NHRP Next Hop Resolution Protocol
Table Of Contents
Configuring NHRP
The purpose of this module is to describe how
to configure the Next Hop Resolution Protocol (NHRP) for use in a
nonbroadcast multiaccess (NBMA) network. NHRP is an Address Resolution
Protocol (ARP)-like protocol that dynamically maps nonbroadcast
multiaccess (NBMA) network. With NHRP, systems attached to an NBMA
network can dynamically learn the NBMA (physical) address of the other
systems that are part of that network, allowing these systems to
directly communicate.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To
reach links to specific feature documentation in this module and to see
a list of the releases in which each feature is supported, use the "Feature Information for Configuring NHRP" section.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information
about platform support and Cisco IOS and Catalyst OS software image
support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
Information About NHRP
To configure NHRP, you should understand the following concepts:
How NHRP and NBMA Networks Interact
Partially meshed NBMA networks typically have
multiple logical networks behind the NBMA network. In such
configurations, packets traversing the NBMA network might have to make
several hops over the NBMA network before arriving at the exit router
(the router nearest the destination network). With NHRP and when NHRP is
combined with IPsec, the NBMA network is basically a collection of
point-to-point logical tunnel links over a physical IP network. This is
also true of virtual tunnel networks, for example, generic routing
encapsulation (GRE) tunnels. In order for a router to scale the
connectivity of this collection of point-to-point links, the links are
usually grouped into a single- or multilayer hub-and-spoke network.
Multipoint interfaces (GRE tunnel interfaces in this case) can be used
to reduce the configuration on a hub router in such a network. This
resulting network is an NBMA network.
NHRP is an ARP-like protocol that alleviates
these NBMA network problems. With NHRP, systems attached to an NBMA
network dynamically learn the NBMA address of the other systems that are
part of that network, allowing these systems to directly communicate
without requiring traffic to use an intermediate hop.
NHRP allows two functions to help support these NBMA networks:
1. NHRP
is an ARP-like protocol that allows Next Hop Clients (NHCs ) to
dynamically register with Next Hop Servers (NHSs). This allows the NHCs
to join the NBMA network without configuration changes on the NHSs,
especially in cases where the NHC has a dynamic physical IP address or
is behind a Network Address Translation (NAT) router that dynamically
changes the physical IP address. In these cases it would be impossible
to preconfigure the logical virtual private network (VPN IP) to physical
(NBMA IP) mapping for the NHC on the NHS. This function is called NHRP
registration. See the "NHRP Registration" section for more information.
2. NHRP
is a resolution protocol that allows one NHC client (spoke) to
dynamically discover the logical VPN IP to physical NBMA IP mapping for
another NHC client (spoke) within the same NBMA network. Without this
discovery, IP packets traversing from hosts behind one spoke to hosts
behind another spoke would have to traverse by way of the NHS (hub)
router. This would increase the utilization of the hub's physical
bandwidth and CPU to process these packets that come into the hub on the
multipoint interface and go right back out the multipoint interface.
This is often called hair-pinning. With NHRP, systems attached to an
NBMA network dynamically learn the NBMA address of the other systems
that are part of that network, allowing these systems to directly
communicate without requiring traffic to use an intermediate hop. This
alleviates the load on the intermediate hop (NHS) and can increase the
overall bandwidth of the NBMA network to be greater than the bandwidth
of the hub router.
Benefits of NHRP for NBMAs
Routers, access servers, and hosts can use the
NHRP to discover the addresses of other routers and hosts connected to
an NBMA network. Partially meshed NBMA networks are typically configured
with multiple logical networks to provide full network layer
connectivity. In such configurations, packets might make several hops
over the NBMA network before arriving at the exit router (the router
nearest the destination network). In addition, such NBMA networks
(whether partially or fully meshed) typically require tedious static
configurations. These static configurations provide the mapping between
network layer addresses (such as IP) and NBMA addresses (such as E.164
addresses for SMDS or ATM addresses).
The NBMA network is considered nonbroadcast
either because it technically does not support broadcasting (for
example, an IP mGRE tunnel network) or because broadcasting is too
expensive (for example, an SMDS broadcast group that would otherwise be
too large).
NHRP provides an ARP-like protocol that
alleviates these NBMA network problems. With NHRP, systems attached to
an NBMA network dynamically learn the NBMA address of the other systems
that are part of that network, allowing these systems to directly
communicate without requiring traffic to use additional intermediate
hops.
Dynamically Built Hub-and-Spoke Networks
With NHRP, the NBMA network is initially laid
out as a hub-and-spoke network that can be multiple hierarchical layers
of NHCs as spokes and NHSs as hubs. The NHCs are configured with static
mapping information to reach their NHSs and will connect to their NHS
and send an NHRP registration to the NHS. This allows the NHS to
dynamically learn the mapping information for the spoke, reducing the
configuration needed on the hub and allowing the spoke to have a dynamic
NBMA (physical) IP address.
Once the base hub-and-spoke network is
dynamically built out, then NHRP resolution requests and responses can
be used to dynamically discover spoke-to-spoke mapping information,
allowing spokes to contact each other directly, bypassing the hub. This
allows a dynamic mesh of connections between spokes to be built based on
data traffic patterns without requiring a preconfigured static fully
meshed network. Using a dynamic-mesh network allows smaller spoke
routers to participate up to their capability in a large NBMA network
when these smaller spoke routers do not have the resources to
participate in a full mesh on the same size network. The smaller routers
do not need to build out all possible spoke-to-spoke links; these
routers need to build only the ones they are currently using.
Next Hop Server Selection
NHRP resolution requests traverse one or more
hops (hubs) within the base hub-and-spoke NBMA subnetwork before
reaching the station that is expected to generate a response. Each
station (including the source station) chooses a neighboring NHS to
which it forwards the request. The NHS selection procedure typically
involves performing a routing decision based upon the network layer
destination address of the NHRP request. The NHRP resolution request
eventually arrives at a station that generates an NHRP resolution reply.
This responding station either serves the destination, or is the
destination itself. The responding station generates a reply using the
source address from within the NHRP packet to determine where the reply
should be sent.
The Cisco implementation of NHRP also supports and extends the IETF RFC 2332, NBMA Next Hop Resolution Protocol (NHRP).
