DSL PPPoE

Feature history for DSL PPPoe

Table 1. Feature History

Feature Name

Release Information

Description

Support for Dialer Interface in DSL

Cisco IOS XE Release 17.3.2

Cisco vManage Release 20.3.1

This feature enables tracking of a Point-to-Point Protocol (PPP) session over a dialer interface on Cisco IOS XE Catalyst SD-WAN devices.

Dialer interface is used in Digital Subscriber Line (DSL) in the deployments of Point-to-Point Protocol over Ethernet (PPPoE), Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA). Dialer interface always stay up irrespective of the PPP session status. This helps to avoid the need for additional configuration such as IP SLA and tracking for routing failover to work while using dialer interfaces.

The following command is added to configure dialer down-with-vInterface which brings the dialer interface down when the PPP session goes down.

Configure DSL PPPoE

Use one of these methods to configure DSL PPPoE:

Configure DSL PPPoE using a configuration group

Follow these steps to configure DSL PPPoE using a configuration group.

Before you begin

On the Configuration > Configuration Groups page, choose SD-WAN as the solution type.

Procedure


Step 1

From the Cisco SD-WAN Manager menu, choose Configuration > Configuration Groups.

Step 2

Create and configure the DSL PPPoE parameters in a Transport and Management Profile.

  1. Configure basic configuration.

    Table 2. Basic Configuration

    Parameter Name

    Description

    Controller Slot*

    Enter the slot number of the controller, in the following format:

    slot/subslot/port (for example, 0/2/0)

    Controller Mode

    Select the operating mode of the DSL controller from the drop-down list:

    • ADSL1: Use ITU G.992.1 Annex A full-rate mode, which provides a downstream rate of 1.3 Mbps and an upstream rate of 1.8 Mbps.

    • ADSL2: Use ITU G.992.3 Annex A, Annex L, and Annex M, which provides a downstream rate of 12 Mbps and an upstream rate of 1.3 Mbps.

    • ADSL2+: Use ITU G.992.5 Annex A and Annex M, which provides a downstream rate of 24 Mbps and an upstream rate of 3.3 Mbps.

    • ANSI: Operating in ADSL2/2+ mode, as defined in ITU G.991.1, G.992.3, and G992.5, Annex A and Annex M, and in VDSL2 mode, as defined in ITU-T G993.2.

    • VDSL2: Operate in VDSL2 mode, as defined in ITU-T G.993.2, which uses frequencies of up to 30 MHz to provide a downstream rate of 200 Mbps and an upstream rate of 100 Mbps.

    SRA

    Disabled by default. Enable SRA to disable seamless rate adaptation on the interface. SRA adjusts the line rate based on current line conditions.

    Dialer Pool Member*

    Enter the number of the dialer pool to which the interface belongs.

    Range: 1 through 255

  2. Configure Ethernet.

    Table 3. Ethernet

    Parameter Name

    Description

    Ethernet Interface Name *

    Enter the name of an ethernet interface.

    For IOS XE routers, you must spell out the interface names completely (for example, GigabitEthernet0/0/0).

    Description

    Enter a description for the interface.

    VLAN ID

    Enter the VLAN identifier of the Ethernet interface.

  3. Configure PPP.

    Table 4. PPP

    Parameter Name

    Description

    PPP Authentication Protocol

    Select the authentication protocol used by the MLP:

    • PAP: Enter the username and password that are provided by your ISP. username can be up to 254 characters.

    • CHAP: Enter the hostname and password provided by your Internet Service Provider (ISP). hostname can be up to 254 characters.

    • PAP and CHAP: Configure both authentication protocols. Enter the login credentials for each protocol.

    Authentication Type

    Select the type authentication from one of the following options:

    • Unidirectional: Only the side receiving the call (NAS) authenticates the remote side (client). The remote client does not authenticate the server.

    • Bidirectional: Each side independently sends an Authenticate-Request (AUTH-REQ) and receives either an Authenticate-Acknowledge (AUTH-ACK) or Authenticate-Not Acknowledged (AUTH-NAK).

    CHAP Hostname*

    Enter the CHAP hostname.

