OSDx Documentation Logo
v4.2.7.0
  • About
  • Releases

First steps

  • Setting Up
  • Quick Start
  • Licensing
  • CLI Overview
  • Configuration Management

Admin Guide

  • System Administration
  • Articles
  • Troubleshooting
  • Examples
    • Basic
    • Interfaces
      • Bonding
      • Bridge
      • Cellular
      • Dummy
      • Ethernet
      • Tunnel
        • Address
        • Encapsulation
        • Nhrp
        • Traffic
      • Vti
      • Vxlan
      • Wlan
    • Protocols
    • Service
    • System
    • Tech Support
    • Traffic
    • User-Level
    • Vpn

Command reference

  • Configuration commands
  • Operational commands
OSDx Documentation
  • Examples
  • Interfaces
  • Tunnel
  • Traffic
  • Policy
  • Check Link Hook
  • View page source

Check Link Hook

This example demonstrates how to process outgoing NHRP traffic in a scenario using one Tunnel with GRE encapsulation.

../../../../../_images/topology24.svg

Test Marks In NHRP Traffic

Description

In this scenario, a traffic policy was configured to log outgoing NHRP traffic, which is non-IP Layer 3 protocol. The special hook link-out can be used to process these outgoing frames.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.10/24
set interfaces tunnel tun0 address 10.0.0.1/32
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 local-address 192.168.100.10
set interfaces tunnel tun0 nhrp
set interfaces tunnel tun0 traffic policy link-in LOG_NHRP
set interfaces tunnel tun0 traffic policy link-out LOG_NHRP
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set traffic policy LOG_NHRP rule 1 log prefix NHRP__
set traffic policy LOG_NHRP rule 1 selector NHRP_SEL
set traffic selector NHRP_SEL rule 1 ether-type 8193

Note

NHRP packets use ethertype 8193 (0x2001).

Step 2: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.20/24
set interfaces tunnel tun0 address 10.0.0.2/32
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 local-address 192.168.100.20
set interfaces tunnel tun0 nhrp holdtime 5
set interfaces tunnel tun0 nhrp nhs 10.0.0.1 nbma 192.168.100.10
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command protocols ip show nhrp at DUT0 and check if output matches the following regular expressions:

tun0\s+dynamic\s+10\.0\.0\.2
Show output
Iface      Type     Protocol         NBMA             Claimed NBMA     Expires(s)   Flags  Identity
tun0       local    10.0.0.1         192.168.100.10   192.168.100.10   -                   -
tun0       dynamic  10.0.0.2         192.168.100.20   192.168.100.20   5            UT

Step 4: Run command system journal show | cat at DUT0 and check if output matches the following regular expressions:

