Front Door Vrf

Under the geographic separation scenario eompls would normally be used to link the two ip networks.
Front door vrf. The ivrf of these tunnels can be different and. By using front door vrf we are isolating transport network usually internet facing and this allows us to configure default route that won t interfere with routing in our global table. One or more ipsec tunnels can terminate on a single interface. The concept is called fvrf ipsec or in english front door vrf ipsec.
Modify the tunnel interface to stitch the tunnel to the front door vrf. There are other benefits of this design and it s quite commonly used in the sp enterprise world. If no vrf aware config is used everything is done in the global vrf and all interfaces are in the global vrf. Front door vrf or outside vrf the vrf that contain the encrypted traffic.
The crypto isakmp key command doesn t support vrfs. As you can see we did not move the tunnel11 interface from the global routing table to the routing table for vrf pipe. Sets the destination address of a tunnel. Create front door vrf named fvrf on r1 and r4.
Router config if tunnel destination ip address. This step is only required when configuring a front door vrf fvrf. Optional associates a vpn routing and forwarding instance vrf with a specific tunnel destination interface or subinterface. Router ospf 100 vrf pipe router id 13 13 13 13 4.
If you don t use a keyring you won t be able to apply the key to the isakmp profile so the ipsec configuration won t have access to a. Crypto map based with ivrf cust1 vrf and fvrf internet vrf. Configuring physical interface on r1 and r4 to be vrf aware. Vrf name name assigned to the vrf.
The fvrf of all these tunnels is the same and is set to the vrf that is confi gured on that interface. The routing instance that is used if no specific vrf is defined. All we did is stitch them together. Note front door vrf fvrf is only supported as of cisco ios release 12 2 33 sxh and later.
The key must be defined in a keyring.