    CHAP Password*

    Enter the CHAP password.

    PAP Hostname*

    Enter the PAP hostname.

    PAP Password*

    Enter the PAP password.

  4. Configure Tunnel.

    Table 5. Tunnel

    Parameter Name

    Description

    Tunnel Interface

    Per Tunnel QoS

    Enable per tunnel QoS and choose from the following values to configure hub-to-spoke network topologies:

    • Spoke

    • Hub

    Color

    Select a color for the TLOC.

    Color Description

    Minimum supported release: Cisco Catalyst SD-WAN Manager Release 20.18.1

    Enter a description associated to the TLOC color.

    Groups

    Enter the list of groups in the field.

    Exclude Controller Group List

    Set the Cisco SD-WAN Controllers that the tunnel interface is not allowed to connect to.

    Range: 0 through 100

    Maximum Control Connections

    Specify the maximum number of Cisco SD-WAN Controllers that the WAN tunnel interface can connect to. To have the tunnel establish no control connections, set the number to 0.

    Range: 0 through 8

    Default: 2

    Cisco SD-WAN Manager Connection Preference

    Set the preference for using a tunnel interface to exchange control traffic with Cisco SD-WAN Manager.

    Range: 0 through 8

    Default: 5

    Tunnel TCP MSS

    TCP MSS affects any packet that contains an initial TCP header that flows through the router. When configured, TCP MSS is examined against the MSS exchanged in the three-way handshake. The MSS in the header is lowered if the configured TCP MSS setting is lower than the MSS in the header. If the MSS header value is already lower than the TCP MSS, the packets flow through unmodified. The host at the end of the tunnel uses the lower setting of the two hosts. To configure TCP MSS, provide a value that is 40 bytes lower than the minimum path MTU.

    Specify the MSS of TPC SYN packets passing through the Cisco IOS XE Catalyst SD-WAN. By default, the MSS is dynamically adjusted based on the interface or tunnel MTU such that TCP SYN packets are never fragmented.

    Range: 552 through 1460 bytes

    Default: None

    Border

    From the drop-down list, select Global. Click On to set TLOC as border TLOC.

    Validator As Stun Server

    Click On to enable Session Traversal Utilities for NAT (STUN) to allow the tunnel interface to discover its public IP address and port number when the router is located behind a NAT.

    Full Port Hop

    Minimum release: Cisco IOS XE Catalyst SD-WAN Release 17.18.1a

    Enable full port hopping at the TLOC level to allow devices to establish connections with controllers by switching to the next port if the current port is blocked or non-functional.

    Default: Disabled

    Port Hop

    From the drop-down list, select Global. Click Off to allow port hopping on tunnel interface.

    Default: On, which disallows port hopping on tunnel interface.

    Starting from Cisco IOS XE Catalyst SD-WAN Release 17.18.1a, tthis field is deprecated. Instead use the Full Port Hop option. See the Full Port Hop field.

    Low-Bandwidth Link

    Click On to set the tunnel interface as a low-bandwidth link.

    Default: Off

    Clear-Dont-Fragment

    Configure Clear-Dont-Fragment for packets that arrive at an interface that has Don't Fragment configured. If these packets are larger than what MTU allows, they are dropped. If you clear the Don't Fragment bit, the packets are fragmented and sent.

    Click On to clear the Dont Fragment bit in the IPv4 packet header for packets being transmitted out of the interface. When the Dont Fragment bit is cleared, the router fragments packets larger than the MTU of the interface before sending the packets.

    Note

     

    Clear-Dont-Fragment clears the Dont Fragment bit and the Dont Fragment bit is set. For packets not requiring fragmentation, the Dont Fragment bit is not affected.

    Network Broadcast

    From the drop-down list, select Global. Click On to accept and respond to network-prefix-directed broadcasts. Enable this parameter only if the Directed Broadcast is enabled on the LAN interface feature template.

    Default: Off

    Carrier

    From the drop-down list, select Globaland select the carrier name or private network identifier to associate with the tunnel.

