Telex IP-223 over GRE tunnel

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
I am having an issue where I can not use my IP-223's at either end of a GRE Tunnel.

I have a GRE Tunnel between my work and my home. The tunnel works fine, I can access devices at either end of the tunnel. I am able to login into the IP-223, C6200 and IP-1616 consoles at each location from either end. I am able to use the IP-223's at my home with the consoles at my home, and use the IP-223's at work with the console at work.

However I can not use the the IP-223's at work with the Consoles at my house, as well I can not use the IP-223's at home with the console at work.

I am using Cisco routers at both ends. the Home router is a 2811 ISR with a fixed IP, the work router is a 881 ISR with dynamic IP. The tunnel is an encrypted GRE tunnel with multicast routing enabled I have IP multicast routing configured at either end.

The best I can figure out is I don't have port forwarding configured correctly? maybe someone else has had this problem.

I would Like to get it figured out as I have a third location I would like to add IP-223's with radios to be able to access my repeaters in that county.
 

Bill_G

Prolific Contributor
Joined
Jan 31, 2015
Messages
853
I am having an issue where I can not use my IP-223's at either end of a GRE Tunnel.

I have a GRE Tunnel between my work and my home. The tunnel works fine, I can access devices at either end of the tunnel. I am able to login into the IP-223, C6200 and IP-1616 consoles at each location from either end. I am able to use the IP-223's at my home with the consoles at my home, and use the IP-223's at work with the console at work.

However I can not use the the IP-223's at work with the Consoles at my house, as well I can not use the IP-223's at home with the console at work.

I am using Cisco routers at both ends. the Home router is a 2811 ISR with a fixed IP, the work router is a 881 ISR with dynamic IP. The tunnel is an encrypted GRE tunnel with multicast routing enabled I have IP multicast routing configured at either end.

The best I can figure out is I don't have port forwarding configured correctly? maybe someone else has had this problem.

I would Like to get it figured out as I have a third location I would like to add IP-223's with radios to be able to access my repeaters in that county.

If you are able to ping the devices in either direction, and web into them to config, but not tx/rx, or use System Manager, then your routers are not actually passing multicast traffic.

You can test this by changing CSoft config to aim at the actual ip addy rather the multicast addy. Keep the ports the same. Just change the mcast addys. That forces UDP traffic.

If that works, and you need more than one console, then you will need a NEO-10 on the console end to do the translations. It will UDP across the unprotected public network to the IP223, and multicast to the consoles on the protected side.
 

adorsett

Contributing Member
CS Forums $upporter
Joined
Aug 9, 2020
Messages
27
GRE will definitely pass multicast when properly configured. So it’s either you don’t have multicast working correctly across the tunnel or you have an issue with your routes or both. Can you ping from your desktop at home (assuming it’s in the same subnet as your console) to the system at work to verify unicast routing? Are you able to verify it’s passing across the tunnel and not bypassing it? If that works, what do your mroutes look like? Want to post your router configs?

Andrew
 
  • Like
Reactions: ndp
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
Bill,
I need this to be multicast. I have three dispatch consoles that I use with all my IP-223. I have two at my home, one in my office and on in my shop. the third one is at my work. I don't think the unicast traffic and NEO10 is the solution since I need the IP-223s at either end of the tunnel to talk to Consoles on both sides of the tunnel.

Andrew, here are snippets of the config files for my routers. When I tried to multicast route the multicast address telex defaults too (225.8.11.81) the cisco routers wont accept it as a routable address. I was thinking I might need to use a routable multicast address 223.xx.xx.xx?

HOME:
interface Tunnel0
ip address 172.16.0.1 255.255.255.0
no ip redirects
ip mtu 1400
ip pim sparse-dense-mode
ip nhrp authentication XXXXX
ip nhrp map multicast dynamic
ip nhrp network-id 1
ip tcp adjust-mss 1360
keepalive 5 10
tunnel source FastEthernet0/0
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
!
ip multicast-routing
ip multicast multipath
ip dvmrp interoperability
!
interface FastEthernet0/0
description WAN$ETH-WAN$
ip address dhcp
ip pim sparse-dense-mode
ip nat outside
ip virtual-reassembly
ip route-cache flow
ip igmp query-interval 125
duplex auto
speed auto
!
interface Vlan10
ip address 10.10.10.1 255.255.248.0
ip pim sparse-dense-mode
ip virtual-reassembly
ip igmp join-group 225.8.11.81 >>multicast ip address used in telex
ip igmp access-group 1
!
ip route 10.10.11.0 255.255.255.0 172.16.0.2
ip mroute 10.10.11.0 255.255.255.0 172.16.0.2
!
WORK
ip multicast-routing
!
interface Tunnel0
ip address 172.16.0.2 255.255.255.0
no ip redirects
ip mtu 1400
ip pim sparse-dense-mode
ip nhrp authentication XXXXX
ip nhrp map multicast dynamic
ip nhrp map multicast 10.10.10.1
ip nhrp map 172.16.0.1 xxx.xxx.xxx.xxx (home router static IP)
ip nhrp network-id 1
ip nhrp nhs 172.16.0.1
ip nhrp registration no-unique
ip tcp adjust-mss 1360
keepalive 5 10
tunnel source FastEthernet4
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
!
interface FastEthernet4
description WAN
ip address dhcp
ip pim sparse-dense-mode
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
!
interface Vlan1
description VLAN1
ip address 10.10.11.1 255.255.248.0
ip pim sparse-dense-mode
ip nat inside
ip virtual-reassembly
!
ip mroute 10.10.10.0 255.255.255.0 172.16.0.1
ip route 10.10.10.0 255.255.255.0 172.16.0.1
 