\[NHRP__-1\] ACCEPT IN=tun0 OUT=\w+
\[NHRP__-1\] ACCEPT IN= OUT=tun0
Show output
Oct 10 19:42:25.350460 osdx systemd-journald[246736]: Runtime Journal (/run/log/journal/d6792964fe7547c9a60a3d774aa97dac) is 1.8M, max 13.8M, 11.9M free.
Oct 10 19:42:25.354182 osdx systemd-journald[246736]: Received client request to rotate journal, rotating.
Oct 10 19:42:25.354253 osdx systemd-journald[246736]: Vacuuming done, freed 0B of archived journals from /run/log/journal/d6792964fe7547c9a60a3d774aa97dac.
Oct 10 19:42:25.360994 osdx OSDxCLI[246586]: User 'admin' executed a new command: 'system journal clear'.
Oct 10 19:42:25.579387 osdx OSDxCLI[246586]: User 'admin' executed a new command: 'system coredump delete all'.
Oct 10 19:42:25.808786 osdx OSDxCLI[246586]: User 'admin' entered the configuration menu.
Oct 10 19:42:25.886354 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 192.168.100.10/24'.
Oct 10 19:42:25.984483 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set interfaces tunnel tun0 traffic policy link-out LOG_NHRP'.
Oct 10 19:42:26.042193 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set interfaces tunnel tun0 traffic policy link-in LOG_NHRP'.
Oct 10 19:42:26.129758 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set interfaces tunnel tun0 address 10.0.0.1/32'.
Oct 10 19:42:26.205790 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set interfaces tunnel tun0 encapsulation gre'.
Oct 10 19:42:26.302118 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set interfaces tunnel tun0 local-address 192.168.100.10'.
Oct 10 19:42:26.355334 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set interfaces tunnel tun0 nhrp'.
Oct 10 19:42:26.444619 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set traffic policy LOG_NHRP rule 1 log prefix NHRP__'.
Oct 10 19:42:26.509300 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set traffic policy LOG_NHRP rule 1 selector NHRP_SEL'.
Oct 10 19:42:26.605297 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'set traffic selector NHRP_SEL rule 1 ether-type 8193'.
Oct 10 19:42:26.675134 osdx OSDxCLI[246586]: User 'admin' added a new cfg line: 'show working'.
Oct 10 19:42:26.763325 osdx ubnt-cfgd[263695]: inactive
Oct 10 19:42:26.838502 osdx systemd[1]: Reloading frr.service - FRRouting...
Oct 10 19:42:26.852936 osdx watchfrr[263576]: [NG1AJ-FP2TQ] Terminating on signal
Oct 10 19:42:26.954015 osdx frrinit.sh[263721]: Stopped watchfrr.
Oct 10 19:42:26.955028 osdx frrinit.sh[263721]: Starting watchfrr with command: '  /usr/lib/frr/watchfrr  -d  --min-restart-interval 1 --max-restart-interval 600 --timeout 600 --restart-timeout 600 zebra mgmtd nhrpd staticd'.
Oct 10 19:42:26.961799 osdx watchfrr[263739]: [T83RR-8SM5G] watchfrr 10.4.1 starting: vty@0
Oct 10 19:42:26.961846 osdx watchfrr[263739]: [QDG3Y-BY5TN] zebra state -> up : connect succeeded
Oct 10 19:42:26.961867 osdx watchfrr[263739]: [QDG3Y-BY5TN] mgmtd state -> up : connect succeeded
Oct 10 19:42:26.961932 osdx watchfrr[263739]: [ZCJ3S-SPH5S] nhrpd state -> down : initial connection attempt failed
Oct 10 19:42:26.961935 osdx watchfrr[263739]: [QDG3Y-BY5TN] staticd state -> up : connect succeeded
Oct 10 19:42:26.962086 osdx watchfrr[263739]: [YFT0P-5Q5YX] Forked background command [pid 263740]: /usr/lib/frr/watchfrr.sh restart nhrpd
Oct 10 19:42:26.965662 osdx frrinit.sh[263740]: Cannot stop nhrpd: pid file not found
Oct 10 19:42:26.966554 osdx watchfrr.sh[263745]: Cannot stop nhrpd: pid file not found
Oct 10 19:42:26.976361 osdx zebra[94982]: [V98V0-MTWPF] client 36 says hello and bids fair to announce only nhrp routes vrf=0
Oct 10 19:42:26.985069 osdx watchfrr[263739]: [QDG3Y-BY5TN] nhrpd state -> up : connect succeeded