    Values: carrier1, carrier2, carrier3, carrier4, carrier5, carrier6, carrier7, carrier8, default.

    Default: default

    Bind Loopback Tunnel

    Enter the name of a physical interface to bind to a loopback interface. The interface name has the following format:

    geslot/port

    NAT Refresh Interval

    Set the interval between NAT refresh packets sent on a DTLS or TLS WAN transport connection.

    Range: 1 through 60 seconds

    Default: 5 seconds

    Hello Interval

    Enter the interval between Hello packets sent on a DTLS or TLS WAN transport connection.

    Range: 100 through 10000 milliseconds

    Default: 1000 milliseconds (1 second)

    Hello Tolerance

    Enter the time to wait for a Hello packet on a DTLS or TLS WAN transport connection before declaring that transport tunnel to be down.

    Range: 12 through 60 seconds

    Default: 12 seconds

    The default hello interval is 1000 milliseconds, and it can be a time in the range 100 through 600000 milliseconds (10 minutes). The default hello tolerance is 12 seconds, and it can be a time in the range 12 through 600 seconds (10 minutes). To reduce outgoing control packets on a TLOC, it is recommended that on the tunnel interface you set the hello interval to 60000 milliseconds (10 minutes) and the hello tolerance to 600 seconds (10 minutes) and include the no track-transport disable regular checking of the DTLS connection between the edge device and the controller. For a tunnel connection between a edge device and any controller device, the tunnel uses the hello interval and tolerance times configured on the edge device. This choice is made to minimize the traffic sent over the tunnel, to allow for situations where the cost of a link is a function of the amount of traffic traversing the link. The hello interval and tolerance times are chosen separately for each tunnel between a edge device and a controller device. Another step taken to minimize the amount of control plane traffic is to not send or receive OMP control traffic over a cellular interface when other interfaces are available. This behavior is inherent in the software and is not configurable.

    Last Resort Circuit

    Select to use the tunnel interface as the circuit of last resort.

    Note

     

    It is assumed that an interface configured as a circuit of last resort is unavailable and is skipped while calculating the number of control connections. As a result, the cellular modem becomes dormant, and no traffic is sent over the circuit.

    When the configurations are activated on the edge device with cellular interfaces, all the interfaces begin the process of establishing control and BFD connections. When one or more of the primary interfaces establishes a BFD connection, the circuit of last resort shuts itself down.

    If the primary interfaces lose their connections to remote edges, the circuit of last resort activates itself, triggering a BFD TLOC Down alarm and a Control TLOC Down alarm on the edge device. The last resort interfaces are a backup circuit on edge device and are activated when all other transport links BFD sessions fail. In this mode, the radio interface is turned off, and no control or data connections exist over the cellular interface.

    Allow Services

    Click On or Off for each service to allow or disallow the service on the cellular interface.

    Encapsulation

    Encapsulation

    Enable atleast one of the following encapsulation methods:
    • IPsec: Enter a value to set the preference for directing traffic to the tunnel. A higher value is preferred over a lower value.

      Range: 0 through 4294967295

      Default: 0

      • IPsec Preference: From the drop-down list, select Global and enter a value to set the preference for directing traffic to the tunnel. A higher value is preferred over a lower value.

        Range: 0 through 4294967295

        Default: 0

      • IPsec Weight: From the drop-down list, select Global and enter a value to set weight for balancing traffic across multiple TLOCs. A higher value sends more traffic to the tunnel.

        Range: 1 through 255

        Default: 1

    • GRE: Enter a value to set GRE preference for TLOC.

      Range: 0 through 4294967295

      • GRE Preference: From the drop-down list, select Global and enter a value to set the preference for directing traffic to the tunnel. A higher value is preferred over a lower value.

        Range: 0 through 4294967295

        Default: 0

      • GRE Weight: From the drop-down list, select Global and enter a value to set weight for balancing traffic across multiple TLOCs. A higher value sends more traffic to the tunnel.

        Range: 1 through 255

        Default: 1

  5. Configure NAT.

    Table 6. NAT

    Parameter Name

    Description

    UDP Timeout (Minutes)

    Specify when NAT translations over UDP sessions time out.

