
Computer processes may depend on queues, which determine how or when a request
for service is handled. The queuing process may have a significant influence on the
response time.
31
Chapter 6
32
Using HSRP Protocols the failure routers are mainly overcome by priority
based secondary routers, an enterprise should be always considered first the
availability of network resources, if the availability of a network does not occur then
it hampers all branches as well as whole enterprises networks. So that using the
secondary router in Headquarter premises the failure of primary router are being
solved.
33
protocol (HSRP) is the best way to getting 100 percent network uptime. one active
router is always forwarding data between Clients (Branch) and Server(HQ), they use
to communicate in every different via in this path, there was another router in standby
mode when statistics are begin sent every time secondary router which is standby
mode are obtained an acknowledgement from major router which is active router,
when the link of active router is down the secondary router did now not get
acknowledgement and the secondary router are then online mode and records are
communicated through this till the essential router are repair.
In DMVPN mechanism during this topology firstly all the branches are
connected to the headquarters router (HUB) through static tunnel and Branches are
connected one another through dynamically in one subnet network.
Branch router that is named spoke router as associate NHRP client sends
requests packet for a resolve to headquarter router that acts as an NHRP server
whereas it's on-line, requests for the non- broadcast multi-access (NBMA) address of
next hop tunnel IP address mapping.
The Headquarter Hub which is NHRP server will solve the NBMA address for
mapping and reply the resolution request which is sent by Branch (client).
When Spoke router sent a request for registration to an NHS (NHRP Server) to
inform the HUB router NHS for NBMA information, all client next hop information
is to be cached at the NHS.
The registration request information is principally included: original address of
VPN tunnel, router IP address which is external net address, company router internal
net interface IP address, target NHS server IP address.
If the requests for registration information received by NHS server, it will select
the tunnel source address and net address taken to information and verify it with
address information in the NHS MAP table. If the two address is already on the table,
NHS updates it, and confirm that it is no expiry. If not on the table, NHS newly add
them in MAP table with their tunnel source address, subnet address and mask.
In this way, the headquarter router (HUB) get all the related information such
crypto maps, crypto ACL, GRE tunnel interface of each branch router (Spoke) with
the requested information of registration and save it to the NHRP database.[4]
34
HUB router which is NHS server sent an NHRP registration reply with a
substance to contain: NHS server address, NBMA subnet address and NBMA address
to a client in reply to that client's NHRP registration request.
NHS sent a reply to request registration on NHC (NHRP clients which are
Spoke router) so that NHC are deleting the previous cache information, and update
own NHRP registration information on NHRP map table.
Above all step, we can see that the resolution of NHRP has occurred between
Headquarter router (HUB router) which is NHS (NHRP server) and the all Branches
router (spoke router) which is NHC (NHRP client), NHS uses a public static IP
address so that all NHC find out the NHS whether NHC uses the private dynamic IP
address or static address inside NAT. As a result, the problem of the NAT is being
solved, and because of configuration is simple the Headquarter router need not
configure all the time whenever branch added or cut using the Hot standby routing
protocols between two Headquarter HUB router the failure time of NHS are being
solved. In the sign of the previous scheme and implementation mechanism, we
simulate a practical mechanism implementation of DMVPN technology with HSRP
protocols for secure enterprise network in some organization.
35
to the internet, and branches have their clients with same network LAN.
Whole topology is designed in GNS3 software, whole interface command with picture
are arranged step by step. For better to understand we divided the whole topology in
two part that is
36
Figure 6.2: Headquarter End Topology
The network topology that is shown in above is configured using the command
Cryptographic, GRE tunnel, NHRP profile, and Routing Protocols in GNS3
(Graphical Network Simulator 3
6.3.2 A Interface setting command of IPsec Profile for Headquarter End
To setup every interface with their necessary Cryptography Profile we have used
following command:
(a)
37
(b)
Figure 6.3: (a) Primary Router IPsec Profile Setting Command (b) Secondary Router
IPsec profile
(a)
38
(b)
Figure 6.3: (a) Primary Router IPsec Profile Setting Command (b) Secondary Router
IPsec profile
(a)
(b)
Figure 6.5: (a) Primary Router HSRP (b) Secondary Router HSRP
39
6.4 Branches End Topology
Every Branches connected to their interested Internet service provider router which is
gateway to reach the headquarter destination. The end of branches topology is
showing below, the branches are connected to ISP through serial cable.