The Cisco implementation of NHRP supports IP
Version 4 at the network layer and at the link layer with multipoint
GRE, Ethernet, Switched Multimegabit Data Service (SMDS), Frame Relay,
and ATM. Although NHRP is available on Ethernet, NHRP need not be
implemented over Ethernet media because Ethernet is capable of
broadcasting and the standard Ethernet IP ARP protocol is sufficient.
Note NHRP
support for SMDS, Frame Relay, and ATM as transport protocols, although
available now, will be removed in a future Cisco IOS release.
Figure 1
illustrates four routers connected to an NBMA network. Within the
network are IP routers necessary for the routers to communicate with
each other by tunneling the IP data packets in GRE IP tunnel packets.
The infrastructure layer routers support logical IP tunnel circuit
connections represented by hops 1, 2, and 3 of the figure. When router A
attempts to forward an IP packet from the source host to the
destination host, NHRP is triggered. On behalf of the source host,
router A sends an NHRP resolution request packet encapsulated in a GRE
IP packet, which takes three hops across the network to reach router D,
connected to the destination host. After router A receives a positive
NHRP resolution reply, router A is determines that router D is the NBMA
IP next hop, and router A sends subsequent data IP packets for the
destination to router D in one GRE IP tunnel hop.
Figure 1 Next Hop Resolution Protocol
With NHRP, once the NBMA next hop is
determined, the source either starts sending data packets to the
destination (in a connectionless NBMA network such as GRE IP or SMDS) or
establishes a virtual virtual circuit (VC) connection to the
destination. This connection is configured with the desired bandwidth
and quality of service (QoS) characteristics for a connection-oriented
NBMA network such as Frame Relay, ATM, or with DMVPN where an IPsec
encyrption peering must be established.
Other address resolution methods can be used
while NHRP is deployed. IP hosts that rely upon the Logical IP Subnet
(LIS) model might require ARP servers and services over the NBMA
network, and deployed hosts might not implement NHRP, but might continue
to support ARP variations. NHRP is designed to eliminate the suboptimal
routing that results from the LIS model, and can be deployed with
existing ARP services without interfering with them.
NHRP Used with a DMVPN
NHRP is used to facilitate building a VPN. In
this context, a VPN consists of a virtual Layer 3 network that is built
on top of an actual Layer 3 network. The topology you use over the VPN
is largely independent of the underlying network, and the protocols you
run over it are completely independent of it. The VPN network (DMVPN) is
based on GRE IP logical tunnels that can be protected by adding in
IPsec to encrypt the GRE IP tunnels.
Connected to the NBMA network are one or more
stations that implement NHRP, and are known as NHSs and NHCs. All
routers running Cisco IOS Release 10.3 or later releases can implement
NHRP and, thus, can act as NHSs or NHCs. To get the base functionality
of DMVPN (GRE IP+IPsec), which uses NHRP, you must run Cisco IOS Release
12.3(9), 12.3(8)T, or a later release.
Note To get the latest extensions and enhancements to the NHRP code you must use Cisco IOS Release 12.4 or Cisco IOS Release 12.4T.
NHRP Registration
NHRP registrations are sent from NHCs to their configured NHSs every one-third of the NHRP holdtime (ip nhrp holdtime value), unless the ip nhrp registration timeout value
command is configured, in which case registrations are sent every
according to the configured timeout value. If an NHRP registration reply
is not received for an NHRP registration request, the NHRP registration
request is retransmitted at timeouts of 1, 2, 4, 8, 16, 32, and 64
seconds, then the sequence starts over again at 1.
The NHS is declared down if an NHRP
registration reply is not received after 3 retransmission (7 seconds),
and an NHRP resolution packets will no longer be sent to or by way of
that NHS. NHRP registrations will continue to be sent in the intervals
0, 1, 2, 4, 8, 16, 32, 64 probing the NHS until an NHRP registration
reply is received. As soon as an NHRP registration reply is received the
NHS is immediately declared up, the NHRP registration requests revert
to being sent every one-third of NHRP holdtime or the value configured
in the ip nhrp registration timeout command, and the NHS can again be sent NHRP resolution requests. The show ip nhrp nhs {detail} command can be used to check the state of the NHRP NHSs.
Dynamic Spoke-to-Spoke Tunnels
In addition to NHRP registration of NHCs with
NHSs, NHRP provides the capability for NHCs (spokes) to find a shortcut
path over the infrastructure of the network (IP network, SMDS) or build a
shortcut switched virtual circuit (SVC) over a switched infrastructure
network (Frame Relay and ATM) directly to another NHC (spoke) bypassing
hops through the NHSs (hubs). This allows the building of very large
NHRP NBMA networks. In this way, the bandwidth and CPU limitations of
the hub do not limit the over all bandwidth of the NHRP NBMA network.
This effectively creates a full-mesh-capable network without having to
discover all possible connections beforehand. This is called a
dynamic-mesh network, where there is a base hub-and-spoke network of
NHCs and NHSs for transporting NHRP and dynamic routing protocol
information (and data traffic) and dynamic direct spoke-to-spoke links
that are built when there is data traffic to use the link and torn down
when the data traffic stops.
The mesh network allows individual spoke
routers to directly connect to anywhere in the NBMA network, even though
they are capable of connecting only to a limited number at the same
time. This allows each spoke in the network to participate in the whole
network up to its capabilities without limiting another spoke from
participating up to its capability. If a full-mesh network were to be
built, then all spokes would have to be sized to handle all possible
tunnels at the same time.
For example, in a network of 1000 nodes, a full
mesh spoke would have to be large and powerful because it must always
support 999 tunnels (one to every other node). In a dynamic-mesh
network, a spoke needs to support only a limited number of tunnels to
its NHSs (hubs) plus any currently active tunnels to other spokes. Also,
if a spoke cannot build more spoke-to-spoke tunnels, then it will send
its data traffic by way of the spoke-hub-spoke path. In this way,
connectivity is always preserved, even when the preferred single hop
path is not available.
Developmental Phases of DMVPN and NHRP
The developmental phases described in this
section are actually DMVPN phases combining mGRE plus NHRP and IPsec.
These phases are important because they provide the functionality needed
to support dynamic spoke-to-spoke tunnels.
NHRP gathers the information that it needs to
build spoke-to-spoke tunnels by using NHRP resolution request and reply
packets that are sent via the spoke-hub-spoke path through the NBMA
network. NHRP also has to be triggered (or know when) to collect this
information for building the spoke-to-spoke tunnels, because it brings
up the spoke-to-spoke tunnel only when there is data traffic to use it.
