+ All Categories
Home > Documents > SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

Date post: 24-Apr-2015
Category:
Upload: michael-lingwall
View: 31 times
Download: 2 times
Share this document with a friend
34
3G Wireless Remote Site Deployment Guide Revision: H1CY11
Transcript
Page 1: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

3G Wireless Remote Site Deployment Guide

Revision: H1CY11

Page 2: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

The Purpose of This Guide

The Purpose of This Guide

This guide describes the deployment of CDMA or GSM 3G DMVPN to con-nect a remote site to the Headquarters or Main Office.

It includes an overview of the business problems that can be solved Internet VPN. The guide includes details of various topology designs with increasing levels of scale and resiliency. It also provides step-by-step configuration instructions for the routers that make up the WAN and remote site solution.

Who Should Read This Guide

This guide is appropriate for organizations that meet any of the following criteria:

• Have 2000–10,000 connected employees

• Use the Internet as a secure WAN transport

• Want to deploy cellular backup or leverage cellular connectivity in remote sites

• Require alternative integrated connectivity

• Require truly mobile connectivity where physical connectivity is impossible

• Have IT workers with a CCNA® certification or equivalent experience

• Want to deploy network infrastructure efficiently

• Want the assurance of a tested solution?

• Require a migration path for growth?

Related Documents

Before reading this guide

WAN Deployment Guide

VPN Remote Site Deployment Guide

3G Wireless Remote Site

VPN Remote Site

Supplemental GuidesFoundation WAN

Design Guides Deployment Guides

You are Here

Page 3: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

Table of Contents

ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITA-TION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO.

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Unified Communications SRND (Based on Cisco Unified Communications Manager 7.x)

© 2011 Cisco Systems, Inc. All rights reserved.

Table of Contents

Business Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1The Case for Cellular 3G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2Cellular Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Global System for Mobile Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Third Generation and Fourth Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

WAN Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

MPLS WAN Transport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

DMVPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Considerations for Deploying the Cellular Remote Site . . . . . . . . . . . . . . . . . . . .4

Deploying a 3G WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

LAN Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Path Selection Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Data Privacy (Encryption) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Design Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Deploying a DMVPN WAN with 3G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6Business Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Technology Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Deployment Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Deploying a DMVPN Hub Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Enabling the 3G Interface Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Enabling DMVPN Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Appendix A: Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26bn-br221-1941 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Appendix B: SBA for Enterprise Organizations Document System . . . . . . . . . . . . . . . . . . . . 30

Page 4: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

1Business Overview

Business Overview

The Case for Cellular 3G

Connectivity to an organization’s data is no longer confined to the walls of its buildings. The world is more mobile and today’s consumers expect products and services to come to them. For example:

Mobile clinics require up-to-the-minute communication with various special-ists and the ability to exchange patient x-rays, medical tests, and files.

Emergency Mobile Deployment Units require up-to-the-minute communica-tion, remote information feedback, and local site intercommunication.

Tradeshows and special events require interactive kiosks and Internet hotspots, credit card processing, and up-to-the-minute marketing cam-paigns through digital advertising.

Figure 1 . Use Cases

These are just some situations where cellular is likely the only option for providing high-bandwidth network WAN connectivity.

Cellular connectivity is a resilient solution for your remote site. A resilient remote site provides an always-accessible network for the applications users interact with directly, from site-to-site backup and recovery to email

service. How well users interact with the network and their ability to reach essential services impacts the business’ overall performance.

Reliable network services provided by Cisco SBA such as the Internet connection, wide-area network (WAN) infrastructure, and security help ensure that a business can rely on applications such as web conferencing for critical collaboration.

High availability at the remote sites is an essential requirement for productiv-ity, safety, and security within the majority of organizations. Therefore, the ability to maintain connectivity for critical business data transactions is imperative to the Cisco SBA design.

Cisco SBA for Enterprise Organizations is a prescriptive architecture that delivers an easy-to-use, flexible, and scalable network with wired connectiv-ity, wireless connectivity, security, WAN optimization, and unified commu-nication components. It eliminates the challenges of integrating the various network components by using a standardized design that is reliable and has comprehensive support offerings.

Reader Tip

To learn more about Cisco Smart Business Architecture, visit:

http://www.cisco.com/go/sba or http://www.cisco.com/go/partner/smartarchitecture

Page 5: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

2Architecture Overview

Architecture Overview

This guide provides a design that enables highly available, secure, and optimized connectivity for remote-site LANs by using Cisco 3G technology.

The WAN is the networking infrastructure that provides an Internet protocol (IP)-based connection between remote sites (or branches) that are sepa-rated by large geographic distances.

This document shows you how to deploy the network foundation and services to enable the following:

• 3G WAN connectivity for remotes sites

• Primary and secondary links to provide redundant topology options for resiliency

• Data privacy via encryption

• WAN optimization and application acceleration

• Wired and wireless LAN access at all remote sites

Cellular Options

Cellular connectivity enables this solution with a flexible, high speed, high bandwidth option. There are two competing technologies that provide high bandwidth network WAN connectivity where cellular is the only option: code division multiple access (CDMA) or Global System for Mobile Communications (GSM). Much of the world can only select one or the other.

Code Division Multiple Access

CDMA has its roots in World War II. It only relates to over-the-air transmis-sion, giving each user the full use of the radio spectrum, which can provide higher data rates than can be achieved with GSM. CDMA leverages time-division multiple access (TDMA) and general packet radio service (GPRS), a packetized technology. CDMA uses a much stronger signal and can have a much better coverage model sometimes at the expense of GSM when both technologies exist together in densely populated areas.

When choosing CDMA over GSM, consider where you are deploying your remote site. CDMA is predominately used within the United States but used rarely elsewhere in the world and is nonexistent in Europe because the European Union mandates the sole use of GSM.

Global System for Mobile Communications

GSM was invented in 1987 by the GSM Association, an international orga-nization dedicated to developing the GSM standard worldwide. The data rates are typically lower than what can be found with CDMA, however, with enhanced data rates for GSM evolution (EDGE), the performance disparity is getting smaller. GSM also offers the advantage of being the world leader in deployment with over 74% of cellular deployments using GSM, and, as already mentioned, it is used by virtually all of Europe. Another clear advantage of GSM over CDMA is the ability to move the subscriber identity module (SIM) from one device to another, which essentially moves your service from device to device without having to work through your service provider.

Third Generation and Fourth Generation

Today’s working data standard is third generation (3G). It provides data rates of 200kbits/second for moving users and up to 2Mb/s for stationary users. Some carriers are beginning to market fourth generation (4G) standard products, which promise up to gigabit data rates for stationary users and must be able to achieve at least 100 Mb/s data rates for moving/mobile users. The International Telecommunication Union (ITU) defines both of these standards. The promise of these data rates and bandwidth brings interesting technology opportunities to the remote sites.

Reader Tip

The solution presented in this guide leverages Cisco Integrated Services Routers running Cisco IOS® software. They contain either a CDMA or a GSM high-speed WAN interface card (HWIC).

WAN Design

This document leverages the Cisco SBA WAN Deployment Guide and the VPN Remote Site Deployment Guide as blueprints for deploying a remote site. The primary focus of the design is to use the following commonly deployed WAN transports:

• MPLS Layer 3 VPN

• Internet VPN

At a high level, the WAN is an IP network, and other transports can be easily integrated into the design.

Page 6: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

3Architecture Overview

The chosen architecture designates a primary WAN aggregation site that is analogous to the hub site in a traditional hub-and-spoke design. This site has direct connections to both WAN transports and high-speed connections to the selected service providers. In addition, the site leverages network equipment scaled for high performance and redundancy. The primary WAN aggregation site is co-resident with the data center and usually the primary campus or LAN as well.

MPLS WAN Transport

Cisco IOS MPLS enables enterprises and service providers to build next- generation intelligent networks that deliver a wide variety of advanced, value-added services over a single infrastructure. This economical solution can be integrated seamlessly over any existing infrastructure such as IP, frame relay, ATM, or Ethernet.

MPLS Layer 3 VPNs use a peer-to-peer VPN model that leverages the border gateway protocol (BGP) to distribute VPN-related information. This peer-to-peer model allows enterprise subscribers to outsource routing information to service providers, which can result in significant cost savings and a reduction in operational complexity for enterprises.

Subscribers who need to transport IP multicast traffic can enable multicast VPNs.

The WAN leverages MPLS VPN as a primary WAN transport.

DMVPN

Cisco Dynamic Multipoint VPN (DMVPN) is a solution for building scalable site-to-site VPNs that support a variety of applications. DMVPN is widely used for encrypted site-to-site connectivity over public or private IP net-works and can be implemented on all WAN routers used in this deployment guide.

Cisco DMVPN was selected for the encryption solution for the Internet trans-port because it supports on-demand full mesh connectivity with a simple hub-and-spoke configuration and a zero-touch hub deployment model for adding remote sites. Cisco DMVPN also supports spoke routers that have 3G WAN HWICs with dynamically assigned IP addresses.