The network topology that is shown in above is configured using the command
Cryptographic , GRE tunnel, NHRP profile ,and Routing Protocols for Branches end
in GNS3 (Graphical Network Simulator 3)
To setup every interface with their necessary Cryptography Profile we have used
following command in two branches:
40
(a)
(b)
Figure 6.7 (a) Branch 1 IPsec Profile (b) Branch 2 IPsec Profile
41
(a)
(b)
Figure 6.8 (a) Branch 1 two NHRP Profile (b) Branch 2 two NHRP Profile
42
router number one is primary mode means active router and router number two is
secondary router.
(a)
(b)
Figure 6.9: (a) Primary Router HSRP (b) Secondary Router HSRP
43
After configure all the interface and all other IPsec NHRP and dynamic routing
protocols, we ping from branch one to Primary Router in 1000 time, the figure is
given below:
In figure 6.10 we see the result when we ping or send 100-byte ICMP Echo from
branch one to primary router in 1000 times the result out came that delay or round-trip
time minimum is 4 ms and the maximum rate is 120ms and average time is 59ms.
When the packet is communicated to primary between branches 1 we capture the I/O
graph of their interface link. The picture of I/O graph are given below in figure 6.11
44
Figure 6.11: I/O Graph of Primary Router Interface
In figure 6.12 we see the result when we ping or send 100-byte ICMP Echo from
branch one to Secondary router in 1000 times when the primary router is down or link
45
destroyed the result out came that delay or round-trip time minimum is 8 ms and the
maximum rate is 180ms and average time is 66ms.
46
Chapter 7
Result Analysis
In this Table we show that the average throughput result of branches and primary,
secondary router. In this it is prove that when we use primary router the throughput
are closer than if the secondary are in active mode that means primary link cut down.
The clients of branches still get touched of headquarter if the primary link down and
the throughput are well good to communicate.
47
Figure 7.1: Throughput Graph
In graph 7.1 show that the throughput of two major router, the primary router
throughput is good for better use branches to communicate each other and if the
primary router link is digester or hampered, branches communicated by secondary
router the throughput of that time is also closer to primary router, so that if the
primary router is offline the branches are communicated each other thought secondary
router without any delay.
48
In this Table we show that the average response time result of branches and
primary, secondary router. In this it is prove that when we use primary router the
response time are closer than if the secondary are in active mode that means
primary link cut down. The clients of branches still get touched of headquarter if
the primary link down and the response time are well good to communicate.
49
Test Type of service Location of Throughput( megabits Response Time ( Measur
Time Station per second, Mbps) Second ) ed Time
(second
)
50
7.4 Crypto ESP format analysis
When we sent packet from branch 1 to primary router then the packet are send crypto
format and format result are capture by wire shark, figure is given below.
In this figure we show that when branch 1 pc ping ICMP Echo 1000 packet then
whole format are packed Encapsulating security payload format and its show in wire
shark software.
In Next figure we show that when we sent packet from branch 1 to primary router
then the packet are send crypto format and format result are capture by wire shark,
figure is given below.
51
Figure 7.3: Crypto ESP format of Branch 2 to Primary router
In this figure we show that when branch 1 pc ping ICMP Echo 1000 packet then
whole format are packed Encapsulating security payload format and its show in wire
shark software.
When Branch are communicated the other branches of their subnet network then
packet are also send by ESP format but first it knock the primary hub and find the
related destination subnet then packet are Capsulated by security payload. The figure
are shown below
In figure7.4 it show that Packet are sent By Encapsulated security payload (ESP)
Format. Packet are first knock NHS(Next Hop Server) and finding Destination path
thought NHRP Table and then connect a Dynamic Tunnel between Branch to
Branch.
52
\
53
In figure Primary router are known as standby router. When primary link down
Standby router are automatically activated by HSRP protocols. And its follow
Dynamic EIGRP Protocols to send packets.
54
Chapter 8
Conclusion
8.1 Conclusion
This Thesis studies and examinations the current issue for VPN rented line strategy
and rule of DMVPN and HSRP system. In light of this, to go for the interest for big
business developing the protected and unequaled accessible system, it advances the
arrangement and usage component and really approves of the plan and execution
instrument through a real application in an enterprise and corporate association.
