dap, se face tunnel intre cele 2 subnet-uri (19.2.0.0/16 al linuxului si
66.6.0.0/16 al cisco-ului), nu transport, asta e conn-ul:

1. ----linux-------
conn ipsec01-cisco6500
        type=tunnel
        left=19.1.255.254
        leftsubnet=19.2.0.0/16
        leftfirewall=yes                 //asta a fost adaugat, insa
rezultatul e la fel cu sau fara linia asta
        right=19.1.255.253
        rightsubnet=66.6.0.0/16
        auto=add
        authby=secret
        auth=esp
        compress=no
        pfs=yes
        esp=3des-md5-modp1024
        ike=3des-md5-modp1024
        keyexchange=ikev1
        mobike=no


cvintila-ipsec01:/etc# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use
Iface
10.205.16.0     0.0.0.0         255.255.255.0   U     0      0        0
eth0
66.6.0.0        19.1.255.253    255.255.0.0     UG    0      0        0
eth1
19.1.0.0        0.0.0.0         255.255.0.0     U     0      0        0
eth1
19.2.0.0        0.0.0.0         255.255.0.0     U     0      0        0
eth4
0.0.0.0         10.205.16.1     0.0.0.0         UG    0      0        0
eth0


am allow all in iptables

si

net.ipv4.ip_forward=1
in sysctl.conf


--------------

Iptables -nL -t nat   zice ceva ?

--------------


> 
> access-list 100 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255  
> -- aici e in access-list 100 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 
> 0.0.255.255  -- aici e out
> 

2. ----cisco-------
asa sunt si la mine pe cisco:

6500#sh access-lists
Extended IP access list 100
    10 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
    20 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255 (23 matches)


deasemenea

6500#sh crypto map
Crypto Map "IL" 20 ipsec-isakmp
        Peer = 19.1.255.254
        Extended IP access list 100
            access-list 100 permit ip 19.2.0.0 0.0.255.255 66.6.0.0
0.0.255.255
            access-list 100 permit ip 66.6.0.0 0.0.255.255 19.2.0.0
0.0.255.255
        Current peer: 19.1.255.254
        Security association lifetime: 4608000 kilobytes/3600 seconds
        PFS (Y/N): Y
        DH group:  group2
        Transform sets={
                IL,
        }
        Interfaces using crypto map IL:
                GigabitEthernet4/27

6500#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS
level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static
route
       o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

     19.0.0.0/16 is subnetted, 2 subnets
S       19.2.0.0 [1/0] via 19.1.255.254
C       19.1.0.0 is directly connected, GigabitEthernet4/27
C    21.0.0.0/8 is directly connected, GigabitEthernet4/11.1
C    20.0.0.0/8 is directly connected, GigabitEthernet4/10.1
     66.0.0.0/16 is subnetted, 1 subnets
C       66.6.0.0 is directly connected, GigabitEthernet4/28


am activat debugging verbose pe ipsec

#debug crypto verbose


3.------subnet-uri------

a) o masina in spatele linuxului, cu IP 19.2.0.1/16 care are ca default
gateway masina de linux (interfata interna este 19.2.0.254)
b) o masina in spatele cisco-ului, cu IP 66.6.0.10/16 care are ca
default gateway masina cisco (interfata interna este 66.6.0.1) 


4.----scenarii incercate----
a) ping de pe linux catre cisco-interfata-externa 19.1.255.253 =>
succes, fara ipsec
b) ping de la linux catre cisco-interfata-interna 66.6.0.1 => succes,
fara ipsec
c) ping de la cisco catre linux-interfata-externa 19.1.255.254 =>
succes, fara ipsec
d) ping de la cisco catre linux-interfata-interna 19.2.0.254 => succes,
fara ipsec
e) ping de la masina 19.2.0.1 catre cisco-interfata-externa 19.1.255.253
=> succes, fara ipsec
f) ping de la masina 19.2.0.1 catre cisco-interfata-interna 66.6.0.1 =>
niciun raspuns, logul de crypto de pe cisco nu arata nicio negociere !
g) ping de la masina 19.2.0.1 catre masina 66.6.0.10 => niciun raspuns,
logul de crypto de pe cisco nu arata nicio negociere !
h) ping de la masina 66.6.0.10 catre linux-interfata-externa
19.1.255.254 => succes, fara ipsec
i) ping de la masina 66.6.0.10 catre linux-interfata-interna 19.2.0.254
=> succes, fara ipsec !
j) ping de la masina 66.6.0.10 catre masina 19.2.0.1 => niciun raspuns,
logul de crypto de pe cisco nu arata nicio negociere !