    Range: 1 through 65536 minutes

    Default: 1 minute

    TCP Timeout (Minutes)

    Specify when NAT translations over TCP sessions time out.

    Range: 1 through 65536 minutes

    Default: 60 minutes (1 hour)

  6. Configure QoS.

    Table 7. QoS

    Parameter Name

    Description

    Adaptive QoS

    Enter adaptive QoS parameters. You can leave the additional details at as default or specify your values.

    • Adapt Period (Minutes): Choose Global from the drop-down list, click On, and enter the period in minutes.

    • Shaping Rate Upstream: Choose Global from the drop-down list, click On, and enter the minimum, maximum, and default upstream bandwidth in Kbps.

    • Shaping Rate Downstream: Choose Global from the drop-down list, click On, and enter the minimum, maximum, downstream, and upstream bandwidth in Kbps.

    Shaping Rate (kbps)

    Choose Global from the drop-down list and configure the aggreate traffic transmission rate on the interface to be less than line rate, in kilobits per second (kbps).

    Range: 8 through 100000000

  7. Configure ACL.

    Table 8. ACL

    Parameter Name

    Description

    IPv4 Ingress Access List

    Enter the name of an IPv4 access list to packets being received on the interface.

    IPv4 Egress Access List

    Enter the name of an IPv4 access list to packets being transmitted on the interface.

    IPv6 Ingress Access List

    Enter the name of an IPv6 access list to packets being received on the interface.

    IPv6 Egress Access List

    Enter the name of an IPv6 access list to packets being transmitted on the interface.

  8. Configure advanced parameters.

    Table 9. Advanced

    Parameter Name

    Description

    Shutdown

    Click No to enable the interface.

    Tracker / Tracker Group

    Enter the name of a tracker or tracker group to track the status of transport interfaces that connect to the internet.

    PPP Maximum Payload

    Enter the maximum receive unit (MRU) value to be negotiated during PPP-over-Ethernet negotiation.

    Range: 64 through 1792 bytes

    Service Provider

    Specify the details of the service provider.

    Bandwidth Upstream (Kbps)

    Specify the bandwidth value to generate notifications when the bandwidth of traffic transmitted on a physical interface exceeds the value.

    Bandwidth Downstream (Kbps)

    Specify the bandwidth value to generate notifications when the bandwidth of traffic transmitted on a physical interface exceeds the value.

    IP MTU

    Enter the maximum MTU size of packets on the interface.

    Range: 576 through 1804

    Default: 1500.

    TCP MSS

    Enter the maximum segment size (MSS) of TPC SYN packets passing through the router. By default, the MSS is dynamically adjusted based on the interface or tunnel MTU such that TCP SYN packets are never fragmented.

    Range: 552 through 1460 bytes

    Default: 1500

    TLOC Extension

    Enter the name of a physical interface on the same router that connects to the WAN transport. This configuration binds the service-side interface to the WAN transport by enabling a device to access the opposite WAN transport connected to the neighbouring device using a TLOC-extension interface.

    IP Directed Broadcast

    From the drop-down list, select Global to enable IP Directed Broadcast.

    An IP directed broadcast is an IP packet whose destination address is a valid broadcast address for some IP subnet but which originates from a node that is not itself part of that destination subnet.

    Tracker / Tracker Group

    Enter the name of a tracker or tracker group to track the status of transport interfaces that connect to the internet.


What to do next

Also see Deploy a configuration group.

Configure DSL PPPoE using templates

Follow these steps to confgure DSL PPPoE using a feature template.

You configure PPP-over-Ethernet interfaces on routers with DSL NIM modules, to provide support for service provider digital subscriber line (DSL) functionality.

Use the VPN Interface DSL PPPoE template for Cisco IOS XE Catalyst SD-WAN devices.

Procedure


Step 1

From the Cisco SD-WAN Manager menu, choose Configuration > Templates.

Step 2

Click Device Templates.

In Cisco vManage Release 20.7.x and earlier releases, Device Templates is titled Device.

Step 3

From the Create Template drop-down list, select From Feature Template.

