GRE Tunnel with NAT

From: Vishal Patel (vpatel@accessproviders.com.au)
Date: Tue Jun 21 2005 - 04:39:34 GMT-3


Guys,

Sorry in my previous mail the config was not in proper order,

My doubt is when a user on the LAN tries to go out of tunnel 55 for 0.0.0.0
route , will the packet have a source IP of tunnel IP address ( 10.250.3.1)
or will it have the source ip as the tunnel source IP address.(dialer
interface IP address)

I will send again:

Whittlesea-1712#sh run
Building configuration...

Current configuration : 2655 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Whittlesea-1712
!
boot-start-marker
boot-end-marker
!
logging buffered 4096 debugging
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
no aaa new-model
ip subnet-zero
!
!
!
!
ip cef
no ip domain lookup
ip ips po max-events 100
no ftp-server write-enable
!
!
!
!
!
!
!
!
interface Tunnel55
 description **** To 530-Collins ****
 ip address 10.250.3.1 255.255.255.252
 ip nat outside
 tunnel source Dialer1
 tunnel destination 202.130.198.241
!
interface Tunnel66
 description **** To TNH ****
 ip address 172.28.252.2 255.255.255.252
 tunnel source Dialer1
 tunnel destination 202.130.198.242
!
!
interface FastEthernet0
 description **** To Wireless-Internet-EMIS ****
 no ip address
 duplex auto
 speed auto
 pppoe enable
 pppoe-client dial-pool-number 1
!
interface FastEthernet1
 no ip address
 spanning-tree portfast
!
!
interface Vlan1
 description Internal-Interface
 ip address 172.28.207.1 255.255.255.224
 ip helper-address 172.28.160.27
 ip helper-address 172.28.224.9
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip nat inside
 ip virtual-reassembly
 ip route-cache flow
 ip tcp adjust-mss 1300
!
interface Dialer1
 ip address negotiated
 ip mtu 1492
 ip virtual-reassembly
 encapsulation ppp
 dialer pool 1
 dialer-group 1
 ppp authentication chap callin
 ppp chap hostname xxxx
 ppp chap password xxxx
!
ip classless
ip route 0.0.0.0 0.0.0.0 Tunnel 55
ip route 202.130.198.0 255.255.255.0 dialer 1
ip route 172.28.0.0 255.255.0.0 Tunnel66

no ip http server
no ip http secure-server
!
ip nat inside source list 100 interface Dialer1 overload
!
!
access-list 100 deny ip 172.28.207.0 0.0.0.127 172.28.209.128 0.0.0.127
access-list 100 deny ip 172.28.207.0 0.0.0.127 172.28.211.96 0.0.0.31
access-list 100 deny ip 172.28.207.0 0.0.0.127 172.28.211.64 0.0.0.31
access-list 100 deny ip 172.28.207.0 0.0.0.127 172.28.160.0 0.0.3.255
access-list 100 permit ip 172.28.207.0 0.0.0.127 any
dialer-list 1 protocol ip permit
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
 password Access
 login
!
end

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of John
Matus
Sent: Tuesday, 21 June 2005 3:24 PM
To: Brian Dennis; Group Study
Subject: Re: icmp - time-exceeded vs ttl-exceeded

brian..........i completely AGREE with you....i was just poking fun. i do
believe the best way to learn is to "lab-it-up", but unfortunaley some of us

don't have a personal rack we can just jump on and check things out on a
whim. i really wish i did. we have to wait for our lab-time to check stuff
out and usually we are doing (IE) labs and (i) often forget or don't have a
chance to test out little things.

Regards,

John D. Matus
MCSE, CCNP
Office: 818-782-2061
Cell: 818-430-8372
jmatus@pacbell.net
----- Original Message -----
From: "Brian Dennis" <bdennis@internetworkexpert.com>
To: "John Matus" <jmatus@pacbell.net>; "Group Study"
<ccielab@groupstudy.com>
Sent: Monday, June 20, 2005 9:33 PM
Subject: RE: icmp - time-exceeded vs ttl-exceeded

John,
You just need a PC and Ethereal (download free from
http://www.ethereal.com) to test this out.

Are we really helping if we just tell someone the answer? Part
of the CCIE preparation is learning how to solve problems. This is a
great one for somebody to solve. You would be amazed at the number of
networking engineers that can't tell you how traceroute works.

Lastly I'll bet that the socratic method is better for CCIE
preparation than the "spoon fed" method ;-)

Brian Dennis, CCIE #2210 (R&S/ISP-Dial/Security)
bdennis@internetworkexpert.com

Internetwork Expert, Inc.
http://www.InternetworkExpert.com
Toll Free: 877-224-8987
Direct: 775-745-6404 (Outside the US and Canada)

-----Original Message-----
From: John Matus [mailto:jmatus@pacbell.net]
Sent: Monday, June 20, 2005 8:56 PM
To: Brian Dennis; ccie2be; Group Study
Subject: Re: icmp - time-exceeded vs ttl-exceeded

being a philosphy major in college <wonders that did for my
marketability>,
i really despize socratic method/dialogue!!! :-p
it would be great if we all had labs to just "test stuff out on" hehehe