Thetwo ways that NHRP does this are described the following sections.
Phase 2
In phase 2 NHRP brings up the NHC-to-NHS tunnel
and a dynamic routing protocol is used to distribute routing
information about all of the networks that are available behind the hub
and all of the other spokes. Included in this information is the IP next
hop of the destination spoke that is supporting a particular
destination network.
When a data packet is to be forwarded it will
get the outbound interface and the IP next hop from the matching routing
table network entry. If the NHRP interface is the outbound interface
then it looks for an NHRP mapping entry for that IP next hop. If there
is no matching of NHRP mapping entry, then NHRP is triggered to send an
NHRP resolution request to get the mapping information (IP next-hop
address to physical layer address). The NHRP registration reply packet
contains this mapping information and when this information is received
the spoke will have sufficient information to correctly encapsulate the
data packet to go directly to the remote spoke, taking one hop across
the infrastructure network. One of the downsides to this technique is
that each spoke must have all of the individual routes in its routing
table for all possible destination networks behind the hub and other
spokes. Keeping this routing information distributed and up to date can
put a significant load on the routing protocol running over the VPN
network.
Phase 3
NHRP brings up the NHC and NHS tunnel and a
dynamic routing protocol is used to distribute routing information about
all of the networks that are available behind all of the spokes to the
hub. The hub then resends this routing information out to the spokes,
but in this case the hub can summarize the routing information. It sets
the IP next hop for all the network destinations to be the NHS (hub)
itself. This can significantly reduce the amount of information that the
routing protocol needs to distribute from the hub to the spokes, thus
reducing the load on the routing protocol running on the hub.
When a data packet is to be forwarded, it again
will get the outbound interface and the IP next hop from the matching
routing table network entry. If the NHRP interface is the outbound
interface then it looks for an NHRP mapping entry for that IP next hop.
In this case the IP next hop will be the hub for which it already has an
NHRP mapping entry (it already has a tunnel with the hub (NHS)), so the
spoke will send only the data packet to the hub.
The hub will receive the data packet and it
will check its routing table. Because this data packet is destined for a
network behind another spoke it will be forwarded back out the NHRP
interface to the next hop toward that spoke. At this point the hub
detects that the packet arrived and was sent back out the NHRP
interface. This means that the data packet is taking at least two hops
within the NHRP network and therefore this path via the hub is not the
optimal one-hop path. The hub therefore sends an NHRP redirect message
to the spoke. In the redirect message is information to the spoke about
the data packet IP destination that triggered the NHRP redirect message.
When the spoke receives the NHRP redirect it
will create and send an NHRP resolution request for the data IP
destination from the NHRP redirect message. The NHRP resolution request
will be forwarded through the path to the remote spoke that services the
network for that IP destination.
The remote spoke will generate an NHRP
resolution reply with its own NBMA address and the whole subnet (from
its routing table) that matches the data IP destination from the NHRP
resolution request packet. The remote spoke will then send the NHRP
resolution reply directly back to the local spoke. At this point there
is now sufficient information for data traffic to be sent over the
direct spoke-to-spoke path that was just built.
Note The method for Phase 2 was implemented in Cisco IOS Release 12.4(6)T and uses the NHRP commands ip nhrp redirect and ip nhrp shortcut.
The IP routing table and the routes learned by
way of the hub are important when building spoke-to-spoke tunnels.
Therefore the availability of the NHSs (hubs) is critical for the
functioning of an NHRP-based network. When there is only one hub and
that hub goes down, the spoke removes the routes that it learned from
the hub from its routing table, because it lost the hub as its routing
neighbor. However, the spoke does not delete any of the spoke-to-spoke
tunnels (NHRP mappings) that are now up. Even though the spoke-to-spoke
tunnel is still there the spoke will not be able to use the tunnel
because its routing table no longer has a route to the destination
network. The spoke has a path (spoke-to-spoke tunnel), but does not know
to use it (no routing table entry).
In addition, when the routing entries are
removed there is no trigger into NHRP for NHRP to remove NHRP mapping
entries. Eventually NHRP will time out the current dynamic NHRP mapping
entries that it had when the hub went down because they are not being
used. Only at that time does NHRP remove the mapping entry.
In Phase 2,
if there still happened to be a route in the routing table (could be a
static route) with the correct IP next hop, then the spoke could still
use the spoke-to-spoke tunnel even when the hub is down. NHRP will not
be able to refresh the mapping entry because the NHRP resolution request
or response would need to go through the hub.
In Phase 3 you would need a route that only points out the tunnel interface. It would not need have to have the correct IP next
hop (NHRP ignores the IP next-hop in Phase 3). Also NHRP will be able
to refresh the NHRP mapping entry, because the NHRP resolution request
or response will go over the direct spoke-to-spoke tunnel.
If you have two (or more) NHS hubs within a
single NBMA network (single mGRE, Frame Relay, or ATM interface), then
when the first (primary) hub goes down, the spoke router will still
remove the routes from the routing table that it learned from this hub,
but it will also be learning the same routes (higher metric) from the
second (backup) hub, so it will immediately install these routes.
Therefore the spoke-to-spoke traffic would continue going over the
spoke-to-spoke tunnel, and be unaffected by the primary hub outage.
Spoke Refresh Mechanism
Spoke-to-spoke tunnels are designed to be
dynamic, in that they are created only when there is data traffic to use
the tunnel and they are removed when there is no longer any data
traffic using the tunnel. This section describes the mechanism to
refresh the spoke-to-spoke tunnel when it is still being used (no packet
loss) and to detect and remove the spoke-to-spoke tunnel when it is no
longer being used.
Process Switching
Each time a data packet is switched using an
NHRP mapping entry the "used" flag is set on the mapping entry. Then
when the NHRP background process runs (every 60 seconds) the following
happens:
CEF Switching
NHRP has no knowledge about when a packet is Cisco Express Forwarding (CEF) switched through the spoke-to-spoke tunnel.
When the NHRP background process runs the following happens:
•If
the expire time is <= 120 seconds, then the corresponding CEF
adjacency is marked "stale". If the CEF adjacency is then used to switch
a packet, CEF will mark the adjacency "fresh" and trigger NHRP to
refresh the mapping entry.