Cisco DMVPN makes use of multipoint generic route encapsulation tunnels (mGRE) to interconnect the hub to all of the spoke routers. These mGRE tunnels are also sometimes referred to as DMVPN clouds in this context. This technology combination supports unicast, multicast, and broadcast IP including the ability to run routing protocols within the tunnels.

Page 7: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

4Considerations for Deploying the Cellular Remote Site

Considerations for Deploying the Cellular Remote Site

Before you begin the 3G remote-site deployment process, you need to determine which technology to leverage as you define your physical topology.

In order to decide which technology to use, consider the following questions:

• What technology is supported in the region where this remote site will be located?

Contact your local service provider to see what technologies are in your area. For example, Europe has mandated GSM for all cellular.

• Do you want or require redundant hardware for hot swap should a failure occur?

GSM allows you to move your SIM card from device to device without working through your service provider.

• Is high data throughput a requirement?

Although the difference in data throughput for each technology is clos-ing, CDMA is still the clear leader.

• Will your office move from region to region?

If your remote site has wheels and moves around, such as a health clinic, you may wish to include both CDMA and GSM within your solution so that you may choose the best operator for your site.

• If price of service or service provider offerings are factors, which pro-vider offers the best features/price for your remote site?

Some service providers offer both business and wireless services to provide an alternative connection away from the public network (Internet) and drop you on your private MPLS network.

Where security is a requirement, some service providers can provide a direct connection to customers’ MPLS networks.

GSM allows individuals to move from device to device without working through the service provider.

This guide addresses how you can leverage both technologies if your deployment is in a remote site that is on the move, possibly a disaster recov-ery vehicle, a mobile clinic, outdoor event data processing center, or some other truly mobile remote site. Leveraging both technologies is possible only in the few places both exist.

Where available, CDMA is currently the clear leader in data throughput.

The 3G remote-site design is based on the design in the WAN Deployment Guide. The remote sites will leverage the cellular interface for Internet access.

The WAN 100 design:

• Has up to 100 Mbps aggregate bandwidth

• Supports up to 100 remote sites

• Uses a single Internet link

The WAN 500 design:

• Has up to 1 Gbps aggregate bandwidth

• Supports up to 500 remote sites

• Uses a single Internet link

Page 8: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

5Deploying a 3G WAN

Deploying a 3G WAN

IP Routing

The 3G remote-site design has the following IP routing goals:

• Provide optimal routing connectivity from primary WAN aggregation sites to all remote locations

• Isolate WAN routing topology changes from other portions of the network

• Ensure active/standby symmetric routing when multiple paths exist for ease of troubleshooting and to prevent oversubscription of IP telephony call admission control limits when 3G is used as the redundant link

• Provide site-site remote routing via the primary WAN aggregation site (hub-and-spoke model)

At the WAN remote sites, there is no local Internet access for web browsing or cloud services. This model is referred to as a centralized Internet model. It is worth noting that sites with Internet/DMVPN for either primary or backup transport could potentially provide local Internet capability; however, for this design, only encrypted traffic to other DMVPN sites is permitted to use the Internet link. In the centralized Internet model, Multiple routes are advertised to the WAN remote sites: a default route as well as internal routes from the data center and campus

LAN Access

In the 3G remote-site design, all remote sites support both wired and wire-less LAN access.

Path Selection Preferences

There are many potential traffic flows based on which WAN transports are in use and whether or not a remote site is using a dual WAN transport.

The single 3G connection functions as follows:

• Connects to a site on the same DMVPN; the optimal route is direct within the DMVPN (only initial traffic is sent to the DMVPN hub) then is cut through via a spoke-spoke tunnel

• Connects to any other site; the route is through the primary site

Data Privacy (Encryption)

The 3G remote-site design encrypts all remote-site traffic transported over public IP networks such as the Internet.

The use of encryption should not limit the performance or availability of a remote-site application, and should be transparent to end users.

Design Parameters

This deployment guide uses certain standard design parameters and refer-ences various network infrastructure services that are not located within the WAN. These parameters are listed in the following table:

Table 1 . Universal Design Parameters

Network Service IP Address

Domain Name Cisco.local

Active Directory, DNS Server, DHCP 10.4.48.10

Authentication Control System 10.4.48.15

Network Time Protocol (NTP) Server 10.4.48.17

Page 9: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

6Deploying a DMVPN WAN with 3G

Deploying a DMVPN WAN with 3G

Business Overview

Organizations require the WAN to provide sufficient performance and reliability for the remote-site users to be effective in supporting the busi-ness. Although most of the applications and services that the remote-site worker uses are centrally located, the WAN design must provide a common resource access experience to the workforce, regardless of location.

Carrier-based MPLS service is not always available or cost-effective for an organization to use for WAN transport to support remote-site connectivity. Internet-based IP VPNs provide an optional transport that can be used as a resilient backup to a primary MPLS network transport or may be adequate to provide the primary network transport for a remote site. Flexible network architecture should include Internet VPN as a transport option without significantly increasing the complexity of the overall design.

While Internet IP VPN networks present an attractive option for effective WAN connectivity, anytime an organization sends data across a public network there is risk that the data will be compromised. Loss or corruption of data can result in a regulatory violation and can present a negative public image, either of which can have significant financial impact on an organiza-tion. Secure data transport over public networks like the Internet requires adequate encryption to protect business information.

Technology Overview

This 3G cellular deployment guide is written as an addition to the WAN Deployment Guide and the VPN Remote Site Deployment Guide. This guide provides the basic information you need to deploy a branch office. Additional details are available in the aforementioned guides.

WAN 500 Design

The WAN 500 design is intended to support up to 500 remote sites with a combined aggregate WAN bandwidth of up to 1.0 Gbps. The most critical devices are the WAN routers that are responsible for reliable IP forwarding and QoS. This design uses the Cisco ASR1002 Aggregation Services Router configured with an ESP5 for the DMVPN hub router.

The WAN 500 design uses a single Internet service provider and a single DMVPN hub router.

The DMVPN VPN router connects to the Internet indirectly through a firewall Demilitarized Zone (DMZ) interface contained within the Internet edge. Further details of the primary site Internet connection are referenced in the Smart Business Architecture—Borderless Networks for Enterprise Organizations Internet Edge Deployment Guide. The VPN hub router is connected into the firewall DMZ interface, rather than connected directly with an Internet service provider router.

Figure 2 . WAN 500 Design—DMVPN Connection

The Cisco ASR1000 Series Aggregation Services Routers represent the next-generation, modular, services-integrated Cisco routing platform. They are specifically designed for WAN aggregation, with the flexibility to sup-port a wide range of 3- to 16-mpps packet-forwarding capabilities, 2.5- to 40-Gbps system bandwidth performance, and scaling.

The Cisco ASR 1000 Series is fully modular, from both hardware and software perspectives, and the routers have all the elements of a true carrier-class routing product that serves both enterprise and service provider networks.

Page 10: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

7Deploying a DMVPN WAN with 3G

WAN 100 Design

The WAN 100 design is intended to support up to 100 remote sites with a combined aggregate WAN bandwidth of up to 100 Mbps. The WAN 100 design is essentially a smaller scale version of the WAN 500 design. This variant is included to provide a limited scale option. If further growth in bandwidth or an increase in the number of sites is expected, then proceed with the WAN 500 design. Using the larger design can prevent unneces-sary downtime associated with device upgrades. This design uses either the Cisco ASR1001 or the Cisco 3945E Integrated Services Router for the DMVPN hub router. The WAN 100 design uses a single Internet service provider and a single DMVPN hub router.

Figure 3 . WAN 100 Design—DMVPN Connection

Internet

DMVPN Hub Router:ASR1001Cisco 3945E

Internet Edge

Distribution Layer

Remote Sites—DMVPN Spoke Router Selection

The actual WAN remote-site routing platforms remain unspecified because the specification is tied closely to the bandwidth required for a location and the potential requirement for the use of service module slots. The ability to implement this solution with a variety of potential router choices is one of the benefits of a modular design approach.

There are many factors to consider in the selection of the WAN remote-site routers. Among those, and key to the initial deployment, is the ability to process the expected amount and type of traffic. Also we need to be

concerned with having enough interfaces, enough module slots, and a properly licensed Cisco IOS image that supports the set of features that is required by the topology. We tested four integrated service router models as DMVPN spoke routers and the expected performance is shown in the following table.

Table 2 . WAN Remote-Site 3G Router Options

2911 2921 3925 3945

Ethernet WAN with Services1 35 Mbps 50 Mbps 100 Mbps

150 Mbps

On-board GE ports 3 3 3 3

Service Module Slots2 1 1 2 4

Redundant Power Supply Option

No No Yes Yes

Notes: 1. The performance numbers are conservative numbers obtained when the router is passing IMIX traffic with heavy services configured and the CPU utilization is under 75 percent. 2. Some service modules are double-wide.