Regards,

John D. Matus
MCSE, CCNP
Office: 818-782-2061
Cell: 818-430-8372
jmatus@pacbell.net
----- Original Message -----
From: "Brian Dennis" <bdennis@internetworkexpert.com>
To: "ccie2be" <ccie2be@nyc.rr.com>; "Group Study"
<ccielab@groupstudy.com>
Sent: Monday, June 20, 2005 3:37 PM
Subject: RE: icmp - time-exceeded vs ttl-exceeded

> Tim,
> Did you think about trying the options out?
>
> Brian Dennis, CCIE #2210 (R&S/ISP-Dial/Security)
> bdennis@internetworkexpert.com
>
> Internetwork Expert, Inc.
> http://www.InternetworkExpert.com
> Toll Free: 877-224-8987
> Direct: 775-745-6404 (Outside the US and Canada)
>
> -----Original Message-----
> From: ccie2be [mailto:ccie2be@nyc.rr.com]
> Sent: Monday, June 20, 2005 3:25 PM
> To: Brian Dennis; 'Group Study'
> Subject: RE: icmp - time-exceeded vs ttl-exceeded
>
> Hi Brian,
>
> As you suggested I did look through the archives and found some
> interesting
> things that refreshed my memory about reflexive acl's and Traceroute
in
> general.
>
> But, none of the posts I could find talked about the difference
between
> time-exceeded vs ttl-exceeded.
>
> I accept the fact that I need to permit time-exceeded to fulfill the
> tasks
> in IE lab 2 and 3, but I'm still curious as to the difference between
> these
> 2 icmp options.
>
> My hope is that if I really knew the difference, it would be easier to
> remember which one to use under the pressure of the lab.
>
> Thanks, Tim
>
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf
Of
> Brian Dennis
> Sent: Monday, June 20, 2005 5:31 PM
> To: ccie2be; Group Study
> Subject: RE: icmp - time-exceede vs ttl-exceeded
>
> Tim,
> You should search the archive as there was a long discussion on
> this topic about a year ago. Also as far as using the traceroute
option
> for the ICMP type, if you understand how traceroute works you'll know
> why you don't use it.
>
> Brian Dennis, CCIE #2210 (R&S/ISP-Dial/Security)
> bdennis@internetworkexpert.com
>
> Internetwork Expert, Inc.
> http://www.InternetworkExpert.com
> Toll Free: 877-224-8987
> Direct: 775-745-6404 (Outside the US and Canada)
>
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf
Of
> ccie2be
> Sent: Monday, June 20, 2005 2:02 PM
> To: Group Study
> Subject: icmp - time-exceede vs ttl-exceeded
>
> Hi guys,
>
> Let's assume I want to configure a reflexive acl which allows
Traceroute
> packets back in.
>
> I'm trying to make sure I select the correct icmp type packet to allow
> back-in. But, when I do the following I see lots of options.
>
> R5(config)#access-list 101 perm icmp any any ?
> <0-255> ICMP message type
> administratively-prohibited Administratively prohibited
> alternate-address Alternate address
> conversion-error Datagram conversion
> dod-host-prohibited Host prohibited
> dod-net-prohibited Net prohibited
> dscp Match packets with given dscp value
> echo Echo (ping)
> echo-reply Echo reply
> fragments Check non-initial fragments
> general-parameter-problem Parameter problem
> host-isolated Host isolated
> host-precedence-unreachable Host unreachable for precedence
> host-redirect Host redirect
> host-tos-redirect Host redirect for TOS
> host-tos-unreachable Host unreachable for TOS
> host-unknown Host unknown
> host-unreachable Host unreachable
> information-reply Information replies
> information-request Information requests
> log Log matches against this entry
> log-input Log matches against this entry,
including
> input
> interface
> mask-reply Mask replies
> mask-request Mask requests
> mobile-redirect Mobile host redirect
> net-redirect Network redirect
> net-tos-redirect Net redirect for TOS
> net-tos-unreachable Network unreachable for TOS
> net-unreachable Net unreachable
> network-unknown Network unknown
> no-room-for-option Parameter required but no room
> option-missing Parameter required but not present
> packet-too-big Fragmentation needed and DF set
> parameter-problem All parameter problems
> port-unreachable Port unreachable
> precedence Match packets with given precedence
value
> precedence-unreachable Precedence cutoff
> protocol-unreachable Protocol unreachable
> reassembly-timeout Reassembly timeout
> redirect All redirects
> router-advertisement Router discovery advertisements
> router-solicitation Router discovery solicitations
> source-quench Source quenches
> source-route-failed Source route failed
>
>
> time-exceeded All time exceededs <-----
> **************
>
>
> time-range Specify a time-range
> timestamp-reply Timestamp replies
> timestamp-request Timestamp requests
> tos Match packets with given TOS value
>
>
> traceroute Traceroute
> <-----------#############
>
>
> ttl-exceeded TTL exceeded
> <-------------*****************
>
>
>
> unreachable All unreachables
> <cr>
>
>
> Notice how similar the 2 "starred" options look. What's the
difference
> between these 2 options?
>
> Also, if I need to allow Traceroute back-in, why wouldn't I use the
> traceroute option?
>
> TIA, Tim
>
>



This archive was generated by hypermail 2.1.4 : Wed Jul 06 2005 - 14:43:42 GMT-3