  1. From the Device Model drop-down list, select the type of device for which you are creating the template.

  2. Click Transport & Management VPN or scroll to the Transport & Management VPN section.

  3. Under Additional VPN 0 Templates, click VPN Interface DSL PPPoE.

  4. From the VPN Interface DSL PPPoE drop-down list, click Create Template. The VPN Interface DSL PPPoA template form is displayed. This form contains fields for naming the template, and fields for defining VPN Interface PPP parameters.

  5. In Template Name, enter a name for the template. The name can be up to 128 characters and can contain only alphanumeric characters.

  6. In Template Description, enter a description of the template. The description can be up to 2048 characters and can contain only alphanumeric characters.

Step 4

Configure the following VPN Interface DSL PPPoE parameters.

  1. Configure basic VDSL controller functionality in a VPN.

    If your deployment includes devices with DSL, you must include DSL interface templates in Cisco SD-WAN Manager, even if these templates are not used.
    Table 10.

    Parameter Name

    Description

    Shutdown*

    Click No to enable the VDSL controller interface.

    Controller VDSL Slot*

    Enter the slot number of the controller VDSL interface, in the format slot/subslot/port (for example, 0/2/0).

    Mode*

    Select the operating mode of the VDSL controller from the drop-down:

    • Auto—Default mode.

    • ADSL1—Use ITU G.992.1 Annex A full-rate mode, which provides a downstream rate of 1.3 Mbps and an upstream rate of 1.8 Mbps.

    • ADSL2—Use ITU G.992.3 Annex A, Annex L, and Annex M, which provides a downstream rate of 12 Mbps and an upstream rate of 1.3 Mbps.

    • ADSL2+— Use ITU G.992.5 Annex A and Annex M, which provides a downstream rate of 24 Mbps and an upstream rate of 3.3 Mbps.

    • ANSI—Operating in ADSL2/2+ mode, as defined in ITU G.991.1, G.992.3, and G992.5, Annex A and Annex M, and in VDSL2 mode, as defined in ITU-T G993.2.

    • VDSL2—Operate in VDSL2 mode, as defined in ITU-T G.993.2, which uses frequencies of up to 30 MHz to provide a downstream rate of 200 Mbps and an upstream rate of 100 Mbps..

    VDSL Modem Configuration

    Enter a command to send to the DSL modem in the NIM module. If the command is valid, it is executed and the results are returned to the Cisco SD-WAN Manager NMS. If the command is not valid, it is not executed.

    SRA

    Click Yes to enable seamless rate adaptation on the interface. SRA adjusts the line rate based on current line conditions.

  2. Configure an Ethernet interface on the VDSL controller.

    Table 11.

    Parameter Name

    Description

    Ethernet Interface Name

    Enter a name for the Ethernet interface, in the format subslot/port (for example 2/0). You do not need to enter the slot number, because it must always be 0.

    VLAN ID

    Enter the VLAN identifier of the Ethernet interface.

    Description

    Enter a description for the interface.

    Dialer Pool Member

    Enter the number of the dialer pool to which the interface belongs. It can be a value from 1 through 255.

    PPP Max Payload

    Enter the maximum receive unit (MRU) value to be negotiated during PPP Link Control Protocol (LCP) negotiation.

    Range: 64 through 1792 bytes

    Dialer IP

    Configure the IP prefix of the dialer interface. This prefix is that of the node in the destination that the interface calls. 

    • Negotiated—Use the address that is obtained during IPCP negotiation.

  3. Configure the PPP authentication protocol.

    Table 12.

    Parameter Name

    Description

    Authentication Protocol

    Select the authentication protocol used by the MLP:

    • CHAP—Enter the hostname and password provided by your Internet Service Provider (ISP). hostname can be up to 254 characters.

    • PAP—Enter the username and password that are provided by your ISP. username can be up to 254 characters.

    • PAP and CHAP—Configure both authentication protocols. Enter the login credentials for each protocol. To use the same username and password for both, click Same Credentials for PAP and CHAP.

  4. Configure a tunnel interface for the multilink interface.

    Table 13.