The DMVPN spoke routers at the WAN remote sites connect to the Internet directly through a 3G HWIC router interface. More details about the security configuration of the remote-site routers connected to the Internet are discussed later in this guide. The single link DMVPN remote site is the most basic of building blocks for any remote location. This design can be used with the CE router connected directly to the access layer, or it can support a more complex LAN topology by connecting the CE router directly to a distribution layer.

The IP routing is straightforward and can be handled entirely by static routing; using static routes at the WAN-aggregation site and static default routes at the remote site. However, there is significant value to configuring this type of site with dynamic routing. It is easy to add or modify IP networks at the remote site when using dynamic routing because any changes are immediately propagated to the rest of the network.

Page 11: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

8Deploying a DMVPN WAN with 3G

Figure 4 . DMVPN Remote Site (Single Link—Single Router)

The DMVPN connection can be the primary WAN transport, or can also be the alternate to an MPLS WAN transport. The DMVPN single-link design can be added to an existing MPLS WAN design to provide additional resiliency either connecting on the same router or on an additional router. Adding an additional link provides the first level of high availability for the remote site. A failure in the primary link can be automatically detected by the router and traffic can be rerouted to the secondary path. It is mandatory to run dynamic routing when there are multiple paths. The routing protocols are tuned to ensure the desired traffic flows.

The dual-router, dual-link design continues to improve upon the level of high availability for the site. This design can tolerate the loss of the primary router and traffic can be rerouted via the secondary router (through the alternate path)

Figure 5 . MPLS WAN + DMVPN Remote Site (Dual Link Options)

Tech Tip

This guide includes deployment details for only the single-router, dual-link option shown in Figure 5.

Page 12: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

9Deploying a DMVPN WAN with 3G

Deployment Details

This section provides the processes for deploying the DMVPN hub and DMVPN/3G remote sites.

Deploying a DMVPN Hub Router

This process is optional if you have already completed a DMVPN deploy-ment. This section includes the details for configuration and initial deploy-ment of a DMVPN hub router.

Process

Deploying a DMVPN Hub Router

1. Finish WAN Router Universal Configuration

2. Connect to the Distribution Switch

3. Configure VRF-lite

4. Connect to the Internet DMZ

5. Configure ISAKMP and IPsec

6. Configure the mGRE Tunnel

7. Configure EIGRP

Procedure 1 Finish WAN Router Universal Configuration

Step 1: Configure the device hostname. hostname [hostname]

Step 2: Configure the in-band management interface.

All devices leverage a loopback address. A loopback is a virtual interface that is consistently reachable when multiple paths exist to the device. Various other features may use the loopback.

interface Loopback0 ip address [IP address] 255.255.255.255

Step 3: Configure the device management protocols.

SSH is an application and a protocol that provides a secure replacement to RSH and Telnet. Secure management access is enabled through the use of the SSH and/or HTTPS protocols. HTTPS provides the capability to connect an HTTP server securely. It uses SSL and TLS to provide device authentica-tion and data encryption. Both protocols are encrypted for privacy, and the non-secure protocols, Telnet and HTTP, have been disabled.

ip domain-name cisco.local no ip http server

Enabling SSH requires that a public/private key pair be generated for the device:

crypto key generate rsa modulus 2048 ip ssh version 2 ip ssh source-interface Loopback0

Various levels of device management may be available through a web interface. For secure access to this interface you must enable the secure server. The following command also generates a public/private key pair as shown previously:

ip http secure-server

Allow only SSH access to the device:line vty 0 15 transport input ssh

When synchronous logging of unsolicited messages and debug output are turned on, console log messages are displayed on the console after interac-tive CLI output is displayed or printed. Use this command to continue typing at the device console when debugging is enabled.

line con 0 logging synchronous

Enable SNMP to allow the network infrastructure devices to be managed by an NMS. SNMPv2c is configured both for a read-only and a read-write community string.

snmp-server community cisco RO snmp-server community cisco123 RW snmp-server trap-source Loopback0

Page 13: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

10Deploying a DMVPN WAN with 3G

Step 4: Configure secure user authentication.

Enable authentication, authorization, and accounting (AAA) for access con-trol. Control all management access to the network infrastructure devices (SSH, Telnet, HTTP, and HTTPS) with AAA.

Define a local AAA user database on the network infrastructure devices to provide the ability to manage them in case the centralized TACACS+ server is unavailable, or if you do not have a TACACS+ server in your organization.

We highly recommend the use of a centralized authentication database. For an ASR1000 router, use the following set of commands:

enable secret c1sco123 service password- encryption!username admin password c1sco123 aaa new- model

tacacs server TACACS-SERVER-1 address ipv4 10.4.48.15 key SecretKey

aaa group server tacacs+ TACACS-SERVERS server name TACACS-SERVER-1

aaa authentication login default group TACACS-SERVERS local aaa authorization exec default group TACACS-SERVERS local ip tacacs source-interface Loopback0

For all ISR G2 routers, use the following set of commands:enable secret c1sco123 service password-encryption ! username admin password c1sco123

aaa new-model

aaa authentication login default group tacacs+ local aaa authorization exec default group tacacs+ local ip tacacs source-interface Loopback0 tacacs-server host 10.4.48.15 key SecretKey

Step 5: Configure a synchronized clock.

NTP is designed to synchronize a network of devices. An NTP network usually gets its time from an authoritative time source such as a radio clock or an atomic clock attached to a time server. NTP then distributes this time across the network. NTP is extremely efficient; no more than one packet per

minute is necessary to synchronize two devices to within a millisecond of one another.

Network devices should be programmed to synchronize to a local NTP server in the network. The local NTP server typically references a more accurate clock feed from an outside source. Configuring console mes-sages, logs, and debug output on switches, routers, and other devices in the network to provide timestamps on output allows cross referencing of events in a network.

ntp server 10.4.48.17 ntp source Loopback0

Note: The following command is not for use on ASR1000 Series models.ntp update-calendar !clock timezone PST -8 clock summer-time PDT recurring ! service timestamps debug datetime msec localtime service timestamps log datetime msec localtime

Procedure 2 Connect to the Distribution Switch

A Layer 3 port-channel interface connects to the WAN distribution switch. The following configuration creates an EtherChannel link between the router and switch with two channel-group members.

Step 1: Configure the port-channel interface and assign an IP address.

As a best practice, use the same channel numbering on both sides of the link where possible.

interface Port-channel [number] ip address [IP address] [netmask]

Step 2: Enable the port-channel group members and assign the appropriate channel group.

Not all router platforms can support LACP to negotiate with the switch, so EtherChannel is configured statically.

interface [interface type] [number] no ip address channel-group [number] no shutdown

Page 14: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

11Deploying a DMVPN WAN with 3G

interface Port-channel3 ip address 10.4.32.18 255.255.255.252 !interface GigabitEthernet0/0/0 no ip address channel-group 3 no shutdown !interface GigabitEthernet0/0/1 no ip address channel-group 3 no shutdown

Procedure 3 Configure VRF-lite

Virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing table to coexist within the same router at the same time. Because the routing instances are independent, the same or overlap-ping IP Addresses can be used without conflicting with each other. Often, in an MPLS context, VRF is also defined as VPN routing and forwarding.

An Internet-facing VRF is created to support the front door VRF for DMVPN. The VRF name is arbitrary, but it is useful to select a name that describes the VRF. An associated route distinguisher (RD) must also be configured to make the VRF functional. The RD configuration also creates the routing and forwarding tables and associates the RD with the VRF instance.

This design uses VRF-lite so the RD value can be chosen arbitrarily. It is a best practice to use the same VRF/RD combination across multiple devices when using VRFs in a similar manner. However, this convention is not strictly required.

Step 1: Enter an RD.

An RD is either of the following:

• ASN-related—Composed of an ASN and an arbitrary number

• IP-address-related—Composed of an IP address and an arbitrary number

You can enter an RD in either of these formats:

• 16-bit autonomous-system-number: your 32-bit number

For example, 65512:1

• 32-bit IP address: your 16-bit number

For example, 192.168.122.15:1.ip vrf [vrf- name] rd [ASN:number]

Example for Procedure 3:ip vrf INET-PUBLIC rd 65512:1

Procedure 4 Connect to Internet DMZ

The DMVPN hub requires a connection to the Internet. In this design, the DMVPN hub is connected through a Cisco ASA5500 Adaptive Security Appliance using a DMZ interface specifically created and configured for a VPN termination router.

Step 1: Enable the interface, select the VRF, and assign the IP address.

The IP address used for the Internet-facing interface of the DMVPN hub router must be an Internet routable address. There are two possible meth-ods to accomplish this task:

• Assign a routable IP address directly to the router

• Assign a non-routable RFC-1918 address directly to the router and use a static NAT on the Cisco ASA5500 to translate the router IP address to a routable IP address.

This design assumes that the Cisco ASA5500 is configured for static NAT for the DMVPN hub router.

The DMVPN design uses the front door VRF, so this interface must be placed into the VRF configured in the previous procedure.

interface [interface type] [number] ip vrf forwarding [vrf name] ip address [IP address] [netmask] no shutdown

Step 2: Configure the VRF-specific default routing.

The VRF created for the front door VRF must have its own default route to the Internet. This default route points to the ASA5500 DMZ interface IP address.

ip route vrf [vrf name] 0.0.0.0 0.0.0.0 [ASA5500 DMZ interface IP address]

Page 15: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

12Deploying a DMVPN WAN with 3G

interface GigabitEthernet0/0/4 ip vrf forwarding INET-PUBLIC ip address 10.4.32.33 255.255.255.248 no shutdown! ip route vrf INET-PUBLIC 0.0.0.0 0.0.0.0 10.4.32.35

Procedure 5 Configure ISAKMP and IPsec

Step 1: Configure the crypto keyring.

The crypto keyring defines a pre-shared key (or password) valid for IP sources reachable within a particular VRF. This key is a wildcard pre-shared key if it applies to any IP source. A wildcard key is configured using the 0.0.0.0 0.0.0.0 network/mask combination.

crypto keyring [keyring name] vrf [vrf name] pre-shared-key address 0.0.0.0 0.0.0.0 key [pre-shared key]

Step 2: Configure the ISAKMP policy.

The ISAKMP policy for DMVPN uses the following:

• Advanced Encryption Standard (AES) with a 256-bit key

• Secure Hash Standard (SHA)

• Authentication by pre-shared key

• Diffie-Hellman group 2crypto isakmp policy 10 encr aes 256 hash sha authentication pre-share group 2

Step 3: Create the ISAKMP profile.

The ISAKMP profile creates an association between an identity address, a VRF, and a crypto keyring. A wildcard address within a VRF is referenced with 0.0.0.0.

crypto isakmp profile [ISAKMP profile name] keyring [keyring name] match identity address 0.0.0.0 [vrf name]

Step 4: Define the IPsec transform set.

A transform set is an acceptable combination of security protocols, algo-rithms, and other settings to apply to IPsec-protected traffic. Peers agree to use a particular transform set when protecting a particular data flow:

• ESP with the 256-bit AES encryption algorithm

• ESP with the SHA (HMAC variant) authentication algorithm

Because the DMVPN hub router is behind a NAT device, the IPsec transform set must be configured for transport mode.

crypto ipsec transform-set [IPSec transform-set name] esp-aes 256 esp-sha-hmac mode transport

Step 5: Step 5: Create the IPsec profile.

The IPsec profile creates an association between an ISAKMP profile and an IPsec transform set.

crypto ipsec profile [IPSec profile name] set transform-set [IPSec transform-set name] set isakmp-profile [ISAKMP profile name]

Example for Procedure 5:crypto keyring DMVPN-KEYRING vrf INET-PUBLIC pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123

crypto isakmp policy 10 encr aes 256 hash sha authentication pre-share group 2

crypto isakmp profile FVRF-ISAKMP-INET-PUBLIC keyring DMVPN-KEYRING match identity address 0.0.0.0 INET-PUBLIC

crypto ipsec transform-set AES256/SHA/TRANSPORT esp-aes 256 esp-sha-hmac mode transport !crypto ipsec profile DMVPN-PROFILE set transform-set AES256/SHA/TRANSPORT set isakmp-profile FVRF-ISAKMP-INET-PUBLIC

Page 16: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

13Deploying a DMVPN WAN with 3G

Procedure 6 Configure the mGRE Tunnel

Step 1: Configure basic interface settings.

Tunnel interfaces are created as they are configured. The tunnel number is arbitrary, but it is best to begin tunnel numbering at 10 or above because other features deployed in this design may also require tunnels and they may select lower numbers by default.

The bandwidth setting should be set to match the Internet bandwidth of the respective primary or secondary carrier.

The IP MTU should be configured to 1400 and the ip tcp adjust-mss should be configured to 1360. There is a 40 byte difference which corresponds to the combined IP and TCP header length.

interface Tunnel [number] bandwidth [bandwidth (kbps)] ip address [IP address] [netmask] no ip redirects ip mtu 1400 ip tcp adjust- mss 1360

Step 2: Configure the tunnel.

DMVPN uses multipoint GRE (mGRE) tunnels. This type of tunnel requires a source interface only. The source interface should be the same interface used in Procedure 4 to connect to the Internet. The tunnel vrf command should be set to the VRF defined previously for the front door VRF.

Enabling encryption on this interface requires the application of the IPsec profile configured in the previous procedure.

interface Tunnel [number] tunnel source [source interface] tunnel mode gre multipoint tunnel vrf [vrf name] tunnel protection ipsec profile [IPSec profile name]

Step 3: Configure NHRP.

The DMVPN hub router acts in the role of NHRP server for all of the spokes. NHRP is used by remote routers to determine the tunnel destinations for peers attached to the mGRE tunnel.

NHRP requires all devices within a DMVPN cloud to use the same network ID and authentication key. The NHRP cache hold time should be configured to 600 seconds.

EIGRP (configured in the following procedure) relies on a multicast transport and requires NHRP to automatically add routers to the multicast NHRP mappings.

The ip nhrp redirect command allows the DMVPN hub to notify spoke rout-ers that a more optimal path may exist to a destination network, which may be required for DMVPN spoke-spoke direct communications.

interface Tunnel [number] ip nhrp authentication [password] ip nhrp map multicast dynamic ip nhrp network-id [network id] ip nhrp holdtime 600 ip nhrp redirect

Step 4: Configure EIGRP.

EIGRP has some specific requirements for the mGRE tunnel interface.

Spoke-to-spoke DMVPN networks present a unique challenge because the spokes cannot directly exchange information with one another even though they are on the same logical network. This limitation requires that the DMVPN hub router advertise routes from other spokes on the same network. The advertisement of these routes would normally be prevented by split horizon and can be overridden by the no ip split-horizon eigrp command.

The EIGRP hold time is increased to 35 seconds to accommodate up to 500 remote sites on a single DMVPN cloud.

interface Tunnel [number] ip hold- time eigrp [as number – eigrp dmvpn] 35no ip split-horizon eigrp 200

Page 17: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

14Deploying a DMVPN WAN with 3G

Example for Procedure 6:interface Tunnel10 bandwidth 10000 ip address 10.4.34.1 255.255.254.0 no ip redirects ip mtu 1400 ip hold-time eigrp 200 35 ip nhrp authentication cisco123 ip nhrp map multicast dynamic ip nhrp network-id 101 ip nhrp holdtime 600 ip nhrp redirect ip tcp adjust-mss 1360 no ip split-horizon eigrp 200 tunnel source GigabitEthernet0/0/3 tunnel mode gre multipoint tunnel vrf INET-PUBLIC tunnel protection ipsec profile DMVPN-PROFILE

Procedure 7 Configure EIGRP

Two EIGRP processes are used on the DMVPN hub routers. The primary reason for the additional process is to ensure that routes learned from the WAN remote sites appear as EIGRP external routes on the WAN distribution switch. If only a single process was used, then the remote site routes would appear as EIGRP internal routes on the WAN distribution switch, which would be preferred to the MPLS VPN learned routes.

Step 1: Enable EIGRP-100 for internal routing.

EIGRP-100 is configured facing the LAN distribution/core. In this design, the port-channel interface and the loopback are EIGRP interfaces. The loopback may remain a passive interface. The network range must include both inter-face IP addresses either in a single network statement or in multiple network statements. This design uses a best practice of assigning the router ID to a loopback address. The tunnel interface address should not be included in the network range. It may be helpful to explicitly list all of the relevant networks rather than include them in a single statement.

router eigrp [as number] network [port-channel network] [inverse mask] network [loopback network] 0.0.0.0 passive-interface default no passive-interface [port-channel interface] eigrp router-id [IP address of Loopback0] no auto-summary

Step 2: Enable an additional EIGRP-20x process for DMVPN.

EIGRP-20x is configured for the DMVPN mGRE interface. Routes from the other EIGRP process are redistributed. Because the routing protocol is the same, no default metric is required. The primary DMVPN cloud is cloud 1.

Table 3 . DMVPN Interface and Routing Parameters

DMVPN Cloud EIGRP AS Number Tunnel Number

1 200 10

2 201 11

The tunnel interface is the only EIGRP interface, and its network range should be explicitly listed.

router eigrp [as number (DMVPN)] network [mGRE tunnel network] [inverse mask] redistribute eigrp [as number] passive-interface default no passive-interface [mGRE tunnel interface] eigrp router-id [IP address of Loopback0] no auto-summary

Step 3: Tag and redistribute the routes.

This design uses mutual route redistribution. DMVPN routes from the EIGRP-20x process are redistributed into EIGRP-100. Other learned routes from EIGRP-100 are redistributed into EIGRP-20x. Because the routing protocol is the same, no default metric is required.

It is important to tightly control how routing information is shared between different routing protocols when this mutual route redistribution is used; otherwise. it is possible to experience route flapping, where certain routes are repeatedly installed and with-drawn from the device routing tables. Proper route control ensures the stability of the routing table.

An inbound distribute list is used on WAN routers in other SBA WAN deploy-ment guides to limit which routes are accepted for installation into the route table. These routers are configured to only accept routes which do not originate from other WAN sources. In order to accomplish this task requires that the DMVPN learned WAN routes are explicitly tagged by their DMVPN hub routers during the route redistribution process. The specific route tags in use are shown in the following table.

Page 18: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

15Deploying a DMVPN WAN with 3G

Table 4 . Route Tags

Tag Route Source Method

65401 MPLS A implicit

65402 MPLS B implicit

65512 DMVPN hub routers implicit

This example includes all WAN route sources in the reference designs. Depending on the actual design of your network, more tags may be needed.

router eigrp [as number] redistribute eigrp [as number (DMVPN)] route-map [route-map-name]

router eigrp [as number (DMVPN)] network [mGRE tunnel network] [inverse mask] redistribute eigrp [as number]

route-map [route-map-name] permit 10 match interface [interface] set tag [tag #]

Example for Procedure 7:router eigrp 100 network 10.4.32.16 0.0.0.3 network 10.4.32.243 0.0.0.0 redistribute eigrp 200 route-map SET-ROUTE-TAG-DMVPN passive-interface default no passive-interface Port-channel3 no auto-summary

router eigrp 200 network 10.4.34.0 0.0.1.255 redistribute eigrp 100 passive- interface default no passive- interface Tunnel10 no auto- summary route-map SET-ROUTE-TAG-DMVPN permit 10 match interface Tunnel10 set tag 65512

Enabling the 3G Interface Card

There are two variants of 3G HWIC cards available for the routers. One supports GSM and the other supports CDMA. They both use similar configu-rations but with minor differences. Each has a separate process for configu-ration. Follow the process that matches the technology you have chosen.

Process

Deploying Remote-Site Router with GSM

1. Install GSM HWIC into ISR

2. Configure VRF-lite

3. Configure the Dialer Interface

4. Create Chat Script and GSM Profile

5. Configure the Cellular Interface

6. Configure Routing

Tech Tip

You must get a data service account from your service provider. You should receive a SIM card that you should install on the 3G-HWIC.You will also receive the following information:

• PPP CHAP User-Name (hostname)

• PPP CHAP Password

• APN (Access Point Name)

Page 19: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

16Deploying a DMVPN WAN with 3G

Procedure 1 Install GSM HWIC into ISR

Figure 6 . GSM HWIC SIM card installation

Step 1: Insert SIM card into HWIC.

Step 2: Power off the Integrated Services Router.

Step 3: Insert and fasten GSM HWIC into ISR.

Step 4: Power on ISR and log in.

Procedure 2 Configure VRF-lite

An Internet-facing VRF is created to support the front door VRF for DMVPN. The VRF name is arbitrary, but it is useful to select a name that describes the VRF. To make the VRF functional, you must also configure an associated RD. The RD configuration also creates the routing and forwarding tables and associates the RD with the VRF instance.

This design uses VRF-lite so you can arbitrarily choose the RD value. It is a best practice to use the same VRF/RD combination across multiple devices when using VRFs in a similar manner. However, this convention is not strictly required.

Command Reference:

An RD is one of two types:

• ASN-related—Composed of an ASN and an arbitrary number.

• IP-address-related—Composed of an IP address and an arbitrary number

Step 1: Enter an RD in either of these formats:

• 16-bit autonomous-system-number: your 32-bit number

For example, 65512:1

• 32-bit IP address: your 16-bit number

For example, 192.168.122.15:1.ip vrf [vrf-name] rd [ASN:number]

Example for Procedure 2:ip vrf INET-PUBLIC rd 65512:1

Page 20: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

17Deploying a DMVPN WAN with 3G

Procedure 3 Configure the Dialer Interface

The Dialer interface brings capabilities to the 3G GSM interface that cannot be handled with the cellular interface alone.

Step 1: Apply the following configuration.interface Dialer1 ip vrf forwarding INET-PUBLIC ip address negotiated!Specifies that the IP address with be negotiated with PPP encapsulation ppp dialer pool 1 dialer idle-timeout 0 dialer string gsm dialer persistent dialer-group 1 no ppp lcp fast-start ppp chap hostname quortus ppp chap password 7 06171F205F5D1E1D ppp ipcp address accept ppp timeout retry 120 ppp timeout ncp 30

Tech Tip

The dialer persistent command, included in Step 1, allows the cellular interface to come up and establish a PPP connection, but the interface does not pass any traffic until required. This greatly reduces the failover times should it become required.

Procedure 4 Create Chat Script and GSM Profile

Chat scripts are strings of text used to send commands for modem dialing, to log in to remote systems, and to initialize asynchronous devices con-nected to an asynchronous line. Your 3G WAN interface should be treated just like any other asynchronous interface.

The following chat script shows the required information to connect to the AT&T GSM network.

Step 1: Define a timeout value. This chat script is called “gsm” with a timeout value of 30 seconds. Note that your carrier may require a different chat script.

chat-script [Script-Name] [Script]

Example for Step 1:chat-script gsm “” “atdt*98*1#” TIMEOUT 30 “CONNECT”

Step 2: Apply chat-script.line [Cellular-Interface-Number] script dialer [Script-Name]

Example for Step 2:

For the interface cellular0/1/0, the matching line would be:line 0/1/0 script dialer gsm

Step 3: Create the GSM Profilecellular [Cellular-Interface] gsm profile create [sequence-Number] [AP-Name] ppp chap [Username] [password]

Example for Step 3:

From enable mode, use the profile to identify the username and password provided to you by your service provider. Use the cellular interface identifier and the keyword “gsm”.

cellular 0/1/0 gsm profile create 1 isp.cingular ppp chap [email protected] CINGULAR1

Page 21: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

18Deploying a DMVPN WAN with 3G

Procedure 5 Configure the Cellular Interface

Step 1: Before configuring the interface, identify traffic of interest, which is the traffic that triggers the interface to become active. From global configu-ration mode, enter the dialer-list configuration command:

dialer-list [Dialer-Number] protocol [Protocol] deny/permit

Step 2: Apply the following configuration: interface Cellular [Interface-Number] no ip address encapsulation ppp dialer in-band dialer pool-member [Dialer-Number] dialer-group [Dialer-Number] no peer default ip address async mode interactive fair-queue 64 16 256 no ppp lcp fast-start

Example for Procedure 5:dialer-list 1 protocol ip permit !interface Cellular0/0/0 no ip address encapsulation ppp dialer in-band dialer pool-member 1 dialer-group 1 no peer default ip address async mode interactive fair-queue 64 16 256 no ppp lcp fast-start

Procedure 6 Configure Routing

Step 1: Specify the INET-PUBLIC interface as a private default route for the virtual routing interface.

ip route vrf INET-PUBLIC 0.0.0.0 0.0.0.0 Dialer1

Process

Deploying Remote-Site Router with CDMA

1. Install CDMA HWIC into ISR

2. Configure VRF-lite

3. Configure Dialer Interface

4. Create Chat Script

5. Configure the Cellular Interface

6. Configure Routing

The CDMA deployment is different from the GSM deployment. The use of a profile is not required.

Tech Tip

You must obtain wireless data services and ensure the HWIC has been registered with the wireless service provider’s network.

Procedure 1 Install CDMA HWIC into ISR

Step 1: Register CDMA HWIC with SP using the ESN number found on the HWIC.

Step 2: Power off the Integrated Services Router.

Step 3: Insert and fasten CDMA HWIC into ISR.

Step 4: Power on ISR and log in.

Page 22: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

19Deploying a DMVPN WAN with 3G

Procedure 2 Configure VRF-lite

An Internet-facing VRF is created to support the front door VRF for DMVPN. The VRF name is arbitrary, but it is useful to select a name that describes the VRF. To make the VRF functional, you must also configure an associated RD. The RD configuration also creates the routing and forwarding tables and associates the RD with the VRF instance.

This design uses VRF-lite so you can arbitrarily choose the RD value. It is a best practice to use the same VRF/RD combination across multiple devices when using VRFs in a similar manner. However, this convention is not strictly required.

Command Reference:

An RD is one of two types:

• ASN-related—Composed of an ASN and an arbitrary number.

• IP-address-related—Composed of an IP address and an arbitrary number

Step 1: Enter an RD in either of these formats:

• 16-bit autonomous-system-number: your 32-bit number

For example, 65512:1

• 32-bit IP address: your 16-bit number

For example, 192.168.122.15:1.ip vrf [vrf-name] rd [ASN:number]

Example for Procedure 2:ip vrf INET-PUBLIC rd 65512:1

Procedure 3 Configure the Dialer Interface

Step 1: Configure Dialer Interface requirements.

This becomes the layer 3 interface for the 3G CDMA HWICInterface Dialer [Dialer number] ip address negotiated encapsulation ppp no ppp lcp fast-start ppp ipcp address accept ppp timeout retry 120 ppp timeout ncp 30

Step 2: Configure Interface VRF and Dialer.dialer pool [Dialer-Pool-Number]dialer idle-timeout 0dialer persistentdialer-group [Dialer-Pool-Number]

Step 3: Apply the interface script.dialer string [Script-Name]

Example for Procedure 3:interface Dialer1 ip vrf forwarding INET-PUBLIC ip address negotiated encapsulation ppp dialer pool 1 dialer idle-timeout 0 dialer string cdma dialer persistent dialer-group 1 no ppp lcp fast-start ppp ipcp address accept ppp timeout retry 120 ppp timeout ncp 30

Page 23: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

20Deploying a DMVPN WAN with 3G

Procedure 4 Create Chat Script

Chat scripts are strings of text used to send commands for modem dialing, to log in to remote systems, and to initialize asynchronous devices con-nected to an asynchronous line. Your 3G WAN interface should be treated just like any other asynchronous interface.

Step 1: Apply a chat script as outlined below. chat-script [Script-Name] [connection-Script]

The CDMA chat script is similar to the GSM with the name “cdma” but with a timeout of 60 seconds. Your specific CDMA service provider may have small variations to this script.

chat-script cdma “” “atdt#777” TIMEOUT 60 “CONNECT”

Step 2: Apply the script to the line interface for cellular Interface.line [Cellular-Interface-ID] script dialer [Script-Name]

Example for Step 2:

For the interface cellular0/0/0 from the sub-line, the configuration is: line 0/0/0 script dialer cdma

Procedure 5 Configure the Cellular Interface

Step 1: Before configuring the interface, identify traffic of interest, which is the traffic that triggers the interface to become active. From global configu-ration mode, enter the dialer-list command.

dialer-list [Dialer-Number] protocol [protocol] [deny/permit]

Step 2: Apply the interface configuration. interface Cellular [interface number] no ip address encapsulation ppp dialer in-band dialer pool-member [Dialer-Number] dialer-group [Dialer-Number] no peer default ip address async mode interactive

fair-queue 64 16 256 no ppp lcp fast-start

Example for Procedure 5:dialer-list 1 protocol ip permit interface Cellular0/0/0 no ip address encapsulation ppp dialer in-band dialer pool-member 1 dialer-group 1 no peer default ip address async mode interactive fair-queue 64 16 256 no ppp lcp fast-start

Procedure 6 Configure Routing

Step 1: Specify the INET-PUBLIC interface as a private default route for the virtual routing interface.

ip route vrf INET-PUBLIC 0.0.0.0 0.0.0.0 Dialer1

Page 24: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

21Deploying a DMVPN WAN with 3G

Enabling DMVPN Backup

Now that the interface-specific configurations are complete, we can pro-ceed with the common configuration. The remaining process is independent of your choice of CDMA or GSM.

Process

Enabling DMVPN/3G Backup on Existing MPLS CE Router

1. Apply the Access List

2. Configure ISAKMP and IPsec

3. Configure the mGRE Tunnel

4. Configure the DMVPN Instance of EIGRP

5. Monitor Upstream MPLS Neighbor

This set of procedures includes the additional steps necessary to complete the configuration of a dual-role MPLS CE and DMVPN/3G spoke router for a MPLS WAN + DMVPN/3G remote site (single-router, dual-link).

Procedure 1 Apply the Access List

The remote sites using DMVPN can use either static or dynamically assigned IP addresses. We tested the design with a DHCP assigned exter-nal address, which also provides a dynamically configured default route.

The DMVPN spoke router connects directly to the Internet without a sepa-rate firewall. This connection is secured in two ways. Because the Internet interface is in a separate VRF, no traffic can access the global VRF except traffic sourced through the DMVPN tunnel. This design provides implicit security. Additionally, an IP access list permits only the traffic required for an encrypted tunnel, as well as DHCP and various ICMP protocols for troubleshooting.

Step 1: Apply the access list.

The IP access list must permit the protocols specified in the following table. The access list is applied inbound on the WAN interface, so filtering is done on traffic destined to the router.

Table 5 . Required DMVPN Protocols

Name Protocol Usage

Non500-isakmp UDP 4500 IPsec via NAT-T

Isakmp UDP500 ISAKMP

Esp IP50 IPsec

Example access list:interface [interface type] [number] ip access-group [ACL name] in ip access-list extended [ACL name] permit udp any any eq non500-isakmp permit udp any any eq isakmp permit esp any any

The additional protocols listed in the following table may assist in trouble-shooting, but are not explicitly required to allow DMVPN to function properly.

Table 6 . Optional Access-List Parameters

Name Protocol Usage

Icmp echo ICMP type 0, code 0 Allow remote pings

Icmp echo-reply ICMP type8, code 0 Allow ping replies

Icmp ttl-exceeded ICMP type 11, Code0 Windows traceroute

Icmp port-unreachable ICMP type 3, code 3 Service unreachable

The additional optional entries for an access list to support ping are as follows:

permit icmp any any echo permit icmp any any echo-reply

The additional optional entries for an access list to support a Windows traceroute are as follows:

permit icmp any any ttl-exceeded ! traceroute (sourced)permit icmp any any port-unreachable ! traceroute (sourced)

Page 25: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

22Deploying a DMVPN WAN with 3G

Example for Procedure 1:interface Dialer1 ip access-group ACL-INET- PUBLIC in

ip access-list extended ACL-INET-PUBLIC permit udp any any eq non500-isakmp permit udp any any eq isakmp permit esp any any permit icmp any any echo permit icmp any any echo-reply

Procedure 2 Configure ISAKMP and IPsec

Step 1: Configure the crypto keyring.

The crypto keyring defines a pre-shared key (or password) valid for IP sources reachable within a particular VRF. If it applies to any IP source, this key is a wildcard pre-shared key. You configure a wildcard key by using the 0.0.0.0 0.0.0.0 network/mask combination.

crypto keyring [keyring name] vrf [vrf name] pre-shared-key address 0.0.0.0 0.0.0.0 key [pre-shared key]

Step 2: Configure the ISAKMP Policy and Dead Peer Detection.

The ISAKMP policy for DMVPN uses the following:

• AES with a 256-bit key

• SHA

• Authentication by pre-shared key

• Diffie-Hellman group: 2

DPD is enabled with keepalives sent at 30-second intervals with a 5-second retry interval, which is considered to be a reasonable setting to detect a failed hub.

crypto isakmp policy 10 encr aes 256 hash sha authentication pre-share group 2! crypto isakmp keepalive 30 5

Step 3: Create the ISAKMP profile.

The ISAKMP profile creates an association between an identity address, a VRF and a crypto keyring. A wildcard address within a VRF is referenced with 0.0.0.0.

crypto isakmp profile [ISAKMP profile name] keyring [keyring name] match identity address 0.0.0.0 [vrf name]

Step 4: Define the IPsec transform set.

A transform set is an acceptable combination of security protocols, algo-rithms, and other settings to apply to IPsec-protected traffic. Peers agree to use a particular transform set when protecting a particular data flow.

The IPsec transform set for DMVPN uses the following:

• ESP with the 256-bit AES encryption algorithm

• ESP with the SHA (HMAC variant) authentication algorithm

Since the DMVPN hub router is behind a NAT device, the IPsec transform set must be configured for transport mode. This transform set has already been created for use in the single-router, single-link configuration, but is included here for completeness.

crypto ipsec transform-set [IPSec transform-set name] esp-aes 256 esp-sha-hmac mode transport

Step 5: Create the IPsec profile.

The IPsec profile creates an association between an ISAKMP profile and an IPsec transform-set.

crypto ipsec profile [IPSec profile name] set transform-set [IPSec transform-set name] set isakmp-profile [ISAKMP profile name]

Example for Procedure 2:crypto keyring DMVPN-KEYRING vrf INET-PUBLIC pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123

crypto isakmp policy 10 encr aes 256 hash sha authentication pre-share group 2

crypto isakmp keepalive 30 5

Page 26: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

23Deploying a DMVPN WAN with 3G

crypto isakmp profile FVRF-ISAKMP-INET-PUBLIC keyring DMVPN-KEYRING match identity address 0.0.0.0 INET-PUBLIC

crypto ipsec transform-set AES256/SHA/TRANSPORT esp-aes 256 esp-sha-hmac mode transport

crypto ipsec profile DMVPN- PROFILE2 set transform-set AES256/SHA/TRANSPORT set isakmp-profile FVRF-ISAKMP-INET-PUBLIC

Procedure 3 Configure the mGRE Tunnel

Step 1: Configure basic interface settings.

Tunnel interfaces are created as they are configured. The tunnel number is arbitrary, but it is best to begin tunnel numbering at 10 or above, because other features deployed in this design may also require tunnels and they may select lower numbers by default.

Set the bandwidth setting to match the Internet bandwidth.

The IP MTU should be configured to 1400 and the ip tcp adjust-mss should be configured to 1360. There is a 40 byte difference, which corresponds to the combined IP and TCP header length.

interface Tunnel [number] bandwidth [bandwidth (kbps)] ip address [IP address] [netmask] no ip redirects ip mtu 1400 ip tcp adjust-mss 1360

Step 2: Configure the tunnel.

DMVPN uses multipoint GRE (mGRE) tunnels. This type of tunnel requires a source interface only. The source interface should be the same interface used in Procedure 1 to connect to the Internet. The tunnel vrf command should be set to the VRF defined previously for Front Door VRF.

Enabling encryption on this interface requires the application of the IPsec profile configured in the previous procedure.

interface Tunnel [number] tunnel source [source interface] tunnel mode gre multipoint tunnel vrf [vrf name] tunnel protection ipsec profile [IPSec profile name]

Step 3: Configure NHRP.

The DMVPN hub router is the NHRP server for all of the spokes. NHRP is used by remote routers to determine the tunnel destinations for peers attached to the mGRE tunnel.

The spoke router requires several additional configuration statements to define the NHRP server (NHS) and NHRP map statements for the DMVPN hub router mGRE tunnel IP address. EIGRP (configured in Procedure 4) relies on a multicast transport. Spoke routers require the NHRP static multicast mapping.

The value used for the NHS is the mGRE tunnel address for the DMVPN hub router. The map entries must be set to the outside NAT value of the DMVPN hub, as configured on the Cisco ASA5500. This design uses the values shown in the following table. The additional DMVPN link uses cloud 2 parameters.

Table 7 . DMVPN Hub IP Address Information

DMVPN Cloud

DMVPN Hub Public Address (Actual)

DMVPN Hub Public Address (Externally routable after NAT)

NHS (DMVPN Hub mGRE Tunnel Address)

1 10.4.32.133 172.16.130.1 10.4.34.1

2 10.4.32.134 172.17.130.1 10.4.36.1

NHRP requires all devices within a DMVPN cloud to use the same network ID and authentication key. The NHRP cache holdtime should be configured to 600 seconds.

This design supports DMVPN spoke routers that receive their external IP addresses through DHCP. It is possible for these routers to acquire different IP addresses after a reload. When the router attempts to register with the NHRP server, it may appear as a duplicate to an entry already in the cache and be rejected. The registration no- unique option allow existing cache entries to be overwritten. This feature is only required on NHRP clients (DMVPN spoke routers).

Page 27: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

24Deploying a DMVPN WAN with 3G

The ip nhrp redirect command allows the DMVPN hub to notify spoke routers that a more optimal path may exist to a destination network, which may be required for DMVPN spoke-to-spoke direct communications. DMVPN spoke routers also use shortcut switching when building spoke-to-spoke tunnels.

interface Tunnel [number] ip nhrp authentication [password] ip nhrp map [NHS IP address] [DMVPN hub outside IP address] ip nhrp map multicast [DMVPN hub outside IP address] ip nhrp network-id [network id] ip nhrp holdtime 600 ip nhrp nhs [NHS IP address] ip nhrp registration no-unique ip nhrp shortcut ip nhrp redirect

Step 4: Configure the LAN instance of EIGRP.

The remote site LAN networks must be advertised. The IP assignment for the remote sites was designed so that all of the networks in use can be sum-marized within a single aggregate route. The summary address as configured below suppresses the more specific routes. If any network within the summary is present in the route table, the summary is advertised to the DMVPN hub, which offers a measure of resiliency. If the various LAN networks cannot be summarized, then EIGRP continues to advertise the specific routes.

interface Tunnel [number] ip summary-address eigrp [as number (dmvpn)] [summary network] [summary mask]

Example for Procedure 3:interface Tunnel10 bandwidth 1500 ip address 10.4.34.221 255.255.254.0 no ip redirects ip mtu 1400 ip nhrp authentication cisco123 ip nhrp map 10.4.34.1 172.16.130.1 ip nhrp map multicast 172.16.130.1 ip nhrp network-id 101 ip nhrp holdtime 600 ip nhrp nhs 10.4.34.1 ip nhrp registration no- unique ip nhrp shortcut ip tcp adjust- mss 1360 ip summary- address eigrp 200 10.5.72.0 255.255.248.0 tunnel source Dialer1

tunnel mode gre multipoint tunnel vrf INET-PUBLIC tunnel protection ipsec profile DMVPN-PROFILE

Procedure 4 Configure the DMVPN Instance of EIGRP

An additional EIGRP-201 process runs on the DMVPN spoke router for the second DMVPN cloud. All interfaces on the router are EIGRP interfaces, but only the DMVPN tunnel interface is non-passive. The network range must include all interface IP addresses either in a single network statement or in multiple network statements. This design uses a best practice of assigning the router ID to a loopback address. All DMVPN spoke routers should run EIGRP stub routing to improve network stability and reduce resource utilization.

Step 1: Assign the router ID to a loopback address.router eigrp [as number (dmvpn)] network [mGRE tunnel network] [inverse mask] network [WAN remote range] [inverse mask] passive-interface default no passive-interface [mGRE tunnel interface] eigrp router-id [IP address of Loopback0] eigrp stub connected summary no auto-summary

Example for Procedure 4:router eigrp 200 network 10.4.36.0 0.0.1.255 network 10.5.0.0 0.0.255.255 passive-interface default no passive-interface Tunnel10 eigrp router-id 10.5.172.254 eigrp stub connected summary no auto-summary

Page 28: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

25Deploying a DMVPN WAN with 3G

Procedure 5 Monitor Upstream MPLS Neighbor

The MPLS VPN is the primary WAN transport, and as long as it is operational, the 3G interface remains shutdown.

The remote-site router can use the IP SLA feature to send echo probes to its MPLS PE router and if the PE router becomes unreachable, then the router can use the Embedded Event Manager (EEM) to dynamically enable the 3G interface.

Step 1: Enable the IP SLA probe.

Standard ICMP echo (ping) probes are used, and are sent at 15 second intervals. Responses must be received before the timeout of 1000 ms expires. If using the MPLS PE router as the probe destination, the destination address is the same as the BGP neighbor address already configured.

ip sla [probe number] icmp-echo [probe destination IP address] source-interface [WAN interface] timeout 1000 threshold 1000 frequency 15 ip sla schedule [probe number] life forever start-time now

Step 2: Configure Enhanced Object Tracking.

This step links the status of the IP SLA probe to an object which is monitored by EEM scripts.

track [object number] ip sla [probe number] reachability

Step 3: Configure EEM Scripting to Enable or Disable 3G Interface.

An event-tracking EEM script monitors the state of an object and runs router IOS commands for that particular state. It is also a best practice to generate syslog messages that provide status information regarding EEM.

event manager applet [EEM script name] event track [object number] state [tracked object state] action [sequence 1] cli command “[command 1]” action [sequence 2] cli command “[command 2]” action [sequence 3] cli command “[command 3]” action [sequence …] cli command “[command …]” action [sequence N] syslog msg “[syslog message text]”

Example for Procedure 5:

track 60 ip sla 100 reachabilityip sla 100 icmp-echo 192.168.4.18 source-interface GigabitEthernet0/0 threshold 1000 frequency 15ip sla schedule 100 life forever start-time now

EEM script to enable 3G interface upon MPLS link failure:

event manager applet ACTIVATE-3G event track 60 state down action 1 cli command “enable” action 2 cli command “configure terminal” action 3 cli command “interface cellular0/0/0” action 4 cli command “no shutdown” action 5 cli command “end” action 99 syslog msg “Activating 3G interface”

EEM script to disable 3G interface upon MPLS link restoration:

event manager applet DEACTIVATE-3G event track 60 state up action 1 cli command “enable” action 2 cli command “configure terminal” action 3 cli command “interface cellular0/0/0” action 4 cli command “shutdown” action 5 cli command “end” action 99 syslog msg “Deactivating 3G interface”

Page 29: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

26Appendix A: Configuration

Appendix A: Configuration

Table 8 shows the IP address information for Branch 221.