Oct 10 19:42:26.985075 osdx watchfrr[263739]: [KWE5Q-QNGFC] all daemons up, doing startup-complete notify
Oct 10 19:42:26.985573 osdx frrinit.sh[263721]: Started watchfrr.
Oct 10 19:42:26.985646 osdx frrinit.sh[263750]: sh: line 1: ipsec: command not found
Oct 10 19:42:27.074262 osdx systemd[1]: Reloaded frr.service - FRRouting.
Oct 10 19:42:27.098178 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0
Oct 10 19:42:27.136520 osdx WARNING[263842]: No supported link modes on interface eth0
Oct 10 19:42:27.138039 osdx modulelauncher[263842]: osdx.utils.xos cmd error: /sbin/ethtool -A eth0 autoneg on
Oct 10 19:42:27.138052 osdx modulelauncher[263842]: Command '/sbin/ethtool -A eth0 autoneg on' returned non-zero exit status 76.
Oct 10 19:42:27.139145 osdx modulelauncher[263842]: osdx.utils.xos cmd error: /sbin/ethtool -s eth0 autoneg on advertise Asym_Pause off Pause off --
Oct 10 19:42:27.139154 osdx modulelauncher[263842]: Command '/sbin/ethtool -s eth0 autoneg on advertise Asym_Pause off Pause off --' returned non-zero exit status 75.
Oct 10 19:42:27.160393 osdx (udev-worker)[263870]: Network interface NamePolicy= disabled on kernel command line.
Oct 10 19:42:27.383755 osdx cfgd[1464]: [246586]Completed change to active configuration
Oct 10 19:42:27.395038 osdx OSDxCLI[246586]: User 'admin' committed the configuration.
Oct 10 19:42:27.409996 osdx OSDxCLI[246586]: User 'admin' left the configuration menu.
Oct 10 19:42:28.875899 osdx OSDxCLI[246586]: User 'admin' executed a new command: 'protocols ip show nhrp'.
Oct 10 19:42:29.754181 osdx kernel: [NHRP__-1] ACCEPT IN=tun0 OUT= MAC=45:00:00:74:b0:53:40:00:40:2f:40:98:c0:a8:64:14:c0:a8:64:0a:00:00:20:01
Oct 10 19:42:29.754257 osdx kernel: [NHRP__-1] ACCEPT IN= OUT=tun0 MAC=45:01:00:00:00:00:40:00:40:2f:00:00:c0:a8:64:0a:c0:a8:64:14:00:00:20:01
Oct 10 19:42:29.754267 osdx kernel: [NHRP__-1] ACCEPT IN=tun0 OUT=eth0 MAC=00:01:08:00:00:00:00:00:00:40:00:70:2b:43:00:34:01:04:04:00:04:04:00:02
Oct 10 19:42:30.752802 osdx kernel: [NHRP__-1] ACCEPT IN=tun0 OUT= MAC=45:00:00:74:b0:63:40:00:40:2f:40:88:c0:a8:64:14:c0:a8:64:0a:00:00:20:01
Oct 10 19:42:30.752876 osdx kernel: [NHRP__-1] ACCEPT IN= OUT=tun0 MAC=45:01:00:00:00:00:40:00:40:2f:00:00:c0:a8:64:0a:c0:a8:64:14:00:00:20:01
Oct 10 19:42:30.752886 osdx kernel: [NHRP__-1] ACCEPT IN=tun0 OUT=eth0 MAC=00:01:08:00:00:00:00:00:00:40:00:70:2b:42:00:34:01:04:04:00:04:04:00:02
Oct 10 19:42:30.945333 osdx OSDxCLI[246586]: User 'admin' executed a new command: 'protocols ip show nhrp'.

Step 5: Run command traffic policy show at DUT0 and check if output matches the following regular expressions:

1\s+NHRP_SEL\s+\b[^0]\d*
Show output
Policy LOG_NHRP -- ifc tun0 -- hook link-in prio very-high

---------------------------------------------------------------
rule   selector  pkts match  pkts eval  bytes match  bytes eval
---------------------------------------------------------------
1      NHRP_SEL           4          4          456         456
---------------------------------------------------------------
Total                     4          4          456         456

Policy LOG_NHRP -- ifc tun0 -- hook link-out prio very-high

---------------------------------------------------------------
rule   selector  pkts match  pkts eval  bytes match  bytes eval
---------------------------------------------------------------
1      NHRP_SEL           2          2          272         272
---------------------------------------------------------------
Total                     2          2          272         272

Previous Next

© Copyright 2025, Teldat.

Built with Sphinx using a theme provided by Read the Docs.