    Parameter Name

    Description

    Tunnel Interface

    Click On to create a tunnel interface.

    Color

    Select a color for the TLOC.

    Color Description

    Minimum supported release: Cisco Catalyst SD-WAN Manager Release 20.18.1

    Enter a description associated to the TLOC color.

    Control Connection

    By default, Control Conection is set to On, which establishes a control connection for the TLOC. If the router has multiple TLOCs, click No to have the tunnel not establish control connection for the TLOC.

    Note

     

    We recommend a minimum of 650-700 Kbps bandwidth with default 1 sec hello-interval and 12 sec hello-tolerance parameters configured to avoid any data/packet loss in connection traffic.

    For each BFD session, an additional average sized BFD packet of 175 Bytes consumes 1.4 Kbps of bandwidth.

    A sample calculation of the required bandwidth for bidirectional BFD packet flow is given below:

    • 650 – 700 Kbps per device for control connections.

    • 175 Bytes (or 1.4 Kbps) per BFD session on the device (request)

    • 175 Bytes (or 1.4 Kbps) per BFD session on the device (response)

    If the path MTU discovery (PMTUD) is enabled, bandwidth for send/receive BFD packets per tunnel for every 30 secs:

    A 1500 Bytes BFD request packet is sent per tunnel every 30 secs:

    1500 Bytes * 8 bits/1 byte * 1 packet / 30 secs = 400 bps (request)

    A 147 Bytes BFD packet is sent in response:

    147 Bytes * 8 bits/1 byte * 1 packet / 30 secs = 40 bps (response)

    Therefore, a device with 775 BFD sessions (for example) requires a bandwidth of:

    700k + (1.4k*775) + (400 *775) + (1.4k*775) + (40 *775) = ~3,5 MBps

    • STATE—specifies the vdaemon control state.

      Last Connection—If no control connection on that WAN interface, the uptime of the device is lifted.

      SPI Time Remaining—countdown to the next change in SPI for IPSec. The countdown starts at half of the rekey time.

    Maximum Control Connections

    Specify the maximum number of Cisco SD-WAN Controllers that the WAN tunnel interface can connect to. To have the tunnel establish no control connections, set the number to 0.

    Range: 0 through 8

    Default: 2

    Cisco SD-WAN Validator As STUN Server

    Click On to enable Session Traversal Utilities for NAT (STUN) to allow the tunnel interface to discover its public IP address and port number when the router is located behind a NAT.

    Exclude Controller Group List

    Set the Cisco SD-WAN Controllers that the tunnel interface is not allowed to connect to.

    Range: 0 through 100

    Cisco SD-WAN Manager Connection Preference

    Set the preference for using a tunnel interface to exchange control traffic with the Cisco SD-WAN Manager NMS.

    Range: 0 through 8

    Default: 5

    Full Port Hop

    Minimum release: Cisco Catalyst SD-WAN Manager Release 20.18.1

    Enable full port hopping at the TLOC level to allow devices to establish connections with controllers by switching to the next port if the current port is blocked or non-functional.

    Default: Disabled

    Port Hop

    Click On to enable port hopping, or click Off to disable it. When a router is behind a NAT, port hopping rotates through a pool of preselected OMP port numbers (called base ports) to establish DTLS connections with other routers when a connection attempt is unsuccessful. The default base ports are 12346, 12366, 12386, 12406, and 12426. To modify the base ports, set a port offset value.

    Default: Enabled.

    Starting from Cisco Catalyst SD-WAN Manager Release 20.18.1, this field is deprecated. Instead use the Full Port Hop option. See the Full Port Hop field.

    Low-Bandwidth Link

    Select to characterize the tunnel interface as a low-bandwidth link.

    Tunnel TCP MSS

    TCP MSS affects any packet that contains an initial TCP header that flows through the router. When configured, TCP MSS is examined against the MSS exchanged in the three-way handshake. The MSS in the header is lowered if the configured TCP MSS setting is lower than the MSS in the header. If the MSS header value is already lower than the TCP MSS, the packets flow through unmodified. The host at the end of the tunnel uses the lower setting of the two hosts. If the TCP MSS is to be configured, it should be set at 40 bytes lower than the minimum path MTU.