In both the process and CEF switching cases,
refreshed means that another NHRP resolution request is sent and
response is needed to keep the entry from expiring. If the expiration
time goes to 0 then the NHRP mapping entry is deleted. Also, if this
entry is the last mapping entry with this NBMA address and if the router
is CEF switching, then the CEF adjacency will be cleared and marked
incomplete.
If the IPsec tunnel protection ipsec profile name command is used on an NHRP mGRE interface, then the following also occurs:
3. The
corresponding IPsec security associations (SAs) and Internet Security
Association and Key Management Protocol (ISAKMP) SAs will be deleted.
4. Just prior to removing the ISAKMP SA, Phase 2 and Phase 1 delete notify messages will be sent to the ISAKMP peer.
6. Via
the crypto socket the ISAKMP peer's NHRP mapping entry will have its
expire time set to 5 seconds, unless it is a static NHRP mapping entry.
7. When
the NHRP mapping entry expires and if it is the last mapping entry with
this NBMA address, then the ISAKMP peer also does items 1 through 5.
How to Configure NHRP
To implement basic NHRP functionality the first
two tasks are required. After NHRP is operational, and depending on
your network setup, you can use the other optional tasks to further
configure or modify the operation of NHRP.
Note In
the following tasks, DMVPN (GRE IP with IPSEC) is referred to and used
for all examples because DMVPN is the only place where NHRP is used.
This section contains the following procedures:
•Enabling NHRP on an Interface (required)
•Statically Configuring a Next Hop Server (optional)
•Configuring NHRP Authentication, page 17 (optional)
•Configuring NHRP Server-Only Mode (optional)
•Controlling the Triggering of NHRP (optional)
•Triggering NHRP Based on Traffic Thresholds (optional)
•Controlling the NHRP Packet Rate (optional)
•Suppressing Forward and Reverse Record Options (optional)
•Specifying the NHRP Responder IP Address (optional)
•Clearing the NHRP Cache (optional)
Configuring a GRE Tunnel for Multipoint Operation
You can enable a GRE tunnel to operate in
multipoint fashion. A tunnel network of multipoint tunnel interfaces can
be thought of as an NBMA network. When multiple GRE tunnels are
configured on the same router they must either have unique tunnel ID
keys or unique tunnel source addresses. NHRP is required on mGRE tunnel
interfaces, because it provides the VPN-layer-IP to NBMA-layer- IP
address mappings for forwarding IP data packets over the mGRE tunnel.
Note Prior
to Cisco IOS Release 12.3(11)T, all mGRE interfaces required the
configuration of a tunnel ID key. After Cisco IOS Release 12.3(11)T this
is optional, but if multiple GRE (mGRE) interfaces are configured on
the same router without a tunnel ID key, then the mGRE interfaces be
configured with unique tunnel source addresses.
The tunnel ID key is carried in each GRE
packet, it is not carried in any NHRP messages. We do not recommend
relying on this key for security purposes.
Perform this task to configure a GRE tunnel for multipoint (NBMA) operation.
SUMMARY STEPS
DETAILED STEPS
Command or Action
|
Purpose
|
|
---|---|---|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
Router(config)# interface tunnel 100
|
Configures an interface and enters interface configuration mode.
|
Step 4
|
tunnel mode gre multipoint
Example:
Router(config-if)# tunnel mode gre multipoint
|
Enables a GRE tunnel to be used in multipoint NBMA mode.
|
Step 5
|
tunnel key key-number
Example:
Router(config-if)# tunnel key 3 |
(Optional) Sets the tunnel ID key
•See the "NHRP on a Multipoint Tunnel: Example" section for an example of NHRP configured on a multipoint tunnel.
|
Step 6
|
ip nhrp network-id number
Example:
Router(config-if)# ip nhrp network-id 1
|
Enables NHRP on the interface.
|
Enabling NHRP on an Interface
The NHRP network ID is used to define the NHRP
domain for an NHRP interface and differentiate between multiple NHRP
domains or networks, when two or more NHRP domains (GRE tunnel
interfaces) are available on the same NHRP node (router). The NHRP
network ID is used to help keep two NHRP networks (clouds) separate from
each other when both are configured on the same router.
The NHRP network ID is a local only parameter.
It is significant only to the local router and it is not transmitted in
NHRP packets to other NHRP nodes. For this reason the actual value of
the NHRP network ID configured on a router need not match the same NHRP
network ID on another router where both of these routers are in the same
NHRP domain. As NHRP packets arrive on a GRE interface, they are
assigned to the local NHRP domain in the NHRP network ID that is
configured on that interface.
Note This method of assigning a network ID is similar to the Open Shortest Path First (OSPF) concept of process ID in the router ospf id command
. If more than one OSPF process is configured, then the OSPF neighbors
and any routing data that they provide is assigned to the OSPF process
(domain) by which interfaces map to the network arguments under the different router ospf id configuration blocks.
We recommend that the same NHRP network ID be
used on the GRE interfaces on all router that are in the same NHRP
network. It is then easier to track which GRE interfaces are members of
which the NHRP network.
NHRP domains (network IDs) can be unique on
each GRE tunnel interface on a router. This is required when running
DMVPN Phase 1 or Phase 2 or when using a tunnel key on the GRE
interfaces. This places each GRE interface into a different NHRP domain,
which is equivalent to each being in a unique DMVPN network.
NHRP domains can span across GRE tunnel
interfaces on a route. This option is available when running DMVPN Phase
3 and not using a tunnel key on the GRE tunnel interfaces. In this case
the effect of using the same NHRP network ID on the GRE tunnel
interfaces is to "glue" the two GRE interfaces into a single NHRP
network (DMVPN network).
Perform this task to enable NHRP for an
interface on a router. In general, all NHRP stations within a logical
NBMA network should be configured with the same network identifier.
SUMMARY STEPS
DETAILED STEPS
Configuring a Static IP-to-NBMA Address Mapping on a Station
To participate in NHRP, a station connected to
an NBMA network must be configured with the IP and NBMA addresses of its
NHSs. The format of the NBMA address depends on the medium you are
using. For example, GRE uses a network service access point (NSAP)
address, Ethernet uses a MAC address, and SMDS uses an E.164 address.
These NHSs may also be the default or peer
routers of the station, so their addresses can be obtained from the
network layer forwarding table of the station.