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
Oh and just a follow up I tried what you said to do Bill and it works! but only for the console the IP-223 it pointed to! I need to figure out the multicast thing
 

Bill_G

Prolific Contributor
Joined
Jan 31, 2015
Messages
853
Oh and just a follow up I tried what you said to do Bill and it works! but only for the console the IP-223 it pointed to! I need to figure out the multicast thing

Good. Valid test proving the problem. Now you get to figure it out.

I am not a Cisco router guy. I can type in whatever someone tells me to, but writing new configs is not in my wheelhouse. That is bread and butter on somebody else's table. I successfully muddled Juniper SSG-5's for one customer, but just barely. I still suffer from the drain bramage it caused.
 

phonebuff

Prolific Contributor
CS Forums $upporter
Joined
Nov 10, 2013
Messages
678
@Mountain_Comm

First and foremost be careful, I have been called in to work on systems where the MultiCast from the Telex devices actually saturated a municipal MPLS. It happened because at one of the locations the IP-223s were tied to TVs so the console operators could listen to the TV in the headset and the Cisco Tunnels were taking all traffic everywhere and then echoing it back. Just like Unicast you have to subnet the MultiCast traffic and determine where it is going.

There is a great Telex planning worksheet that has been around for years to help with this -

I did get one Cisco solution in production after much effort on a state campus, and failed to ever get an Adtran solution to work. After both of these projects, or maybe it was during the second project I found the DCBNetwork solutions and never looked back..

https://www.dcbnet.com/products_radio.html

Side note having a Wireshark capture from all three sites that you can line up is very helpful with this kind of issue.

You should look at the IGMP snooping settings and remember regardless of how this is connected (Private Fiber / Public ISP) it is tunneled data.

Lastly from some very old notes (2011), that may or may not help --

On the Cisco Switches -- Can you identify what if any of these functions is active / disabled...

http://www.cisco.com/en/US/prod/col...s6406/product_data_sheet0900aecd80322c0c.html

• Internet Group Management Protocol (IGMP) Snooping for IPv4 and IPv6 MLD v1 and v2 Snooping provide fast client joins and leaves of multicast streams and limit bandwidth-intensive video traffic to only the requestors.


• Multicast VLAN Registration (MVR) continuously sends multicast streams in a multicast VLAN while isolating the streams from subscriber VLANs for bandwidth and security reasons.

• Per-port Broadcast, Multicast, and Unicast Storm Control prevents faulty end stations from degrading overall systems performance.
 

adorsett

Contributing Member
CS Forums $upporter
Joined
Aug 9, 2020
Messages
27
Bill,
I need this to be multicast. I have three dispatch consoles that I use with all my IP-223. I have two at my home, one in my office and on in my shop. the third one is at my work. I don't think the unicast traffic and NEO10 is the solution since I need the IP-223s at either end of the tunnel to talk to Consoles on both sides of the tunnel.

Andrew, here are snippets of the config files for my routers. When I tried to multicast route the multicast address telex defaults too (225.8.11.81) the cisco routers wont accept it as a routable address. I was thinking I might need to use a routable multicast address 223.xx.xx.xx?

