In this video we will configure the front door vrf feature over a dmvpn phase 3 network.
Front door vrf cvd.
Cisco s validated design cvd for iwan suggests the use of front door vrfs in an iwan environment.
The outer encapsulated packet belongs to one vrf domain called the front door vrf fvrf while the inner protected ip packet belongs to another domain called the inside vrf ivrf.
Both cvd types provide a tested starting point for cisco partners or customers to begin designing and deploying systems.
Both r1 and r4 will learn about the tunnel destination address via underlying protocol i e.
Configure ikev2 and ipsec 10.
The key must be defined in a keyring.
Cvd foundation series this cvd foundation guide is a part of the august 2014 series.
As cisco develops a cvd foundation series the guides themselves are tested together in the same network lab.
Both cvd types provide a tested starting point for cisco partners or customers to begin designing and deploying systems.
In order to understand the use of front door vrfs let us use a simple topology as below where we will create a simple gre tunnel between r1 and r4.
Flexibility with multiple design models in order to address a variety of wan technologies and resiliency op tions increased reliability with multiple remote site designs that provide for resiliency through the addition of wan.
Configure the wan facing vrf 8.
There are many ways an organization can benefit by deploying a cvd enterprise wan architecture.
Front door vrfs in a tunneled environment are really quite cool.
When you are using a front door vrf you can t define the key using the old crypto isakmp key command.
By using front door vrf we are isolating transport network usually internet facing and this allows us to configure default route that won t interfere with routing in our global table.
Configure the mgre tunnel 11.
Ospf in our case.
Connect to the mpls wan or internet 9.
Configure the routing protocol on the wan process use this process for the iwan hybrid design model and repeat it for each dmvpn hub router.
The crypto isakmp key command doesn t support vrfs.
Idea here is to have underlay network running in a vrf often called fvrf or front door vrf.
If you don t use a keyring you won t be able to apply the key to the isakmp profile so the ipsec configuration won t have access to a.