    Specify the MSS of TPC SYN packets passing through the Cisco IOS XE Catalyst SD-WAN device. By default, the MSS is dynamically adjusted based on the interface or tunnel MTU such that TCP SYN packets are never fragmented.

    Range: 552 to 1460 bytes

    Default: None

    Clear-Dont-Fragment

    Configure Clear-Dont-Fragment for packets that arrive at an interface that has Don't Fragment configured. If these packets are larger than what MTU allows, they are dropped. If you clear the Don't Fragment bit, the packets are fragmented and sent.

    Click On to clear the Dont Fragment bit in the IPv4 packet header for packets being transmitted out of the interface. When the Dont Fragment bit is cleared, packets larger than the MTU of the interface are fragmented before being sent.

    Note

     

    Clear-Dont-Fragment clears the Dont Fragment bit and the Dont Fragment bit is set. For packets not requiring fragmentation, the Dont Fragment bit is not affected.

    Allow Service

    Select On or On for each service to allow or disallow the service on the interface.

    To configure additional tunnel interface parameters, click Advanced Options and configure the following parameters:

    Table 14.

    Parameter Name

    Description

    GRE

    Use GRE encapsulation on the tunnel interface. By default, GRE is disabled.

    If you select both IPsec and GRE encapsulations, two TLOCs are created for the tunnel interface that have the same IP addresses and colors, but that differ by their encapsulation.

    IPsec

    Use IPsec encapsulation on the tunnel interface. By default, IPsec is enabled.

    If you select both IPsec and GRE encapsulations, two TLOCs are created for the tunnel interface that have the same IP addresses and colors, but that differ by their encapsulation.

    IPsec Preference

    Specify a preference value for directing traffic to the tunnel. A higher value is preferred over a lower value.

    Range: 0 through 4294967295

    Default: 0

    IPsec Weight

    Enter a weight to use to balance traffic across multiple TLOCs. A higher value sends more traffic to the tunnel.

    Range: 1 through 255

    Default: 1

    Carrier

    Select the carrier name or private network identifier to associate with the tunnel.

    Values: carrier1, carrier2, carrier3, carrier4, carrier5, carrier6, carrier7, carrier8, default

    Default: default

    Bind Loopback Tunnel

    Enter the name of a physical interface to bind to a loopback interface.

    Last-Resort Circuit

    Select to use the tunnel interface as the circuit of last resort.

    Note

     

    An interface configured as a circuit of last resort is expected to be down and is skipped while calculating the number of control connections, the cellular modem becomes dormant, and no traffic is sent over the circuit.

    When the configurations are activated on the edge device with cellular interfaces, then all the interfaces begin the process of establishing control and BFD connections. When one or more of the primary interfaces establishes a BFD connection, the circuit of last resort shuts itself down.

    Only when all the primary interfaces lose their connections to remote edges, then the circuit of last resort activates itself triggering a BFD TLOC Down alarm and a Control TLOC Down alarm on the edge device. The last resort interfaces are used as backup circuit on edge device and are activated when all other transport links BFD sessions fail. In this mode the radio interface is turned off, and no control or data connections exist over the cellular interface.

    NAT Refresh Interval

    Enter the interval between NAT refresh packets that are sent on a DTLS or TLS WAN transport connection.

    Range: 1 through 60 seconds.

    Default: 5 seconds.

    Hello Interval

    Enter the interval between Hello packets sent on a DTLS or TLS WAN transport connection.

    Range: 100 through 10000 milliseconds.

    Default: 1000 milliseconds (1 second).

    Hello Tolerance

    Enter the time to wait for a Hello packet on a DTLS or TLS WAN transport connection before declaring that transport tunnel to be down.

    Range: 12 through 60 seconds.

    Default: 12 seconds.

  5. Configure an interface to act as a NAT device for applications such as port forwarding.

    Parameter Name

    Description

    NAT

    Click On to have the interface act as a NAT device.