If the station is attached to several link
layer networks (including logical NBMA networks), the station should
also be configured to receive routing information from its NHSs and peer
routers so that it can determine which IP networks are reachable
through which link layer networks.
Perform this task to configure static
IP-to-NBMA address mapping on a station (host or router). To enable IP
multicast and broadcast packets to be sent to the statically configured
station, use the ip nhrp map multicast nbma-address command. This step is required on multipoint GRE tunnels and not required on point-point RE tunnels.
Note The IGP routing protocol uses IP multicast or broadcast, so this step, though optional, is often required.
SUMMARY STEPS
DETAILED STEPS
Statically Configuring a Next Hop Server
A NHS normally uses the network layer
forwarding table to determine where to forward NHRP packets and to find
the egress point from an NBMA network. A NHS may also be statically
configured with a set of IP address prefixes that correspond to the IP
addresses of the stations it serves, and their logical NBMA network
identifiers.
Perform this task to statically configure a Next Hop Server.
SUMMARY STEPS
DETAILED STEPS
Changing the Length of Time NBMA Addresses Are Advertised as Valid
You can change the length of time that NBMA addresses are advertised as valid in positive NHRP responses. In this context, advertised
means how long the Cisco IOS software tells other routers to keep the
address mappings it is providing in NHRP responses. The default length
of time is 7200 seconds (2 hours). Perform this task to change the
length of time.
This controls how long a spoke-to-spoke
shortcut path will stay up after it is no longer used or how often the
spoke-to-spoke short-cut path mapping entry will be refreshed if it is
still being used. We recommend that a value from 300 to 600 seconds be
used.
The ip nhrp holdtime command
controls how often the NHRP NHC will send NHRP registration requests to
its configured NHRP NHSs. The default is to send NHRP Registrations
every one third the NHRP holdtime value (default = 2400 seconds (40
minutes)). The optional ip nhrp registration timeout value command can be used to set the interval for sending NHRP registration requests independently from the NHRP holdtime.
SUMMARY STEPS
DETAILED STEPS
Specifying the NHRP Authentication String
Configuring an authentication string ensures
that only routers configured with the same string can communicate using
NHRP. Therefore, if the authentication scheme is to be used, the same
string must be configured in all devices configured for NHRP on a
fabric. Perform this task to specify the authentication string for NHRP
on an interface.
Note We
recommend using an NHRP authentication string, especially to help keep
multiple NHRP domains separate from each other. The NHRP authentication
string is not encrypted, so it cannot be used as a true authentication
for an NHRP node trying to enter the NHRP network (cloud).
SUMMARY STEPS
DETAILED STEPS
Configuring NHRP Server-Only Mode
You can configure an interface so that it
cannot initiate NHRP resolution requests to establish NHRP shortcut SVCs
but can respond only to NHRP resolution requests. Configure NHRP
server-only mode on routers you do not want placing NHRP resolution
requests.
If an interface is placed in NHRP server-only mode, you have the option to specify theip nhrp server-only [non-caching]
command keyword. In this case, NHRP does not store mapping information
in the NHRP cach, such as NHRP responses that go through the router. To
save memory and block building of NHRP shortcuts, the non-caching option
is generally used on a router located between two other NHRP routers
(NHRP hubs).
Perform this task to configure NHRP server-only mode.
SUMMARY STEPS
DETAILED STEPS
Controlling the Triggering of NHRP
There are two ways to control when NHRP is triggered on any platform. These methods are described in the following sections:
Triggering NHRP on a per-Destination Basis
You can specify an IP access list that is used
to decide which IP packets can trigger the sending of NHRP resolution
requests. By default, all non-NHRP packets trigger NHRP resolution
requests. To limit which IP packets trigger NHRP resolution requests,
define an access list and then apply it to the interface.
Note NHRP
resolution requests are used to build direct paths between two NHRP
nodes. Even though certain traffic is excluded from triggering the
building of this path, if the path is already built then this "excluded"
traffic will use the direct path.
Perform the following task to trigger NHRP on a per-destination basis.
SUMMARY STEPS
or
access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [established] [log]
DETAILED STEPS
Triggering NHRP on a Packet Count Basis
By default, when the software attempts to send a
data packet to a destination for which it has determined that NHRP can
be used, it sends an NHRP request for that destination. Perform this
task to configure the system to wait until a specified number of data
packets have been sent to a particular destination before NHRP is
attempted.
SUMMARY STEPS
DETAILED STEPS
Triggering NHRP Based on Traffic Thresholds
NHRP can run on Cisco Express Forwarding
platforms when NHRP runs with Border Gateway Protocol (BGP). You can
configure NHRP to initiate SVCs once a configured traffic rate is
reached. Similarly, SVCs can be torn down when traffic falls to another
configured rate.
Prior to Cisco IOS Release 12.0, a single
packet could trigger an SVC. Now you can configure the traffic rate that
must be reached before NHRP sets up or tears down an SVC. Because SVCs
are created only for burst traffic, you can conserve resources.
To configure the NHRP triggering and teardown
of SVCs based on traffic rate, perform the following tasks. The first
task is required; the second and third tasks are optional.
•Changing the Rate for Triggering SVCs, page 23 (required)
Prerequisites
Before you configure the feature whereby NHRP
initiation is based on traffic rate, the following conditions must exist
in the router:
If your network has CEF switching or dCEF
switching and you want NHRP to work (whether with default values or
changed values), configure the ip cef accounting non-recursive command .
Restrictions
Cisco IOS releases prior to Release 12.0
implemented NHRP draft version 4. Cisco IOS Release 12.0 and later
releases implement NHRP draft version 11. These versions are not
compatible. Therefore, all routers running NHRP in a network must run
the same version of NHRP in order to communicate with each other. All
routers must run Cisco IOS Release 12.0 and later releases, or all
routers must run a release prior to Release 12.0, but not a combination
of the two.
When NHRP runs with BGP, there is way to
control the triggering of NHRP packets. This method consists of SVCs
being initiated based on the input traffic rate to a given BGP next hop.
When BGP discovers a BGP next hop and enters
this BGP route into the routing table, an NHRP request is sent to the
BGP next hop. When an NHRP reply is received, a subsequent route is put
in the NHRP cache that directly corresponds to the BGP next hop.
A new NHRP request is sent to the same BGP next
hop to repopulate the NHRP cache. When an NHRP cache entry is
generated, a subsequent map statement to the same BGP next hop is also
created.