That scheme gives us a sort of a way which is sheltered, effective flexible, and
temperate to construct safe enterprise network, not just the issues are understood in
course of big business advancement, for example, increment of branch expedites
network building, how to reduce the expenses of building and upkeep and in addition
the system interface digester solution, and so on yet, in addition, gives venture valid
security to acknowledge offer of assets. It can be predicted, alongside individuals
progressively improve the necessity for secure transmission of information, the
DMVPN with HSRP procedure will apply to more broad fields, and bring into play
increasingly important function.
In future, we will develop a network topology model which will provide faster data
and reliable communication.
55
References
[2] Gebere Akele Tizazu , Ki-Hyung Kim , Abraham Belay Berhe ,”Dynamic
Routing Influence On Secure Enterprises Networks Based On DMVPN,” Ninth
International Conference 2017 on. Ubiquitous and Future Networks (ICUFN), Milan,
Italy, July 2017.
[6] Dynamic Multipoint VPN (DMVPN) Design Guide (Version 1.1). Cisco
validated design, July 10,2008
[8] S. Jing, Z. Zheng, R. Sun, “The application research of campus network remote
access solution based on redundant architecture,” in Future Communication,
Information and Computer Science, 2015, pp. 135-137. CRC Press.
56
[10] LI Xiaohua, ZHAO Xiangang, XU Jian, YAO Shan, WANG Huaiwei and
ZHANG Yan, "Simulation and analysis of RIPv2 routing authentication based on
GNS", International Conference on Automatic Control and Artificial Intelligence,
pp. 1842-1845, 2012.
[11] Xiaohua Li a, Renlong Zhang, Yujie Wang, Li Yang, Juan Nie and
Quanyue Yang,―GNS-
basedSimulationandAnalysisofOSPFv2NeighborAuthentication‖, School of
Computer and Information Engineering, Beijing University ofAgriculture,
Beijing, China, vol. 989-994, pp.4603-4607, May2014.
57
Appendix
R1#conf t
R1(config)#interface s1/0
R1(config)# no shutdown
R1(config)# no shutdown
R1(config)#authentication pre-share
R1(config)# group 2
58
R1(config)#mode transport
R1(config)#exit
R1(config)#interface Tunnel 0
R1(config)#no ip re-direct
R1(config)#tunnel key 1
59
R1(config)# network 101.1.1.100 0.0.0.255
R1(config-router)#no auto-summary
R1(config-router)#sh run
Building configuration...
[OK]
For Router R2 :
R2#conf t
R2(config)#interface s1/0
R2(config)#no shutdown
R2(config)#interface f0/0
R2(config)#no shutdown
R2(config)#authentication pre-share
R2(config)# group 2
60
R2(config)# set security-association life time second 120
R2(config)#mode transport
R2(config)#exit
R2(config)#interface Tunnel 1
R2(config)#no ip re-direct
R2(config)#tunnel key 2
R2(config)#interface f0/0
R2(config)#standby 1 ip 192.168.100.254
R2(config)#standby 1 preempt
61
R2(config)# router eigrp 100
R2(config-router)#no auto-summary
R2(config-router)#sh run
Building configuration...
[OK]
R4(config)#interface s1/0
R4(config)#no shutdown
R4(config)#authentication pre-share
R4(config)# group 2
62
R4(config)#mode transport
R4(config)#exit
R4(config)#interface tunnel0
R4(config)#no ip re-direct
R4(config)#ip my 1400
R4(config)#ip network-id 1
R4(config)#tunnel key 1
R4(config)#interface tunnel1
R4(config)#no ip re-direct
R4(config)#ip my 1400
63
R4(config)#ip nhrp multicast 102.1.1.100
R4(config)#ip network-id 2
R4(config)#tunnel key 2
R4(config)#no auto-summary
R4(config)# sh run
Building configuration...
[OK]
R5(config)#interface s1/0
R5(config)#no shutdown
64
R5(config)#encryption aes 192
R5(config)#authentication pre-share
R5(config)# group 2
R5(config)#mode transport
R5(config)#exit
R5(config)#interface tunnel0
R5(config)#no ip re-direct
R5(config)#ip my 1400
R5(config)#ip network-id 1
65
R5(config)#tunnel key 1
R5(config)#interface tunnel1
R5(config)#no ip re-direct
R5(config)#ip my 1400
R5(config)#ip network-id 2
R5(config)#tunnel key 2
R5(config)#no auto-summary
R5(config)# sh run
66
Building configuration...
[OK]
67