I have set up an aggressive mode VPN between a cisco 877 and OpenBSD server.
The SA seems to have set up correctly however the connection only
appears to pass traffic from the cisco to the server.
The private IPs on the cisco have a nat exemption to keep it from
natting when going through the tunnel.
The server its self has no pf running on it right now for testing purposes.
Thank you for your response, if you want or need any more info please
let me know
If i ping the server from my work station behind the cisco i get this
and a timeout on the ping
# tcpdump -i enc0
tcpdump: listening on enc0, link-type ENC
22:30:25.843966 (authentic,confidential): SPI 0x1fd60d2c: 10.0.0.17 >
mail.sporkton.com: icmp: echo request (encap)
22:30:31.343855 (authentic,confidential): SPI 0x1fd60d2c: 10.0.0.17 >
mail.sporkton.com: icmp: echo request (encap)
22:30:36.843874 (authentic,confidential): SPI 0x1fd60d2c: 10.0.0.17 >
mail.sporkton.com: icmp: echo request (encap)
^C
3 packets received by filter
0 packets dropped by kernel
SERVER:
# uname -a
OpenBSD angie.sporkton.com 4.3 GENERIC#698 i386
# cat /etc/ipsec.conf
# angie.sporkton.com
ike dynamic esp tunnel proto ip \
from 38.102.248.176/29 to 10.0.0.0/24 \
aggressive auth hmac-sha1 enc 3des group modp1024 \
quick auth hmac-sha1 enc 3des \
srcid "angie.sporkton.com" dstid "fire.sporkton.com" \
psk "secret"
# ipsecctl -vs all
FLOWS:
No flows
SAD:
esp tunnel from 75.22.69.151 to 38.102.248.178 spi 0x6b8a31cd auth
hmac-sha1 enc 3des-cbc
sa: spi 0x6b8a31cd auth hmac-sha1 enc 3des-cbc
state mature replay 16 flags 4
lifetime_cur: alloc 0 bytes 8960 add 1222319514 first 1222319514
lifetime_hard: alloc 0 bytes 0 add 1200 first 0
lifetime_soft: alloc 0 bytes 0 add 1080 first 0
address_src: 75.22.69.151
address_dst: 38.102.248.178
identity_src: type fqdn id 0: fire.sporkton.com
identity_dst: type fqdn id 0: angie.sporkton.com
src_mask: 255.255.255.0
dst_mask: 255.255.255.248
protocol: proto 0 flags 0
flow_type: type use direction in
src_flow: 10.0.0.0
dst_flow: 38.102.248.176
lifetime_lastuse: alloc 0 bytes 0 add 0 first 1222320279
esp tunnel from 38.102.248.178 to 75.22.69.151 spi 0xbf127570 auth
hmac-sha1 enc 3des-cbc
sa: spi 0xbf127570 auth hmac-sha1 enc 3des-cbc
state mature replay 16 flags 4
lifetime_cur: alloc 0 bytes 0 add 1222319514 first 0
lifetime_hard: alloc 0 bytes 0 add 1200 first 0
lifetime_soft: alloc 0 bytes 0 add 1080 first 0
address_src: 38.102.248.178
address_dst: 75.22.69.151
identity_src: type fqdn id 0: angie.sporkton.com
identity_dst: type fqdn id 0: fire.sporkton.com
src_mask: 255.255.255.248
dst_mask: 255.255.255.0
protocol: proto 0 flags 0
flow_type: type use direction out
src_flow: 38.102.248.176
dst_flow: 10.0.0.0
CISCO:
!
hostname fire
aaa new-model
aaa authentication login default local
!
ip inspect udp idle-time 180
ip inspect tcp block-non-session
ip inspect name outside_in tcp audit-trail on router-traffic timeout 43200
ip inspect name outside_in udp router-traffic
ip domain name sporkton.com
ip host sporkton.com 38.102.248.178
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
crypto isakmp key secret hostname angie.sporkton.com no-xauth
crypto isakmp identity hostname
!