Aggregate traffic to each BGP next hop is
measured and monitored. Once the aggregate traffic has met or exceeded
the configured trigger rate, NHRP creates an SVC and sends traffic
directly to that destination router. The router tears down the SVC to
the specified destinations when the aggregate traffic rate falls to or
below the configured teardown rate.
By default, NHRP will set up an SVC for a
destination when aggregate traffic for that destination is more than 1
kbps over a running average of 30 seconds. Similarly, NHRP will tear
down the SVC when the traffic for that destination drops to 0 kbps over a
running average of 30 seconds. There are several ways to change the
rate at which SVC setup or teardown occurs. You can change the number of
kbps thresholds, or the load interval, or both.
Perform this task to change the number of kilobits per second at which NHRP sets up or tears down the SVC to this destination.
SUMMARY STEPS
DETAILED STEPS
Changing the Sampling Time Period and Sampling Rate
You can change the length of time over which
the average trigger rate or teardown rate is calculated. By default, the
period is 30 seconds; the range is from 30 to 300 seconds in 30-second
increments. This period is for calculations of aggregate traffic rate
internal to Cisco IOS software only, and it represents a worst-case time
period for taking action. In some cases, the software will act sooner,
depending on the ramp-up and fall-off rate of the traffic.
If your Cisco hardware has a Virtual Interface
Processor, version 2 adapter, you must perform the following task to
change the sampling time. By default, the port adapter sends the traffic
statistics to the Route Processor every 10 seconds. If you are using
NHRP in dCEF switching mode, you must change this update rate to 5
seconds.
Perform this task to change the sampling time period and the sampling rate.
SUMMARY STEPS
DETAILED STEPS
Applying the Triggering and Teardown Rates to Specific Destinations
Perform this task to impose the triggering and
teardown rates on certain destinations. By default, all destinations are
measured and monitored for NHRP triggering.
SUMMARY STEPS
or
access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [log]
DETAILED STEPS
Controlling the NHRP Packet Rate
There is the maximum value for the number of
NHRP messages that the local NHRP process can handle within a set period
of time. This limit protects the router against things like a runaway
NHRP process sending NHRP requests or an application (worm) that is
doing an IP address scan that is triggering many spoke-to-spoke tunnels.
The larger the Max-send-interval
the more NHRP packets the system can process and send. These messages
do not use much memory and the CPU usage is not be very large per
message, however excessive messages causing excessive CPU usage can
degrade system performance.
To set a reasonable Max-send-interval consider the following information:
•Number
of spoke routers being handled by this hub and how often they send NHRP
registration requests. To support this load you would need:
Number of spokes/registration timeout * Max-send-interval
For example:
500 spokes with 100 second Registration timeout
Max-send-interval = 500/100*10 = 50
•The maximum number of spoke-to-spoke tunnels that are expected to be up at any one time across the NBMA network:
spoke-to-spoke tunnels/NHRP holdtime * Max-send-interval
This would cover spoke-to-spoke tunnel creation
and the refreshing of spoke-to-spoke tunnels that are used for longer
periods of time.
Then add these together and multiply this by 1.5 or 2.0 to give a buffer.
•The max-send-interval can be used to keep the long-term average number of NHRP messages allowed to be sent constant, but allow greater peaks.
By default, the maximum rate at which the
software sends NHRP packets is five packets per 10 seconds. The software
maintains a per-interface quota of NHRP packets (whether generated
locally or forwarded) that can be sent.
Perform this task to change the maximum rate at which NRHP packets will be handled.
SUMMARY STEPS
DETAILED STEPS
Suppressing Forward and Reverse Record Options
To dynamically detect link layer filtering in
NBMA networks (for example, SMDS address screens), and to provide loop
detection and diagnostic capabilities, NHRP incorporates a Route Record
in request and reply packets. The Route Record options contain the
network (and link layer) addresses of all intermediate Next Hop Servers
betweenthe source and destination (in the forward direction) and between
the destination and source (in the reverse direction).
By default, Forward Record options and Reverse
Record options are included in NHRP request and reply packets. Perform
the following task to suppress forwared and reverse record options.
Note Forward
and Reverse Record information is required for the proper operation of
NHRP, especially in a DMVPN network. Therefore you must not configure
suppression of this information.
SUMMARY STEPS
DETAILED STEPS
Specifying the NHRP Responder IP Address
An NHRP requester that wants to know which Next
Hop Server generates an NHRP reply packet can incluse the responder
address option in its NHRP request packet. The Next Hop Server that
generates the NHRP reply packet then complies by inserting its own IP
address in the NHRP reply. The Next Hop Server uses the primary IP
address of the specified interface.
Perform this task to specify which interface the Next Hop Server uses for the NHRP responder IP address.
SUMMARY STEPS
DETAILED STEPS
Clearing the NHRP Cache
The NHRP cache can contain entries of
statically configured NHRP mappings and dynamic entries caused by the
Cisco IOS software learning addresses from NHRP packets. To clear
statically configured entries, use the no ip nhrp map command in interface configuration mode.
Perform the following task to clear the NHRP cache.
SUMMARY STEPS
DETAILED STEPS
Configuration Examples for NHRP
This section provides the following configuration examples:
Physical Network Designs for Logical NBMA: Examples
A logical NBMA network is considered the group
of interfaces and hosts participating in NHRP and having the same
network identifier. Figure 2
illustrates two logical NBMA networks (shown as circles) configured
over a single physical NBMA network. Router A can communicate with
routers B and C because they share the same network identifier (2).
Router C can also communicate with routers D and E because they share
network identifier 7. After address resolution is complete, router A can
send IP packets to router C in one hop, and router C can send them to
router E in one hop, as shown by the dotted lines.
Figure 2 Two Logical NBMA Networks over One Physical NBMA Network
The physical configuration of the five routers in Figure 2 might actually be that shown in Figure 3.
The source host is connected to router A and the destination host is
connected to router E. The same switch serves all five routers, making
one physical NBMA network.
Figure 3 Physical Configuration of a Sample NBMA Network
Refer again to Figure 2.
Initially, before NHRP has resolved any NBMA addresses, IP packets from
the source host to the destination host travel through all five routers
connected to the switch before reaching the destination. When router A
first forwards the IP packet toward the destination host, router A also
generates an NHRP request for the IP address of the destination host.