HOME:
interface Tunnel0
ip address 172.16.0.1 255.255.255.0
no ip redirects
ip mtu 1400
ip pim sparse-dense-mode
ip nhrp authentication XXXXX
ip nhrp map multicast dynamic
ip nhrp network-id 1
ip tcp adjust-mss 1360
keepalive 5 10
tunnel source FastEthernet0/0
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
!
ip multicast-routing
ip multicast multipath
ip dvmrp interoperability
!
interface FastEthernet0/0
description WAN$ETH-WAN$
ip address dhcp
ip pim sparse-dense-mode
ip nat outside
ip virtual-reassembly
ip route-cache flow
ip igmp query-interval 125
duplex auto
speed auto
!
interface Vlan10
ip address 10.10.10.1 255.255.248.0
ip pim sparse-dense-mode
ip virtual-reassembly
ip igmp join-group 225.8.11.81 >>multicast ip address used in telex
ip igmp access-group 1
!
ip route 10.10.11.0 255.255.255.0 172.16.0.2
ip mroute 10.10.11.0 255.255.255.0 172.16.0.2
!
WORK
ip multicast-routing
!
interface Tunnel0
ip address 172.16.0.2 255.255.255.0
no ip redirects
ip mtu 1400
ip pim sparse-dense-mode
ip nhrp authentication XXXXX
ip nhrp map multicast dynamic
ip nhrp map multicast 10.10.10.1
ip nhrp map 172.16.0.1 xxx.xxx.xxx.xxx (home router static IP)
ip nhrp network-id 1
ip nhrp nhs 172.16.0.1
ip nhrp registration no-unique
ip tcp adjust-mss 1360
keepalive 5 10
tunnel source FastEthernet4
tunnel mode gre multipoint
tunnel protection ipsec profile protect-gre
!
interface FastEthernet4
description WAN
ip address dhcp
ip pim sparse-dense-mode
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
!
interface Vlan1
description VLAN1
ip address 10.10.11.1 255.255.248.0
ip pim sparse-dense-mode
ip nat inside
ip virtual-reassembly
!
ip mroute 10.10.10.0 255.255.255.0 172.16.0.1
ip route 10.10.10.0 255.255.255.0 172.16.0.1
Ok so your config has got a few issues I see right off the bat.

For one you’re actually running DMVPN instead of just plain GRE. Not an issue but it is a different beast in how we handle the control plane for traffic across the tunnel. It actually uses NHRP for destination lookups instead of just flat out forwarding of traffic. Makes your config significantly more complicated than it needs to be from the sounds of what you’re trying to do. Are you open to going back to normal GRE?

The second thing I see is your static routes have different subnet masks than your actual interfaces. Assuming your endpoints all fit in the /24 you won’t notice any issues, but it’s just not good practice. They should match.

Third you have pim running on the WAN interface and you shouldn’t. It should be on your tunnel and on your internal interfaces only.

You’ve got both static and dynamic mapping for multicast with NHRP.

So let’s start with, do you need DMVPN or can we go back to regular GRE and do it that way?

Andrew
 
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
First of my Cisco CLI skills are cut and paste. It is slowly coming to me, I had gone through a few revisions of the IP tunnel. I should first provide a bit of background about my Networks.

At home I have a Cisco ISR (2811) stuffed with a 16 port POE NM card, 8 port POE ether switch and a 2 port E&M card (not used, left over from an old idea). My home LAN has 4 VLANS. this is how I manage my different devices. all IP hardware is on one VLAN, printers, wired computers and other ethernet connected devices are on a second VLAN, WIFI devices are on a third and radio related stuff on a 4th VLAN. Ports on the ether switch cards are configure to allow access to certain VLANs. I could be very wrong here but this is how I am trying to limit propagation of multicast to my entire network. This router has a static IP

At work I have a designated router that all the Telexes devices (IP-223, IP-1616 console) and a IP camera are connected to. This router gets it IP from another router I have access to. This is a dynamic assignment.

The third location (my Cabin) also has a dynamic IP. I haven't yet configured the router here but it will be another CISCO 2811 ISR nearly identical to my HOME router. This router will also be the connection to my Mountain top sites which have MW IP running between them and eventually my cabin so that I can monitor the power systems and maybe one day access the repeaters directly.

A friend of mine also was to connect to my IP network, this will provide him access to some of our shared equipment as well as access to some of my Telex IP-223 for his console.

In total I am looking at 4 different ends of my network at present.

As I learned to create and build IP tunnels it seemed that given my scenario the DMVPN seemed most applicable. Right now my HOME router is the only router with a static IP. My understanding of the DMVPN tunnel is that it allow direct connections between the different spokes, and the the spoke router negotiate the desired spoke router address through the headend router (HOME router), this is my understanding but I may be wrong.

I recently changed my subnets I am in the process of reconfiguring the IP ranges with my different routers/ VLAN's originally I had used wrong addressing 192.169, 192.170 etc. I wanted to correct this an decided on Class A IP address scheme. Maybe my misunderstanding but the idea is that each router would have an address with a common subnet. HOME router 10.10.10.0 work 10.10.11.0 cabin 10.10.12.0 all would have a subnet 255.255.248.0 again this is my limited thinking here. I was under the impression if all the devices had the same subnet the could communicate??

I am pretty sure PIM is left over from something the didn't work and I did not remove it entirely, sloppy!

I don't fully understand NHRP, I got it for the firewall.cx website that has lots of information on configuring routers, and specifically Cisco hardware.

I think DMVPN is best given my growing network, but maybe you can help me decide. I think if anything the Telex project is really just the tip of the ice berg with my networking. On of my big projects this year is completing the MW IP links between my mountain tops, installing cameras and site monitoring. One of my sites is solar powered. The Solar charge controllers have IP connectivity which enables me to remotely monitor them. Also repeater linking over IP has huge advantages as I can leverage more links over IP than I could ever imagine using conventional RF.