In cazurile in care nu am niciun raspuns la ping (f, g, j) observ ca se
incrementeaza nr. de 'matches' din access-list 100

(
6500#sh access-lists
Extended IP access list 100
    10 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
    20 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255 (23 matches)
)


---------------------

Toate scenariile pe care le ai exceptie cele care nu rapsund la ping nu
se aplica la ce vrei sa faci 
Access-listul iti spune ca numai din 66.6. catre 19.2. si in reverse sa
incerce sa faca ipsec.
Ce e ciudat este faptul ca numai 66.6 incearca sa trimita traffic si nu
si 19.2 - la g in mod sigur trebuia 
Sa vada ceva in prima line de access-list si sa incrementeze matches.

--------------------------


---------------------------

insa nu are loc nicio negociere


Deasemenea, daca
- access-list-ul 100 nu este definit pe subnet-uri, ci are numai permit
ip any any si
- dau ping de pe cisco pe linux

logurile de pe cisco incep sa arate negociere (logul este cel atasat in
mailul anterior): se realizeaza Phase1, dar nu si Phase 2 (
7w3d: ISAKMP:(0:1:SW:1):deleting SA reason "recevied fatal
informational" state (I) QM_IDLE      (peer 19.1.255.254) input queue
0
7w3d: ISAKMP:(0:1:SW:1):deleting node -2036547555 error FALSE reason
"informational (in) state 1"
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_P1_COMPLETE  New State =
IKE_P1_COMPLETE

)




Incearca sa dai un clear pe ipsec

clear crypto isakmp
clear crypto sa

-------------------

Sper sa fie utile info astea si sa ma puteti ajuta.


Mersi frumos,
Cristina

---------------------

Ce version de IOS ai pe supervisor ?

Inteleg ca switchul merge cu ipsec cu alti peers ?

--------------------


> Daca ai alte access-list pe interfate trebuie sa ii dai access intre 
> cele doua capete de tunnel 19.1.255.254 19.1.255.253 Sa communice de 
> genul permit ip 19.1.255.254 19.1.255.253 . Daca vrei sa fii mai 
> specifica ca exemplu
> 
> access-list 110 permit udp any host IPSec headend device eq 500 
> access-list 110 permit udp any host IPSec headend device eq 4500 
> access-list 110 permit 50 any host IPSec headend device access-list 
> 110 permit 51 any host IPSec headend device access-list 110 deny  ip 
> any host IPSec headend device
> 
> 
> Depinde de ce rute ai prin retea poate e necesar sa le spui celor doua

> capete cum sa ajunga unul la altul pentru reteau pe Care o protejezi
> 
> Ca exemplu
> 
> Router(config)# ip route 19.2.0.0 255.255.0.0 19.1.255.254
> 
> In cisco pe crypto map IL 10 pune 'set pfs group2'  - asta se aplica 
> numai pentru peerul 19.1.255.254 daca ai alte tunele nu au acelasi 
> Settings.
> 
> 
> Daca faci tunnel intre cele doua capete in mod normal poti sa dai un 
> ping din reteau 19.2.0.0/16 pe 66.6.0.0/16 dar nu inseamna Ca daca 
> faci ping de pe linux gateway pe cisco automat o sa ai ipsec creat 
> (traficul a fost definit in access-list 100 !) Daca e in mod Transport

> poti sa faci ipsec numai intre cele doua capete - linux-cisco 
> (access-list trebuie sa fie diferita)
> 
> Silviu
> 
> Ps: uite un exemplu de ipsec facut intre doua IOS e destul de 
> explicatoriu http://www.vpnc.org/InteropProfiles/cisco-ios.txt

_______________________________________________
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug





      ___________________________________________________________
Want ideas for reducing your carbon footprint? Visit Yahoo! For Good
http://uk.promotions.yahoo.com/forgood/environment.html
_______________________________________________
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug

_______________________________________________
RLUG mailing list
RLUG@lists.lug.ro
http://lists.lug.ro/mailman/listinfo/rlug

Raspunde prin e-mail lui