The request is forwarded to router C, whereupon a reply is generated.
Router C replies because it is the egress router between the two logical
NBMA networks.
Similarly, router C generates an NHRP request
of its own, to which router E replies. In this example, subsequent IP
traffic between the source and the destination still requires two hops
to traverse the NBMA network, because the IP traffic must be forwarded
between the two logical NBMA networks. Only one hop would be required if
the NBMA network were not logically divided.
Applying NHRP Rates to Specific Destinations: Example
In the following example, only the packets that
pass extended access list 101 are subject to the default SVC triggering
and teardown rates:
interface tunnel 100
ip nhrp interest 101
!
access-list 101 permit ip any any
access-list 101 deny ip any 10.3.0.0 0.0.255.255
NHRP on a Multipoint Tunnel: Example
With multipoint tunnels, a single tunnel
interface may be connected to multiple neighboring routers. Unlike
point-to-point tunnels, a tunnel destination need not be configured. In
fact, if configured, the tunnel destination must correspond to an IP
multicast address. Broadcast or multicast packets to be sent over the
tunnel interface can then be sent by sending the GRE packet to the
multicast address configured as the tunnel destination.
Multipoint tunnels require that you configure a
tunnel key. Otherwise, unexpected GRE traffic could easily be received
by the tunnel interface. For simplicity, we recommend that the tunnel
key correspond to the NHRP network identifier.
In the following example, routers A, B, C, and D
all share an Ethernet segment. Minimal connectivity over the multipoint
tunnel network is configured, thus creating a network that can be
treated as a partially meshed NBMA network. Due to the static NHRP map
entries, router A knows how to reach router B, router B knows how to
reach router C, router C knows how to reach router D, and router D knows
how to reach Router A.
When router A initially attempts to send an IP
packet to router D, the packet is forwarded through routers B and C. The
routers use NHRP to quickly learn the NBMA addresses of each other (in
this case, IP addresses assigned to the underlying Ethernet network).
The partially meshed tunnel network readily becomes fully meshed, at
which point any of the routers can directly communicate over the tunnel
network without their IP traffic requiring an intermediate hop.
The significant portions of the configurations for routers A, B, C, and D follow:
Router A Configuration
interface tunnel 0
no ip redirects
ip address 11.0.0.1 255.0.0.0
ip nhrp map 11.0.0.2 10.0.0.2
ip nhrp network-id 1
ip nhrp nhs 11.0.0.2
tunnel source ethernet 0
tunnel mode gre multipoint
tunnel key 1
interface ethernet 0
ip address 10.0.0.1 255.0.0.0
Router B Configuration
interface tunnel 0
no ip redirects
ip address 11.0.0.2 255.0.0.0
ip nhrp map 11.0.0.3 10.0.0.3
ip nhrp network-id 1
ip nhrp nhs 11.0.0.3
tunnel source ethernet 0
tunnel mode gre multipoint
tunnel key 1
interface ethernet 0
ip address 10.0.0.2 255.0.0.0
Router C Configuration
interface tunnel 0
no ip redirects
ip address 11.0.0.3 255.0.0.0
ip nhrp map 11.0.0.4 10.0.0.4
ip nhrp network-id 1
ip nhrp nhs 11.0.0.4
tunnel source ethernet 0
tunnel mode gre multipoint
tunnel key 1
interface ethernet 0
ip address 10.0.0.3 255.0.0.0
Router D Configuration
interface tunnel 0
no ip redirects
ip address 11.0.0.4 255.0.0.0
ip nhrp map 11.0.0.1 10.0.0.1
ip nhrp network-id 1
ip nhrp nhs 11.0.0.1
tunnel source ethernet 0
tunnel mode gre multipoint
tunnel key 1
interface ethernet 0
ip address 10.0.0.4 255.0.0.0
Show NHRP: Examples
The following is sample output from the show ip nhrp command:
Router# show ip nhrp
10.0.0.2 255.255.255.255, tunnel 100 created 0:00:43 expire 1:59:16
Type: dynamic Flags: authoritative
NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11
10.0.0.1 255.255.255.255, Tunnel0 created 0:10:03 expire 1:49:56
Type: static Flags: authoritative
NBMA address: 10.1.1.2
The fields in the sample display are as follows:
•The
IP address and its network mask in the IP-to-NBMA address cache. The
mask is always 255.255.255.255 because Cisco does not support
aggregation of NBMA information through NHRP.
•The
time in which the positive and negative authoritative NBMA address will
expire (hours:minutes:seconds). This value is based on the ip nhrp holdtime command.
–authoritative—Indicates
that the NHRP information was obtained from the Next Hop Server or
router that maintains the NBMA-to-IP address mapping for a particular
destination.
–implicit—Indicates
that the information was learned not from an NHRP request generated
from the local router, but from an NHRP packet being forwarded or from
an NHRP request being received by the local router.
–negative—For
negative caching; indicates that the requested NBMA mapping could not
be obtained. When NHRP sends an NHRP resolution request it inserts an
incomplete (negative) NHRP mapping entry for the address in the
resolution request. This is to keep the router from triggering more NHRP
resolution requests while this NHRP resolution request is being
resolved and the IKE or IPsec tunnel created.
–unique—NHRP
registration request packet had the "unique" flag set (on by default).
This means that this NHRP mapping entry cannot be overwritten with a
mapping entry that has the same IP address but a different NBMA address.
When a spoke has a statically configured outside IP (NBMA) address this
flag is used to keep another spoke that is misconfigured with the same
tunnel IP address from overwriting this entry. If a spoke has a dynamic
outside IP (NBMA) address then you configure ip nhrp registration no-unique
on the spoke to clear this flag. This flag then allows the registered
NHRP mapping entry for that spoke on the hub to be overwritten with a
new NBMA address. This is necessary in this case since the spoke's
outside IP (NBMA) address may change at any time. If the "unique" flag
was set, then the spoke would have to wait for the mapping entry on the
hub to time out before it could register its new (NBMA) mapping.
–registered—The
mapping entry was created from receiving an NHRP registration request.
Registered mapping entries are dynamic entries, but they will not be
refreshed through the "used" mechanism. These entries are refreshed by
receiving another NHRP registration requests with the same tunnel IP to
NBMA IP address mapping. The NHC must periodically send NHRP
registration requests to keep these mappings from expiring.