TNX for your insight and input. also if this should be done via PM please let me know I don't want bore people with this.

Jim
 

adorsett

Contributing Member
CS Forums $upporter
Joined
Aug 9, 2020
Messages
27
This is great intel. I agree that based on your further clarification and the fact that your only site that has a static IP is your home, DMVPN really becomes your only option. That said, your config isn't right as you have ascertained. I was actually just typing up my response to your config (with working configs) as you replied. So I just deleted my entire post and I'm rewriting it and I rebuilt the configs as I had Work as the Hub instead of Home. One of the things I had written up was that I was looking over your configs earlier on my phone and I missed a glaring issue which is your subnet assignments. You have VLAN 1 and VLAN 10 at the two different sites as overlapping. That breaks everything. :)

Symantecs but there's no such thing as Class A, B, or C addresses anymore. We are all CIDR (Classless Interdomain Routing). But to your point, in RFC1918 there are several subnets defined that are available for usage and typically you'll find a 192.168.0.0/24 block used by most home networking gear. So your logic of using 10.0.0.0/8 or 172.16.0.0/16 addresses for these interfaces to avoid collisions with something someone might run at home is a good idea. In most of my lab gear I typically use 10 addresses just because it doesn't conflict with my way too complicated home subnetting plan.

Anyway, with the knowledge you want to use your home as the DMVPN Hub, I've created a config and validated it works. I didn't enable IPSec as a protection profile because that just adds a layer of complication. Get this working first and then enable IPSec on the tunnel.

hostname HOME ! ip multicast-routing ! interface Tunnel0 ip address 172.16.0.1 255.255.255.0 no ip redirects ip mtu 1400 ip pim sparse-dense-mode ip nhrp authentication cisco123 ip nhrp network-id 1 tunnel source GigabitEthernet0/0 tunnel mode gre multipoint ! interface GigabitEthernet0/0 ip address 200.200.200.1 255.255.255.0 ip nat outside ip virtual-reassembly in ! interface GigabitEthernet0/1 description VLAN10 ip address 10.10.10.1 255.255.255.0 ip pim sparse-dense-mode ip nat inside ip virtual-reassembly in ip igmp join-group 225.8.11.81 ! ip nat inside source list INSIDE_NETWORKS interface GigabitEthernet0/0 overload ip route 0.0.0.0 0.0.0.0 200.200.200.254 ip route 10.10.11.0 255.255.255.0 172.16.0.2 ! ip access-list standard INSIDE_NETWORKS permit 10.10.10.0 0.0.0.255

hostname WORK ! ip multicast-routing ! interface Tunnel0 ip address 172.16.0.2 255.255.255.0 no ip redirects ip mtu 1400 ip pim sparse-dense-mode ip nhrp authentication cisco123 ip nhrp map 172.16.0.1 200.200.200.1 ip nhrp map multicast 200.200.200.1 ip nhrp network-id 1 ip nhrp nhs 172.16.0.1 tunnel source GigabitEthernet0/0 tunnel mode gre multipoint ! interface GigabitEthernet0/0 ip address dhcp ip nat outside ip virtual-reassembly in ! interface GigabitEthernet0/1 description VLAN1 ip address 10.10.11.1 255.255.255.0 ip pim sparse-dense-mode ip nat inside ip virtual-reassembly in ip igmp join-group 225.8.11.81 ! ip nat inside source list INSIDE_NETWORKS interface GigabitEthernet0/0 overload ip route 10.10.10.0 255.255.255.0 172.16.0.1 ! ip access-list standard INSIDE_NETWORKS permit 10.10.11.0 0.0.0.255

To verify operation, on the work side I'd issue the command
ping 235.8.11.81 source gig 0/1

You'd see replies from 10.10.10.1 and 10.10.11.1 similar to the following:
WORK#ping 225.8.11.81 source gig 0/1 Type escape sequence to abort. Sending 1, 100-byte ICMP Echos to 225.8.11.81, timeout is 2 seconds: Packet sent with a source address of 10.10.11.1 Reply to request 0 from 10.10.11.1, 4 ms Reply to request 0 from 10.10.10.1, 31 ms Reply to request 0 from 10.10.10.1, 29 ms

Now this configuration obviously uses static routes and forced igmp joins. You can make all of that dynamic and I'd recommend at least making the routing dynamic once you start to scale this out because static routes are bad (unless they are hold down routes or a route of last resort).

Andrew
 
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
Andrew,
Wow thank you for this. I made the changes and things are working. here is what I get when I ping 225.8.11.81 source vlan 1 from the work router

Reply to request 0 from 10.10.11.1, 1 ms
Reply to request 0 from 172.16.0.1, 28 ms
Reply to request 0 from 172.16.0.1, 28 ms

I am getting a reply from tunnel0 of the home router. However I am able to communicate using the radios at work from home. 10.10.10.1 is the VLAN 10 on the home router.

