> Salut,
Hey. Imi cer scuze pt. top-posting-ul din mailurile anterioare.
> Acl trebuie sa fie facut pe subneturile care vrei sa le conectezi cu
> ipsec
> Ai definit aici
> conn ipsec01-cisco6500
> left=19.1.255.254
> leftsubnet=19.2.0.0/16 linux net
> right=19.1.255.253
> rightsubnet=66.6.0.0/16 cisco net
> auto=add
> authby=secret
> auth=esp
> compress=no
> pfs=yes
> esp=3des-md5-modp1024
> ike=3des-md5-modp1024
> keyexchange=ikev1
> mobike=no
>
dap, se face tunnel intre cele 2 subnet-uri (19.2.0.0/16 al linuxului si
66.6.0.0/16 al cisco-ului), nu transport, asta e conn-ul:
1. ----linux-------
conn ipsec01-cisco6500
type=tunnel
left=19.1.255.254
leftsubnet=19.2.0.0/16
leftfirewall=yes //asta a fost adaugat, insa rezultatul
e la fel cu sau fara linia asta
right=19.1.255.253
rightsubnet=66.6.0.0/16
auto=add
authby=secret
auth=esp
compress=no
pfs=yes
esp=3des-md5-modp1024
ike=3des-md5-modp1024
keyexchange=ikev1
mobike=no
cvintila-ipsec01:/etc# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.205.16.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
66.6.0.0 19.1.255.253 255.255.0.0 UG 0 0 0 eth1
19.1.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth1
19.2.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth4
0.0.0.0 10.205.16.1 0.0.0.0 UG 0 0 0 eth0
am allow all in iptables
si
net.ipv4.ip_forward=1
in sysctl.conf
>
> access-list 100 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255 --
> aici e in
> access-list 100 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255 --
> aici e out
>
2. ----cisco-------
asa sunt si la mine pe cisco:
6500#sh access-lists
Extended IP access list 100
10 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
20 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255 (23 matches)
deasemenea
6500#sh crypto map
Crypto Map "IL" 20 ipsec-isakmp
Peer = 19.1.255.254
Extended IP access list 100
access-list 100 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
access-list 100 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255
Current peer: 19.1.255.254
Security association lifetime: 4608000 kilobytes/3600 seconds
PFS (Y/N): Y
DH group: group2
Transform sets={
IL,
}
Interfaces using crypto map IL:
GigabitEthernet4/27
6500#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
19.0.0.0/16 is subnetted, 2 subnets
S 19.2.0.0 [1/0] via 19.1.255.254
C 19.1.0.0 is directly connected, GigabitEthernet4/27
C 21.0.0.0/8 is directly connected, GigabitEthernet4/11.1
C 20.0.0.0/8 is directly connected, GigabitEthernet4/10.1
66.0.0.0/16 is subnetted, 1 subnets
C 66.6.0.0 is directly connected, GigabitEthernet4/28
am activat debugging verbose pe ipsec
#debug crypto verbose
3.------subnet-uri------
a) o masina in spatele linuxului, cu IP 19.2.0.1/16 care are ca default gateway
masina de linux (interfata interna este 19.2.0.254)
b) o masina in spatele cisco-ului, cu IP 66.6.0.10/16 care are ca default
gateway masina cisco (interfata interna este 66.6.0.1)
4.----scenarii incercate----
a) ping de pe linux catre cisco-interfata-externa 19.1.255.253 => succes, fara
ipsec
b) ping de la linux catre cisco-interfata-interna 66.6.0.1 => succes, fara ipsec
c) ping de la cisco catre linux-interfata-externa 19.1.255.254 => succes, fara
ipsec
d) ping de la cisco catre linux-interfata-interna 19.2.0.254 => succes, fara
ipsec
e) ping de la masina 19.2.0.1 catre cisco-interfata-externa 19.1.255.253 =>
succes, fara ipsec
f) ping de la masina 19.2.0.1 catre cisco-interfata-interna 66.6.0.1 => niciun
raspuns, logul de crypto de pe cisco nu arata nicio negociere !
g) ping de la masina 19.2.0.1 catre masina 66.6.0.10 => niciun raspuns, logul
de crypto de pe cisco nu arata nicio negociere !
h) ping de la masina 66.6.0.10 catre linux-interfata-externa 19.1.255.254 =>
succes, fara ipsec
i) ping de la masina 66.6.0.10 catre linux-interfata-interna 19.2.0.254 =>
succes, fara ipsec !
j) ping de la masina 66.6.0.10 catre masina 19.2.0.1 => niciun raspuns, logul
de crypto de pe cisco nu arata nicio negociere !
In cazurile in care nu am niciun raspuns la ping (f, g, j) observ ca se
incrementeaza nr. de 'matches' din access-list 100
(
6500#sh access-lists
Extended IP access list 100
10 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
20 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255 (23 matches)
)
insa nu are loc nicio negociere
Deasemenea, daca
- access-list-ul 100 nu este definit pe subnet-uri, ci are numai permit ip any
any
si
- dau ping de pe cisco pe linux
logurile de pe cisco incep sa arate negociere (logul este cel atasat in mailul
anterior): se realizeaza Phase1, dar nu si Phase 2
(
7w3d: ISAKMP:(0:1:SW:1):deleting SA reason "recevied fatal
informational" state (I) QM_IDLE (peer 19.1.255.254) input queue
0
7w3d: ISAKMP:(0:1:SW:1):deleting node -2036547555 error FALSE reason
"informational (in) state 1"
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_P1_COMPLETE New State =
IKE_P1_COMPLETE
)
Sper sa fie utile info astea si sa ma puteti ajuta.
Mersi frumos,
Cristina
> Daca ai alte access-list pe interfate trebuie sa ii dai access intre
> cele doua capete de tunnel 19.1.255.254 19.1.255.253
> Sa communice de genul permit ip 19.1.255.254 19.1.255.253 . Daca vrei sa
> fii mai specifica ca exemplu
>
> access-list 110 permit udp any host IPSec headend device eq 500
> access-list 110 permit udp any host IPSec headend device eq 4500
> access-list 110 permit 50 any host IPSec headend device
> access-list 110 permit 51 any host IPSec headend device
> access-list 110 deny ip any host IPSec headend device
>
>
> Depinde de ce rute ai prin retea poate e necesar sa le spui celor doua
> capete cum sa ajunga unul la altul pentru reteau pe
> Care o protejezi
>
> Ca exemplu
>
> Router(config)# ip route 19.2.0.0 255.255.0.0 19.1.255.254
>
> In cisco pe crypto map IL 10 pune 'set pfs group2' - asta se aplica
> numai pentru peerul 19.1.255.254 daca ai alte tunele nu au acelasi
> Settings.
>
>
> Daca faci tunnel intre cele doua capete in mod normal poti sa dai un
> ping din reteau 19.2.0.0/16 pe 66.6.0.0/16 dar nu inseamna
> Ca daca faci ping de pe linux gateway pe cisco automat o sa ai ipsec
> creat (traficul a fost definit in access-list 100 !) Daca e in mod
> Transport poti sa faci ipsec numai intre cele doua capete - linux-cisco
> (access-list trebuie sa fie diferita)
>
> Silviu
>
> Ps: uite un exemplu de ipsec facut intre doua IOS e destul de
> explicatoriu http://www.vpnc.org/InteropProfiles/cisco-ios.txt
_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug
___________________________________________________________
Want ideas for reducing your carbon footprint? Visit Yahoo! For Good
http://uk.promotions.yahoo.com/forgood/environment.html
_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug