08.02.2015 Views

Table of Contents

Table of Contents

Table of Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

down the tunnel. Unfortunately, it then brings the tunnel back up, which causes the<br />

routes to constantly change and the tunnel to become unstable.<br />

The solutions to this problem are either to stop using tunnels (recommended in this<br />

case) or to filter the remote side <strong>of</strong> the tunnel so it is not included in the routing protocol<br />

being run through the tunnel (EIGRP). Installing a VPN would work as well, as the<br />

VPN would hide the “public” networks from the “inside” <strong>of</strong> either side, thus alleviating<br />

the problem. Looking at our configurations, we can see the problem is that we’ve included<br />

the loopback networks in our EIGRP processes. Removing them solves our<br />

recursive route problems:<br />

Router-A (config)#router eigrp 100<br />

Router-A(config-router)# no network 10.100.100.0 0.0.0.255<br />

Here’s the new configuration for Router A:<br />

router eigrp 100<br />

network 10.10.10.0 0.0.0.255<br />

network 172.16.0.0 0.0.0.255<br />

no auto-summary<br />

We’ll do the same on Router D for its loopback network, and then we’ll be able to see<br />

the desired result on Router A. Now the route to the remote loopback address has been<br />

learned through RIP, and the route to the remote Ethernet has been learned through<br />

EIGRP:<br />

Router-A#sho ip route<br />

Gateway <strong>of</strong> last resort is not set<br />

C<br />

D<br />

C<br />

C<br />

R<br />

C<br />

R<br />

R<br />

172.16.0.0/24 is subnetted, 1 subnets<br />

172.16.0.0 is directly connected, Tunnel0<br />

10.0.0.0/8 is variably subnetted, 4 subnets, 2 masks<br />

10.20.20.0/24 [90/297246976] via 172.16.0.2, 00:03:23, Tunnel0<br />

10.10.10.0/24 is directly connected, Ethernet0/1<br />

10.100.100.100/32 is directly connected, Loopback0<br />

10.200.200.200/32 [120/3] via 192.168.1.2, 00:00:11, Serial0/1<br />

192.168.1.0/24 is directly connected, Serial0/1<br />

192.168.2.0/24 [120/1] via 192.168.1.2, 00:00:12, Serial0/1<br />

192.168.3.0/24 [120/2] via 192.168.1.2, 00:00:12, Serial0/1<br />

GRE tunnels are not usually a good idea, because they complicate networks. If someone<br />

were troubleshooting the network we just built, the tunnel would only add complexity.<br />

Usually, introducing a GRE tunnel into a network without a clear need is the result <strong>of</strong><br />

poor planning or design. Routing across a VPN is one <strong>of</strong> the few legitimate needs for a<br />

GRE tunnel (IPSec, the protocol widely used in VPN, does not forward multicast or<br />

broadcast packets, so GRE is required).<br />

Running a GRE tunnel through a VPN tunnel can get you the routing protocol link you<br />

need. Why not just run the GRE tunnel Remember that GRE does not encrypt data.<br />

Figure 12-5 shows a common layout incorporating GRE over VPN.<br />

GRE Tunnels and Routing Protocols | 177

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!