Академический Документы
Профессиональный Документы
Культура Документы
173
Overview
Overview
Route Injection Mechanism (RIM) enables a VPN-1 Power gateway to use dynamic
routing protocols to propagate the encryption domain of a VPN-1 Power peer
gateway to the internal network and then initiate back connections. When a VPN
tunnel is created, RIM updates the local routing table of the VPN-1 Power gateway
to include the encryption domain of the VPN-1 Power peer.
RIM can only be enabled when permanent tunnels are configured for the
community. Permanent tunnels are kept alive by tunnel test packets. When a
gateway fails to reply, the tunnel will be considered ‘down.’ As a result, RIM will
delete the route to the failed link from the local routing table, which triggers
neighboring dynamic routing enabled devices to update their routing information
accordingly. This will result in a redirection of all traffic destined to travel across
the VPN tunnel, to a pre-defined alternative path.
There are two possible methods to configure RIM:
• Automatic RIM - RIM automatically injects the route to the encryption domain
of the peer gateways.
• Custom Script - Specify tasks for RIM to perform according to specific needs.
Route injection can be integrated with MEP functionality (which route return
packets back through the same MEP gateway). For more information on MEP, see
“Multiple Entry Point VPNs” on page 225.
174
Automatic RIM
Automatic RIM
Automatic RIM can be enabled using the GUI when the operating system on the
gateway is SecurePlatform, IPSO or Linux. Although a custom script can be used
on these systems, no custom-written scripts are required.
Figure 8-1 Automatic RIM
In this scenario:
• Gateways 1 and 2 are both RIM and have a dynamic routing protocol enabled.
• R1 and R4 are enabled routers.
• When a VPN tunnel is created, RIM updates the local routing tables of gateway
1 and gateway 2 to include the encryption domain of the other gateway.
• Should the VPN tunnel become unavailable, traffic is redirected to the leased
line.
The routing tables for the gateways and routers read as follows. Entries in bold
represent routes injected into the gateways local routing tables by RIM:
Gateway 1:
Network Destination Netmask Gateway Metric
0.0.0.0 0.0.0.0 172.16.10.2 1
192.168.21.0 255.255.255.0 172.16.10.2 1
192.168.11.0 255.255.255.0 192.168.10.1 1
Gateway 2:
Network Destination Netmask Gateway Metric
0.0.0.0 0.0.0.0 172.16.20.2 1
192.168.11.0 255.255.255.0 172.16.20.2 1
192.168.21.0 255.255.255.0 192.168.20.1 1
176
Custom Scripts
Custom Scripts
Custom scripts can be run on any gateway in the community. These scripts are
executed whenever a tunnel changes its state, i.e. goes “up” or “down.” Such an
event, for example, can be the trigger that initiates a dial-up connection.
A script template custom_rim (with a .sh or .bat extension depending on the
operating system) is provided in the $FWDIR/Scripts directory. The basic script (for
SecurePlatform, IPSO, Solaris or Linux only) is shown in Figure 8-2:
Figure 8-2 Sample customized script for SecurePlatform, IPSO, Solaris, or Linux
#!/bin/sh
case "${RIM_NEW_STATE}" in
up)
# Place your action for tunnels that came up
;;
down)
# Place your action for tunnel that went down
;;
esac
For Windows platforms, the script takes the form of a batch file:
@echo off
goto RIM_%RIM_NEW_STATE%
:RIM_up
rem . Place your action for tunnels that came up
goto end
:RIM_down
rem . Place your action for tunnel that went down
goto end
:end
Where:
• RIM_PEER_GATEWAY: Peer gateway
• RIM_NEW_STATE: Change in the gateways’s state, i.e. up or down.
• RIM_HA_STATE: State of a single gateway in a cluster (i.e., standby or active).
• RIM_FIRST_TIME: The script is executed separately for each network within
the peers encryption domain. Although the script might be executed multiple
times on a peer, this parameter will only be transferred to the script with the
value of '1' the first time the script runs on the peer. The value '1' indicates
that this is the first time this script is being executed. The next time the
script is executed, it is transferred with the value of ‘0’ and the parameter is
disregarded. For example, you may send an email alert to the system
administrator the moment a tunnel goes down.
• RIM_PEER_ENC_NET: VPN domain of the VPN peer.
178
tnlmon.conf File
tnlmon.conf File
In R54 and R55, RIM was configured using the tnlmon.conf file. If your RIM
settings are already configured using the tnlmon.conf file, there is no need to
reconfigure RIM using SmartDashboard. RIM is supported in a mixed community
where there are gateways configured using the GUI and other gateways using the
tnlmon.conf file. RIM is not supported when communicating with 3rd party
gateways. However, if RIM is configured in the tnlmon.conf file, these settings
will take precedence over any RIM settings in the GUI.
To configure RIM using the tnlmon.conf file, refer to the R54 and R55 User
Guides.
In this scenario:
• Gateways A and B are both RIM enabled and gateway C has Hide NAT enabled
on the external interface (“hiding” all the IP addresses behind it).
• Host 1, behind gateway C, initiates a VPN tunnel with Host 2, through gateway
A.
In Figure 8-4, Router 3 contains the routes to all the hosts behind gateway C.
Router 3 however, does not have the Hide NAT IP address of gateway C and as a
result, cannot properly route packets back to host 1.
This solution for routing the packets back properly is twofold:
1. Select the flag RIM_inject_peer_interfaces in the Global Properties page. This
flag will inject router 3 with all of the IP addresses of gateway C including the
Hide NAT address.
180
Injecting Peer Gateway Interfaces
Configuring RIM
In This Section
182
Configuring RIM
Decide if:
• RIM should run automatically on the central or satellite gateways
(SecurePlatform, IPSO or Linux only).
• A customized script should be run on central or satellite gateways whenever
a tunnel changes its states (goes up or down).
For tracking options, see “Tracking Options” on page 184.
4. If a customized script is run, edit custom_rim (.sh or .bat) script in the
$FWDIR/Scripts directory on each of the gateways.
3. Click Settings...
The Route Injection Mechanism Settings window open
Decide if:
• RIM should run automatically on the gateways (SecurePlatform, IPSO or
Linux only).
• A customized script should be run on the gateway whenever a tunnel
changes its state (goes up or down).
For tracking options, see “Tracking Options” on page 184
4. If a customized script is run, edit custom_rim (.sh or .bat) script in the
$FWDIR/Scripts directory on each of the gateways.
Tracking Options
Several types of alerts can be configured to keep administrators up to date on the
status of gateways. The Tracking settings can be configured on the Route Injection
Mechanism Settings page. The different options are Log, Popup Alert, Mail Alert,
SNMP Trap Alert, and User Defined Alert.
184