I did have to make a few changes to the config you posted on both routers, the home router FA0/0 is the WAN port and is configured as DHCP, it gets it address from the AT&T NVG router the AT&T requires. On both routers the VLAN are there own interfaces and on the home router I did not implement ip route 0.0.0.0 0.0.0.0 200.200.200.254, or actually any iproute that would point any any out side instead I used the ACL of INSIDE_NETWORKS to limit what I wanted pointed out side my router. in this case VLANS 1&2, I would be in big trouble if the ipads and computers or Alexa didn' work> not so happy wife!

VLAN 10 devices can ping the work router devices.

I also made the sub net changes too, TNX for correcting me on this.

I already had IPSec running. I didn't make any changes there and things seem happy.

What little I know is Static routes are not the best. so maybe you can shed some light here? how do I fix this?

What you have helped me accomplish tonight is amazing I have been banging my head on the desk for the past couple weeks trying to get the Telex stuff at either end to talk!
 

adorsett

Contributing Member
CS Forums $upporter
Joined
Aug 9, 2020
Messages
27
I am getting a reply from tunnel0 of the home router. However I am able to communicate using the radios at work from home. 10.10.10.1 is the VLAN 10 on the home router.

This is likely a difference in you using real hardware and I used a virtual instance of IOSv. There's random nuances like that. The most important things are that the multicast traffic transited the tunnel and your system works.

I did have to make a few changes to the config you posted on both routers, the home router FA0/0 is the WAN port and is configured as DHCP, it gets it address from the AT&T NVG router the AT&T requires. On both routers the VLAN are there own interfaces and on the home router I did not implement ip route 0.0.0.0 0.0.0.0 200.200.200.254, or actually any iproute that would point any any out side instead I used the ACL of INSIDE_NETWORKS to limit what I wanted pointed out side my router. in this case VLANS 1&2, I would be in big trouble if the ipads and computers or Alexa didn' work> not so happy wife!

Yes, I was expecting you'd have to make changes to adapt to the difference in interface names and the fact you were using DHCP for your WAN interface. I wanted you to see which IPs went where, so I hard coded the hubs WAN interface so that you'd see the IP listed in the configuration and be able to match it to the commands where it was necessary to enter your WAN IP.

I wanted to take a moment and clarify what the commands do so that you understand them for when you roll out the other spokes.

This enables Multicast Routing (show ip mroute)
ip multicast-routing

The following config is on the Hub side of the network. We don't have to specify any IPs or mappings because in DMVPN, all spokes phone home into the hub and do the initiation of the tunnel.
interface Tunnel0
ip address 172.16.0.1 255.255.255.0 <-- All Tunnel Interfaces will need to be in this subnet. Think of the Tunnel 0 interfaces as all directly connected to each other on the same switch. They will need to directly communicate with each other, so we put them all in the same subnet.
no ip redirects ip mtu 1400
ip pim sparse-dense-mode <-- This tells the tunnel 0 interface to partcipate in PIM
ip nhrp authentication cisco123 <-- This is like the DMVPN password. It's used to control who can join the DMVPN network
ip nhrp network-id 1 <-- This is a unique number that identifies this particular DMVPN Network Instance. It will be the same across all devices on this DMVPN network. Sometimes we do crazy things like run multiple parallel DMVPN networks using the same routers on either end. We might do this to create private networks for different customers, or different classes of service or to match different physical paths. I've done it for numerous reasons over the years.
tunnel source GigabitEthernet0/0 <-- This sets the source IP address of the encapsulated tunnel traffic.
tunnel mode gre multipoint <-- This enables a form of GRE tunnel which supports multiple end points

interface GigabitEthernet0/0
ip address 200.200.200.1 255.255.255.0 <-- This is my hardcoded WAN IP. I put it here because you will have to manually enter the WAN IP of the Hub in all of the Spokes so they know where to phone home to.
ip nat outside ip virtual-reassembly in ! interface GigabitEthernet0/1 description VLAN10
ip address 10.10.10.1 255.255.255.0 <-- This is the local LAN subnet and must be unique at each site. If using static routing you will need to manually enter routes on the Hub side that point to this network across the tunnels.
ip pim sparse-dense-mode ip nat inside ip virtual-reassembly in
ip igmp join-group 225.8.11.81 <-- This forces the IGMP join for this LAN segment. If your device uses IGMP you don't have to do this and you might not want to as you'd want the multicast traffic to only flow when there's a receiver actually asking for it.
! ip nat inside source list INSIDE_NETWORKS interface GigabitEthernet0/0 overload <-- While people often call this NAT, it's actually PAT since we are having multiple source IPs all being masked as the same outside IP address. I point out this distinction because if you go looking in the help docs you'll need to look at PAT instead of NAT.
ip route 0.0.0.0 0.0.0.0 200.200.200.254 <-- Since I hard coded the WAN IP I need to set the gateway of last resort called the default gateway. When you get your WAN IP via DHCP, they will normally send you the default gateway in the DHCP reply and you won't need to hard code this. In fact, you shouldn't if you're using DHCP because your default gateway may change if your WAN IP changes.
ip route 10.10.11.0 255.255.255.0 172.16.0.2 <-- Since I'm not running OSPF, EIGRP or RIP (ewww) I have to set a static route that points traffic destined for the Spoke LAN to the proper Spoke tunnel endpoint IP. You'll have to do this for every single spoke you add unless you enable a dynamic routing protocol.
! ip access-list standard INSIDE_NETWORKS permit 10.10.10.0 0.0.0.255 <-- This is the ACL that controls the PAT translation. It matches on source IP and if the source IP is in the permit, it translates the source IP to be the WAN IP per the PAT command earlier.

Now let's look at the Spoke side. I'll remove most of the other config to make this simpler and focus only on the DMVPN portion.
interface Tunnel0 ip address 172.16.0.2 255.255.255.0 <-- As we said above, each tunnel endpoint must have a unique IP in the same subnet as all the others. I hate .1 default gateways and as a matter of preference always put my upstreams at the top of the IP block. For instance if I did your config, my Hub would have been numbered 172.16.0.254. Then I would number my spokes starting at 172.16.0.1. That way Spoke 1 would be .1 and Spoke 2 would be .2 and so on. It's just my personal preference. Doing things like that also makes DHCP pools cleaner if you ever set those up because they start issuing addresses at the bottom of the subnet (.1) and I put all my infrastructure stuff at the top. Usually I reserve .250 - .254 for things I might need to run the network. Like if I use HSRP I'd have Router1 as .253, Router2 as .252 and my HSRP IP would be .254. Anyway it's again just personal preference.
no ip redirects ip mtu 1400 ip pim sparse-dense-mode ip nhrp authentication cisco123
ip nhrp map 172.16.0.1 200.200.200.1 <-- This is the first command that is unique to spokes. We need to know how to reach the hub since we are the one initiating contact. This command gives us a mapping of the inner tunnel IP of the Hub to its outer WAN IP. We only have to enter the mapping statically for the Hub routers because all other routers will be learned dynamically on the fly via NHRP. If you were running Dual Hub DMVPN then you'd have two mappings for the two hubs.
ip nhrp map multicast 200.200.200.1 <-- This is a static mapping telling us where to point multicast traffic to for distribution. We will take the multicast traffic and encapsulate it in a unicast frame destined for this IP and let the HUB be responsible for further distribution. This means that all multicast traffic is sent to the Hub even if it's not needed there. We have to do it this way because the underlying transport (Internet) is not multicast enabled and because the distribution tree can get quite complex if we tried to send MC from Spoke to Spoke. In this case we send it all to the Hub and the Hub is responsible for reflecting it down to the Spokes.
ip nhrp network-id 1
ip nhrp nhs 172.16.0.1 <-- This tells us that the Next Hop Lookup Server is running on 172.16.0.1. This command is matched to the static mapping command above to determine how to send lookup requests to the DMVPN Hub (NHRP Server) for resolution.
tunnel source GigabitEthernet0/0 tunnel mode gre multipoint ! ip route 10.10.10.0 255.255.255.0 172.16.0.1 <-- Again we aren't running dynamic routing so we have to hardcode the routing across the tunnel.

This is the most basic DMVPN configuration you can possibly have. As such it's functional but it does have some issues. Foremost is that you have to add static routes on the hub and every single spoke to reach from end to end. Most people use DMVPN because they want to enable spoke-to-spoke traffic which gets rather painful and dangerous when you have to configure static routes and you may not have direct connectivity everywhere. That’s when you’d switch to dynamic routing.
Now the more I think about your application the more I’m seeing it as primarily hub and spoke traffic flows. Especially since that’s how your multicast will flow. I can see several reasons to have your unicast traffic to follow the same path for simplicity and that would enable you to configure a supernet route on the spokes which forwards all internal traffic via the tunnel to the hub. Then the hub will have each subnet as an individual route pointed to the proper spoke. Makes your config simple and clean.

For instance, assuming spokes are 10.10.X.0/24 where X represents the LAN subnet for each spoke.