Table 8 . Branch 221—IP Address Information

Remote-Site Information Wired Subnets Wireless Subnets Operational IP Assignments

Location Net BlockData (Vlan 64)

Vlan (Vlan 69)

Data (Vlan 65)

Vlan (Vlan 70) Loopbacks and Switches WAE

Branch 221 10.5.72.0/21 10.5.76.0/24 10.5.77.0/24 10.5.74.0/24 10.5.75.0/24 10.5.72.254 (r) 10.5.76.5 (sw)

10.5.76.8

bn-br221-1941

!! Last configuration change at 08:44:42 PST Mon Nov 22 2010!version 15.1service timestamps debug datetime msec localtimeservice timestamps log datetime msec localtimeservice password-encryption!hostname bn-br221-1941!boot-start-markerboot system flash flash0:c1900-universalk9-mz.SPA.151-3.T.binboot-end-marker!!enable secret 5 $1$byBV$KuiLdYDEeg.7GCWRK6ebu0!no aaa new-model!clock timezone PST -8 0clock summer-time PDT recurringservice-module wlan-ap 0 bootimage autonomous!no ipv6 cefip source-routeip cef!

!!ip vrf INET-PUBLIC rd 65512:1!ip multicast-routing !!no ip domain lookupip domain name cisco.local!multilink bundle-name authenticated!chat-script gsm “” “atdt*98*1#” TIMEOUT 30 “CONNECT”crypto pki token default removal timeout 0!!license udi pid CISCO1941W-A/K9 sn FHK132670AAhw-module ism 0!!!username admin privilege 15 password 7 104D580A061843595F!redundancy!!!

Page 30: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

27Appendix A: Configuration

!controller Cellular 0/0!ip ftp username bnip ftp password 7 01100F175804ip ssh source-interface Loopback0ip ssh version 2!track 60 ip sla 100 reachability! crypto keyring DMVPN-KEYRING vrf INET-PUBLIC pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123!crypto isakmp policy 10 encr aes 256 authentication pre-share group 2crypto isakmp keepalive 30 5crypto isakmp profile FVRF-ISAKMP-INET-PUBLIC keyring DMVPN-KEYRING match identity address 0.0.0.0 INET-PUBLIC!!crypto ipsec transform-set AES256/SHA/TRANSPORT esp-aes 256 esp-sha-hmac mode transport!crypto ipsec profile DMVPN-PROFILE set transform-set AES256/SHA/TRANSPORT set isakmp-profile FVRF-ISAKMP-INET-PUBLIC!!!!!interface Loopback0 ip address 10.5.72.254 255.255.255.255 ip pim sparse-mode!interface Tunnel10 ip address 10.4.34.221 255.255.254.0 no ip redirects ip mtu 1400 ip pim dr-priority 0 ip pim nbma-mode ip pim sparse-mode ip nhrp authentication cisco123

ip nhrp map 10.4.34.1 172.16.130.1 ip nhrp map multicast 172.16.130.1 ip nhrp network-id 101 ip nhrp holdtime 600 ip nhrp nhs 10.4.34.1 ip nhrp registration no-unique ip nhrp shortcut ip tcp adjust-mss 1360 ip summary-address eigrp 200 10.5.72.0 255.255.248.0 tunnel source Dialer1 tunnel mode gre multipoint tunnel vrf INET-PUBLIC tunnel protection ipsec profile DMVPN-PROFILE!interface GigabitEthernet0/0 ip address 192.168.4.17 255.255.255.252 ip pim sparse-mode duplex auto speed auto!interface GigabitEthernet0/1 no ip address duplex auto speed auto!interface GigabitEthernet0/1.64 description Data1 encapsulation dot1Q 64 ip address 10.5.76.1 255.255.255.0 ip helper-address 10.4.48.10 ip pim sparse-mode!interface GigabitEthernet0/1.65 description wireless data encapsulation dot1Q 65 ip address 10.5.74.1 255.255.255.0 ip helper-address 10.4.48.10 ip pim sparse-mode!interface GigabitEthernet0/1.69 description voice 1 encapsulation dot1Q 69 ip address 10.5.77.1 255.255.255.0 ip helper-address 10.4.48.10 ip pim sparse-mode!interface GigabitEthernet0/1.70

Page 31: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

28Appendix A: Configuration

description wireless voice encapsulation dot1Q 70 ip address 10.5.75.1 255.255.255.0 ip helper-address 10.4.48.10 ip pim sparse-mode!interface Cellular0/0/0 no ip address encapsulation ppp shutdown dialer in-band dialer pool-member 1 no peer default ip address async mode interactive fair-queue 64 16 256 no ppp lcp fast-start!interface Vlan1 no ip address!interface Dialer1 ip vrf forwarding INET-PUBLIC ip address negotiated encapsulation ppp dialer pool 1 dialer idle-timeout 0 dialer string gsm dialer persistent dialer-group 1 no ppp lcp fast-start ppp chap hostname quortus ppp chap password 7 06171F205F5D1E1D ppp ipcp address accept ppp timeout retry 120 ppp timeout ncp 30!!router eigrp 200 network 10.4.34.0 0.0.1.255 network 10.5.0.0 0.0.255.255 passive-interface default no passive-interface Tunnel10 eigrp router-id 10.5.172.254 eigrp stub connected summary!router bgp 65511 bgp router-id 10.5.72.254

bgp log-neighbor-changes network 10.5.76.0 mask 255.255.255.0 network 10.5.77.0 mask 255.255.255.0 network 192.168.4.16 mask 255.255.255.252 aggregate-address 10.5.72.0 255.255.248.0 summary-only neighbor 192.168.4.18 remote-as 65402 no auto-summary!ip forward-protocol nd!ip bgp-community new-formatip pim rp-address 10.4.40.252 10ip pim register-source Loopback0no ip http serverno ip http secure-server!ip route vrf INET-PUBLIC 0.0.0.0 0.0.0.0 Dialer1!ip sla 100 icmp-echo 192.168.4.18 source-interface GigabitEthernet0/0 threshold 1000 frequency 15ip sla schedule 100 life forever start-time nowaccess-list 10 permit 239.1.0.0 0.0.255.255dialer-list 1 protocol ip permit!!!!!!control-plane!!alias exec qping ping vrf INET-PUBLIC 192.168.100.1 repeat 25alias exec phub ping vrf INET-PUBLIC 10.194.123.16 repeat 10!line con 0line aux 0line 0/0/0 script dialer gsm no exec rxspeed 3600000 txspeed 384000line 67 no activation-character no exec

Page 32: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

29Appendix A: Configuration

transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 sshline vty 0 4 exec-timeout 0 0 login local transport input all!scheduler allocate 20000 1000ntp source Loopback0ntp update-calendarntp server 10.4.48.17event manager applet ACTIVATE-3G event track 60 state down action 1 cli command “enable” action 2 cli command “configure terminal” action 3 cli command “interface cellular0/0/0” action 4 cli command “no shutdown” action 5 cli command “end” action 99 syslog msg “Activating 3G interface”event manager applet DEACTIVATE-3G event track 60 state up action 1 cli command “enable” action 2 cli command “configure terminal” action 3 cli command “interface cellular0/0/0” action 4 cli command “shutdown” action 5 cli command “end” action 99 syslog msg “Deactivating 3G interface”!end

Page 33: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

30Appendix B: SBA for Enterprise Organizations Document System

Appendix B: SBA for Enterprise Organizations Document System

Advanced Guest Wireless

Network Device Authentication and Authorization

Collapsed Campusand Data Center Core

Wireless CleanAir

3G Wireless Remote Site

Layer 2 WAN

Group Encrypted Transport VPN

VPN Remote Site

Lumension Data Security

CREDANT Data Security

CiscoData Security

Splunk SIEM

RSA SIEM

nFx SIEM

LogLogic SIEM

ArcSight SIEM

Cisco SIEM

ConfigurationFiles

ConfigurationFiles

Service and Availability–Cisco LMS

Service and Availability–SolarWinds

Network Analysisand Reporting

Traffic Analysis–Netflow and SolarWinds

Cisco LANManagement Solution

Traffic Analysis–Netflow and NetQoS

SolarWinds

Network Management

ConfigurationFiles

Supplemental Guides

Supplemental Guides

Supplemental Guides

Foundation

LAN

WAN

IPv6 Addressing

Design Overview

Design Guides Deployment Guides

You are Here

Internet Edge

Page 34: SBA Ent BN 3GWirelessRemoteSiteDeploymentGuide-H1CY11

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.

Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)

Americas HeadquartersCisco Systems, Inc.San Jose, CA

Asia Pacific HeadquartersCisco Systems (USA) Pte. Ltd.Singapore

Europe HeadquartersCisco Systems International BVAmsterdam, The Netherlands

SMART BUSINESS ARCHITECTURE

C07-653868-SBA-01 04/11


Recommended