–used—When
data packets are process-switched and this mapping entry was used, the
mapping entry is marked as used. The mapping data base is checked every
60 seconds. If the used flag is set and there are more than 120 seconds
left in the expire time, the used flag is cleared. If there are fewer
than 120 seconds left in the expire time, then this mapping entry is
"refreshed" by sending another NHRP resolution request.
Note When your routers are running DMVPN Phase 3 in 12.4(6)T, CEF switched packets will also
set the 'used' flag, and these entries will be timed out and refreshed as described in the "used" flag description above.
set the 'used' flag, and these entries will be timed out and refreshed as described in the "used" flag description above.
–router—NHRP
mapping entries that are for a remote router itself for access to a
network or host behind the remote router are marked with the router
flag.
–local—NHRP
mapping entries that are for a network's local to this router (serviced
by this router) are marked with the local flag. These entries are
created when this router answers an NHRP resolution request with this
information and are used by the rouer to store the tunnel IP address of
all of the other NHRP nodes to which this router has sent this
information. If for some reason this router loses access to this local
network (it can no longer service this network) it will send an NHRP
purge message to all remote NHRP nodes listed in the 'local' entry (this
list is not visible) to tell the remote nodes to clear this information
out of their NHRP mapping tables. This 'local' mapping entry times out
of the local
NHRP mapping database at the same time that this information (from the NHRP resolution reply) would time out of the NHRP mapping database on the remote NHRP nodes.
NHRP mapping database at the same time that this information (from the NHRP resolution reply) would time out of the NHRP mapping database on the remote NHRP nodes.
–implicit—NHRP
mapping entries that were learned by the local node by using the source
NHRP mapping information from an NHRP resolution request or reply.
(no socket)—NHRP mapping entries for which the
router does not need nor want to trigger IPsec to set up encryption,
because the router does not have data traffic that needs to use this
tunnel. If later on there is data traffic that needs to use this tunnel
it will be converted from a "no socket" to a "socket" entry and IPsec
will be triggered to set up the encryption for this tunnel. Local and
implicit NHRP mapping entries are always initially marked as "no
socket."
NHRP by default caches source information from
NHRP resolution request or replies as they go through the system. In
order to allow this caching to continue, but not have the entry create
an IPsec socket they are marked as (no socket). If this was not done
there woudl be extra IPsec sockets from the hubs to the various spokes
that either were not used are were used for only one or two packets
while the spoke-to-spoke tunnel was being built. Data packets and NHRP
packets that arrive on the tunnel interface and are forwarded back out
the tunnel interface are not allowed to use the (no socket) NHRP
mappings for forwarding. Because in this case, the router is an
intermediate node in the path between the two endpoints and we only want
to create short-cut tunnels between the entrance and exit point of the
DMVPN (NBMA) network and not between any intermediate nodes. If at some
point the router receives a data packet that has a source interface that
is not the tunnel interface and it would use the (no socket) mapping
entry, the router converts the (no socket) entry to a (socket) entry.
And in this case, this router is the entrance (or exit) point of the
NBMA (for this traffic stream).
Also these (no socket) mapping entries are
marked (non-authoritative); only mappings from NHRP registrations are
marked (authoritative). The NHRP resolution requests are also marked
(authoritative), which means that the NHRP resolution request can be
answered only from an (authoritative) NHRP mapping entry. A (no socket)
mapping entry will not be used to answer an NHRP resolution request and
the NHRP resolution request will be forwarded to this nodes NHS.
–nat—This
setting is on NHRP mapping entries that are from NHRP registration
packets. This indicates that the remote node (NHS client) supports the
NHRP NAT extension type for supporting dynamic spoke-to-spoke tunnels to
or from spokes behind a NAT router. This flag does not mean that the
spoke (NHS client) is behind a NAT router.
•NBMA
address—Nonbroadcast multiaccess address. The address format is
appropriate for the type of network being used (for example, GRE,
Ethernet, SMDS, or multipoint tunnel
The following is sample output from the show ip nhrp traffic command which displays NHRP traffic statistics:
Router# show ip nhrp traffic
Tunnel0
request packets sent: 2
request packets received: 4
reply packets sent: 4
reply packets received: 2
register packets sent: 0
register packets received: 0
error packets sent: 0
error packets received: 0
The fields shown in the sample display are as follows:
•register
packets sent—Number of NHRP register packets originated from this
station. Routers and access servers do not send register packets, so
this value is 0.
•register
packets received—Number of NHRP register packets received by this
station. Routers or access servers do not send register packets, so this
value is 0.
The following example shows output for a specific tunnel, tunnel7:
Router# show ip nhrp traffic interface tunnel7
Tunnel7: Max-send limit:100Pkts/10Sec, Usage:0%
Sent: Total 79
18 Resolution Request 10 Resolution Reply 42 Registration Request
0 Registration Reply 3 Purge Request 6 Purge Reply
0 Error Indication 0 Traffic Indication
Rcvd: Total 69
10 Resolution Request 15 Resolution Reply 0 Registration Request
36 Registration Reply 6 Purge Request 2 Purge Reply
0 Error Indication 0 Traffic Indication
NHRP holdtime = 600, NHRP registration timeout
not set. NHRP registrations will be sent every 200 seconds so the time
to detect that an NHS is down would range from 7 to 207 seconds with an
average of 107 seconds.
Router# show ip nhrp nhs detail Legend: E=Expecting replies R=Responding Tunnel0: 10.0.0.1 E req-sent 14793 req-failed 1 repl-recv 14751 (00:25:07 ago) 10.0.0.2 req-sent 26 req-failed 9 repl-recv 0 Legend: E=Expecting replies R=Responding Tunnel1: 10.0.1.1 RE req-sent 14765 req-failed 1 repl-recv 14763 (00:01:07 ago) Pending Registration Requests: Registration Request: Reqid 29507, Ret 64 NHS 10.0.0.1 Registration Request: Reqid 29511, Ret 64 NHS 10.0.0.2
10.0.0.1 is new (expecting replies) and is down.
10.0.0.2 is old (not expecting replies) and is assumed up.
10.0.1.1 is new (expecting replies) and is up.
10.0.0.2 is old (not expecting replies) and is assumed up.
10.0.1.1 is new (expecting replies) and is up.
Additional References
The following sections provide references related to the configuring NHRP.