On all the Spokes we’d add a single supernet route pointing to the hub.
ip route 10.10.0.0 255.255.0.0 172.16.0.1

Then on the hub we’d have:
ip route 10.10.11.0 255.255.255.0 172.16.0.2 ip route 10.10.12.0 255.255.255.0 172.16.0.3 ip route 10.10.13.0 255.255.255.0 172.16.0.4 …

Now if you didn’t want to go that way, we could enable dynamic routing using an IGP like OSPF. That introduces a number of complications. One of those is how traffic will be handled when the tunnel is down. A basic OSPF configuration will cause us to leak traffic around the tunnel when it's down. This is because traffic destined for the remote LAN will be checked against the routing table and it will match the default route and will be sent towards the WAN bypassing the inactive tunnel since a route learned via OSPF will not be present. Since we have PAT enabled we will start blasting traffic out to the Internet that should have been dropped and never left our network. Probably not a good behavior. This means that you need to now insert a null route that will be used to black hole (or squash) traffic when the dynamic routing protocol is down.

ip route 10.10.11.0 255.255.255.0 null 0 250

That route will only appear in the table when a route with a better metric does not exist. It's fairly typical to use a metric of 250 for black hole or hold down routes.

Anyway there are other things that we sometimes enable that do more complicated things such as provide redundancy (dual hub and/or using loopbacks if we have multiple uplinks) or greater traffic isolation (VRFs) but those can get extremely complex.

Andrew
 
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
Andrew,
Outstanding! I wish i had asked this question sooner. Not only have you fixed my multicast issue but you have provided me ( and other I hope) a much better understanding of GRE tunnels. You no have me reevaluating my configurations. Like I said this is the tip of the ice burg with what I am doing. I need to make these changes now before I go any further.
I will be changing the hub routers tunnel address to .254, what you said make sense.

I have a vague understanding of why static routes are not ideal. but I do not understand dynamic routing like OSPF, EIGRP or RIP. I have to admit I do have RIP running on my home router, if I recall it was because I needed to route between VLANs??? It has been there awhile, I likely copied it from so instruction I was reading.

Another question comes to mind. That is with the CABIN router. It will have (or likely have 2 WAN connections. one will be to the internet the second will be for the MW IP links to my repeater sites. Each site will have its own subnet ie 10.10.14.0 and 10.10.15.0. It seems obvious how to create the static routes from the CABIN router to both WANs but how will I create the routes for the rest of the routers in my GRE tunnel? would I do something like ip route 10.10.14.0 255.255.255.0 172.16.0.3? 172.16.0.3 being the tunnel IP address of my CABIN router? when this traffic arrives at the CABIN router will it see the 10.10.14.0 address and forward it onto the WAN port facing the MW IP links? or would I have a tunnel through my CABIN router for the mountain top sites address? I would still want to be able to access the devices on the mountain tops from the CABIN router.

This part of the network is still aways off. I am hoping to get the CABIN router configured in the next couple weeks. I am going to try leaving a RPi running tailscale there so can configure things or really fix them if I mess up from my home router.

TNX Jim
 

adorsett

Contributing Member
CS Forums $upporter
Joined
Aug 9, 2020
Messages
27
I have a vague understanding of why static routes are not ideal. but I do not understand dynamic routing like OSPF, EIGRP or RIP. I have to admit I do have RIP running on my home router, if I recall it was because I needed to route between VLANs??? It has been there awhile, I likely copied it from so instruction I was reading.

Unless you have more than one router in a location you should not need RIP. So it's likely not doing anything except spewing packets out on your LAN for no reason.

Another question comes to mind. That is with the CABIN router. It will have (or likely have 2 WAN connections. one will be to the internet the second will be for the MW IP links to my repeater sites. Each site will have its own subnet ie 10.10.14.0 and 10.10.15.0. It seems obvious how to create the static routes from the CABIN router to both WANs but how will I create the routes for the rest of the routers in my GRE tunnel? would I do something like ip route 10.10.14.0 255.255.255.0 172.16.0.3? 172.16.0.3 being the tunnel IP address of my CABIN router? when this traffic arrives at the CABIN router will it see the 10.10.14.0 address and forward it onto the WAN port facing the MW IP links? or would I have a tunnel through my CABIN router for the mountain top sites address? I would still want to be able to access the devices on the mountain tops from the CABIN router.

I want to make sure I'm following you fully because the devil is always in the details.... The only way to get to the Mountain Top sites is from the Cabin, correct? There's no other path from them back to the Internet? And do you want those MW links encrypted with IPSec or is it ok to not tunnel them?

I would say the best thing is to create a stick figure drawing of what you are thinking. Leave addresses and such off for now, but let's see the devices and the paths, then we can architect a good solution.

That said, I had some time this week to build out a very cookie cutter DMVPN configuration that easily scales to over 250 sites with a simple to use and understand subnetting plan. It will easily handle a situation where you might have MW links off the Cabin and want to route to those through the Cabin router all with static routing.

My plan was to also add config snippets that will handle Quantar linking for those that need. Unfortunately, I don't have any Quantars yet to test with so I'm relying on others to test and verify commands before I put them in the template.

As for the raw DMVPN portion, I'm creating the last bit of the drawings to make it easier to understand and will post that later today or tomorrow. Gotta run to a customer site for a meeting this afternoon.