    Refresh Mode

    Select how NAT mappings are refreshed, either outbound or bidirectional (outbound and inbound).

    Default: Outbound

    UDP Timeout

    Specify when NAT translations over UDP sessions time out.

    Range: 1 through 65536 minutes

    Default: 1 minutes

    TCP Timeout

    Specify when NAT translations over TCP sessions time out.

    Range: 1 through 65536 minutes

    Default: 60 minutes (1 hour)

    Block ICMP

    Select On to block inbound ICMP error messages. By default, a router acting as a NAT device receives these error messages.

    Default: Off

    Respond to Ping

    Select On to have the router respond to ping requests to the NAT interface's IP address that are received from the public side of the connection.

    To create a port forwarding rule, click Add New Port Forwarding Rule and configure the following parameters. You can define up to 128 port-forwarding rules to allow requests from an external network to reach devices on the internal network.

    Table 15.

    Parameter Name

    Description

    Port Start Range

    Enter a port number to define the port or first port in the range of interest.

    Range: 0 through 65535

    Port End Range

    Enter the same port number to apply port forwarding to a single port, or enter a larger number to apply it to a range of ports.

    Range: 0 through 65535

    Protocol

    Select the protocol to which to apply the port-forwarding rule, either TCP or UDP. To match the same ports for both TCP and UDP traffic, configure two rules.

    VPN

    Specify the private VPN in which the internal server resides. This VPN is one of the VPN identifiers in the overlay network.

    Range: 0 through 65527

    Private IP

    Specify the IP address of the internal server to which to direct traffic that matches the port-forwarding rule.

  6. Apply a rewrite rule, access lists, and policers to a router interface.

    Table 16.

    Parameter Name

    Description

    Shaping rate

    Configure the aggreate traffic transmission rate on the interface to be less than line rate, in kilobits per second (kbps).

    QoS map

    Specify the name of the QoS map to apply to packets being transmitted out the interface.

    Rewrite Rule

    Click On, and specify the name of the rewrite rule to apply on the interface.

    Ingress ACL – IPv4

    Click On, and specify the name of the access list to apply to IPv4 packets being received on the interface.

    Egress ACL – IPv4

    Click On, and specify the name of the access list to apply to IPv4 packets being transmitted on the interface.

    Ingress ACL – IPv6

    Click On, and specify the name of the access list to apply to IPv6 packets being received on the interface.

    Egress ACL – IPv6

    Click On, and specify the name of the access list to apply to IPv6 packets being transmitted on the interface.

    Ingress Policer

    Click On, and specify the name of the policer to apply to packets being received on the interface.

    Egress Policer

    Click On, and specify the name of the policer to apply to packets being transmitted on the interface.

  7. Configure other interface properties.

    Parameter Name

    Description

    Bandwidth Upstream

    For transmitted traffic, set the bandwidth above which to generate notifications.

    Range: 1 through (232 / 2) – 1 kbps

    Bandwidth Downstream

    For received traffic, set the bandwidth above which to generate notifications.

    Range: 1 through (232 / 2) – 1 kbps

    IP MTU

    Specify the maximum MTU size of packets on the interface.

    Range: 576 through 1804.

    Default: 1500 bytes.

    TCP MSS

    Specify the maximum segment size (MSS) of TPC SYN packets passing through the router. By default, the MSS is dynamically adjusted based on the interface or tunnel MTU such that TCP SYN packets are never fragmented.

    Range: 552 to 1460 bytes.

    Default: None.

    Clear Dont Fragment

    Click On to clear the Don't Fragment bit in the IPv4 packet header for packets being transmitted out the interface. When the DF bit is cleared, packets larger than that interface's MTU are fragmented before being sent.

    TLOC Extension

    Enter the name of the physical interface on the same router that connects to the WAN transport circuit. This configuration then binds this service-side interface to the WAN transport. A second router at the same site that itself has no direct connection to the WAN (generally because the site has only a single WAN connection) and that connects to this service-side interface is then provided with a connection to the WAN.

    Tracker

    Enter the name of a tracker to track the status of transport interfaces that connect to the internet.