crypto isakmp peer address 38.102.248.178
set aggressive-mode password secret
set aggressive-mode client-endpoint fqdn fire.sporkton.com
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto map outside_vpn 10 ipsec-isakmp
set peer 38.102.248.178
set transform-set ESP-3DES-SHA
match address cryptomap_outside_10
!
interface FastEthernet0
!
interface Vlan1
ip address 10.0.0.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Dialer1
ip address negotiated
ip nat outside
ip virtual-reassembly
crypto map outside_vpn
!
ip nat inside source route-map NoNAT interface Dialer1 overload
!
ip access-list extended NoNAT
permit tcp 10.0.0.0 0.0.0.255 38.102.248.176 0.0.0.7 eq 22
deny ip 10.0.0.0 0.0.0.255 38.102.248.176 0.0.0.7
permit ip 10.0.0.0 0.0.0.255 any
ip access-list extended cryptomap_outside_10
permit ip 10.0.0.0 0.0.0.255 38.102.248.176 0.0.0.7
ip access-list extended outside_access_in
permit tcp any any eq 22
permit icmp any any
permit tcp any any established
permit udp any eq domain any
permit esp any any
permit udp any any eq isakmp
!
route-map NoNAT permit 10
match ip address NoNAT
fire# show crypto session
Crypto session current status
Interface: Dialer1
Session status: UP-ACTIVE
Peer: 38.102.248.178 port 500
IKE SA: local 75.22.69.151/500 remote 38.102.248.178/500 Active
IPSEC FLOW: permit ip 10.0.0.0/255.255.255.0 38.102.248.176/255.255.255.248
Active SAs: 2, origin: crypto map
IPSEC FLOW: permit ip 10.0.0.0/255.255.255.0 38.102.248.176/255.255.255.248
Active SAs: 2, origin: crypto map
fire#sho cry isa sa
IPv4 Crypto ISAKMP SA
dst src state conn-id slot status
38.102.248.178 75.22.69.151 QM_IDLE 1002 0 ACTIVE
IPv6 Crypto ISAKMP SA
fire#sho cry ips sa
interface: Dialer1
Crypto map tag: outside_vpn, local addr 75.22.69.151
protected vrf: (none)
local ident (addr/mask/prot/port): (10.0.0.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (38.102.248.176/255.255.255.248/0/0)
current_peer 38.102.248.178 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 1155, #pkts encrypt: 1155, #pkts digest: 1155
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 52, #recv errors 0
local crypto endpt.: 75.22.69.151, remote crypto endpt.: 38.102.248.178
path mtu 1500, ip mtu 1500
current outbound spi: 0x6B8A31CD(1804218829)
inbound esp sas:
spi: 0xBF127570(3205657968)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 15, flow_id: C87X_MBRD:15, crypto map: outside_vpn
sa timing: remaining key lifetime (k/sec): (4499623/218)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x6B8A31CD(1804218829)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 16, flow_id: C87X_MBRD:16, crypto map: outside_vpn
sa timing: remaining key lifetime (k/sec): (4499603/218)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
outbound ah sas:
outbound pcp sas:
interface: Virtual-Access1
Crypto map tag: outside_vpn, local addr 75.22.69.151
protected vrf: (none)
local ident (addr/mask/prot/port): (10.0.0.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (38.102.248.176/255.255.255.248/0/0)
current_peer 38.102.248.178 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 1155, #pkts encrypt: 1155, #pkts digest: 1155
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 52, #recv errors 0
local crypto endpt.: 75.22.69.151, remote crypto endpt.: 38.102.248.178
path mtu 1500, ip mtu 1500
current outbound spi: 0x6B8A31CD(1804218829)
inbound esp sas:
spi: 0xBF127570(3205657968)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 15, flow_id: C87X_MBRD:15, crypto map: outside_vpn
sa timing: remaining key lifetime (k/sec): (4499623/217)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0x6B8A31CD(1804218829)
transform: esp-3des esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 16, flow_id: C87X_MBRD:16, crypto map: outside_vpn
sa timing: remaining key lifetime (k/sec): (4499603/217)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
outbound ah sas:
outbound pcp sas:
fire#
--
-Lawrence