Andrew
 
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
Correct. As of now the only Internet access the Mountain Top sites will have will be through the CABIN router. HOWEVER this may change, the CABIN router has very slow DSL IP, ok for voice but very slow for video. Once I get all the IP networking between the sites working I will look into another source of Internet access. I am considering even bring internet IP back through the Mountain top sites to the CABIN router to have a better internet connection. For now I want to get things set up with what Internet access I have.

I will create some sort of stick figure crayon drawing of what I am doing.

Thank you for all the help, Jim
 
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
This is kind of the big picture. Some of this wont be developed for another year. Ham #5 and Mountain top#3 are existing on their own networks are included to demonstrate the need of Ham#3. Ham #3 has interest in being connected to both networks.

Al the IP phones are for a private phone system so that some one who is working at any site can call another site for trouble shooting etc. I didn't list every device at each location. The CABIN-Mountain Top #1-Mountain Top#2 has redundant 900 and 5ghz links. Mountain top # 1 will have a 900Mhz AP that the other sites can see. 900 will exist for 5Ghz configuration as well as a limited bandwidth connection. I have Canopy 9000APF units for this. The 5Ghz links are Cambuim PTP 250 or 400 links with either 2ft MW antennas of flat panel, depending on the path requirements.

I probably used the wrong icons in lots of places. I wanted to get something drawn that made some sort of sense.

TNX jim
 
OP
M

Mountain_Comm

Regular Member
Joined
Feb 27, 2021
Messages
11
So I though I could tackle this one but I can not seem to figure it out. I configured my cabin router this weekend. I have the tunnel configured with IPSEC, I can communicate with devices at both my home router and work router. I can use my IP-223 at my cabin IF configure the multicast address like Bill_G said todo to test and see if it works, which it does I can use the radios thru the IP-223 using UDP. However I can not get the multicast to work. I configured the cabin router the same as the work router except I used 10.10.12.X (VLAN 10) for the cabin router ip range for the IP-223. this is the result when I ping the multicast address at the cabin router

CabinRouter#ping 225.8.11.81
Reply to request 0 from 10.10.12.1, 4 ms
Reply to request 0 from 172.16.0.1, 56 ms
CabinRouter#ping 225.8.11.81 source vlan 10
Reply to request 0 from 10.10.12.1, 4 ms
Reply to request 0 from 172.16.0.1, 56 ms

This is the Home Router
HomeRouter#ping 225.8.11.81
Reply to request 0 from 10.10.11.1, 56 ms
Reply to request 0 from 10.10.11.1, 36 ms
Reply to request 0 from 10.10.10.1, 8 ms
HomeRouter#ping 225.8.11.81 source vlan 10
Reply to request 0 from 10.10.10.1, 8 ms
Reply to request 0 from 10.10.11.1, 40 ms
Reply to request 0 from 10.10.11.1, 40 ms

This is the Work Router
WORKROUTER#ping 225.8.11.81
Reply to request 0 from 10.10.11.1, 1 ms
Reply to request 0 from 172.16.0.1, 32 ms
Reply to request 0 from 172.16.0.1, 28 ms
WORKROUTER#ping 225.8.11.81 source vlan 1
Reply to request 0 from 10.10.11.1, 4 ms
Reply to request 0 from 172.16.0.1, 32 ms
Reply to request 0 from 172.16.0.1, 28 ms

I think I have something wrong with the ip routing at the home router. but I can not seem to figure it out
ip route 10.10.11.0 255.255.255.0 172.16.0.2 << VLAN the IP-223's at work use
ip route 10.10.12.0 255.255.255.0 172.16.0.3 << Vlan the IP-223 uses at the cabin router
ip route 10.12.1.0 255.255.255.0 172.16.0.3 << Other Vlan at cabin router
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip http path flash:CME_GUI
ip mroute 10.10.11.0 255.255.255.0 172.16.0.2 << VLAN the IP-223's at work use
ip mroute 10.10.12.0 255.255.255.0 172.16.0.3 << Vlan the IP-223 uses at the cabin router

the VLANs the IP-223's are assigned to at each of the routers are configured the same

interface VlanX
description Radio
ip address 10.10.X.1 255.255.255.0
ip pim sparse-dense-mode
ip nat inside
ip virtual-reassembly
ip igmp join-group 225.8.11.81

I have very closely compared the configs of the two spoke routers and I cant see anything hat I missed. both have ip multicast routing enabled.

I sure though I had this!!!

TNX Jim
 

mmmmchicken

New Member
Joined
Mar 19, 2021
Messages
1
Try setting your static MROUTE to point at the tunnel interface vs the VLAN.

ip mroute 10.10.11.0 255.255.255.0 tunnel 10

You can also do a show ip pim neighbor on each router to see if they've formed a PIM adjacency via the tunnel.

And a show ip mroute or show ip mroute 225.8.11.81 to see where the router expects to send the traffic.