dap, se face tunnel intre cele 2 subnet-uri (19.2.0.0/16 al linuxului si
66.6.0.0/16 al cisco-ului), nu transport, asta e conn-ul:
1. ----linux-------
conn ipsec01-cisco6500
type=tunnel
left=19.1.255.254
leftsubnet=19.2.0.0/16
leftfirewall=yes //asta a fost adaugat, insa
rezultatul e la fel cu sau fara linia asta
right=19.1.255.253
rightsubnet=66.6.0.0/16
auto=add
authby=secret
auth=esp
compress=no
pfs=yes
esp=3des-md5-modp1024
ike=3des-md5-modp1024
keyexchange=ikev1
mobike=no
cvintila-ipsec01:/etc# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use
Iface
10.205.16.0 0.0.0.0 255.255.255.0 U 0 0 0
eth0
66.6.0.0 19.1.255.253 255.255.0.0 UG 0 0 0
eth1
19.1.0.0 0.0.0.0 255.255.0.0 U 0 0 0
eth1
19.2.0.0 0.0.0.0 255.255.0.0 U 0 0 0
eth4
0.0.0.0 10.205.16.1 0.0.0.0 UG 0 0 0
eth0
am allow all in iptables
si
net.ipv4.ip_forward=1
in sysctl.conf
--------------
Iptables -nL -t nat zice ceva ?
--------------
>
> access-list 100 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
> -- aici e in access-list 100 permit ip 66.6.0.0 0.0.255.255 19.2.0.0
> 0.0.255.255 -- aici e out
>
2. ----cisco-------
asa sunt si la mine pe cisco:
6500#sh access-lists
Extended IP access list 100
10 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
20 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255 (23 matches)
deasemenea
6500#sh crypto map
Crypto Map "IL" 20 ipsec-isakmp
Peer = 19.1.255.254
Extended IP access list 100
access-list 100 permit ip 19.2.0.0 0.0.255.255 66.6.0.0
0.0.255.255
access-list 100 permit ip 66.6.0.0 0.0.255.255 19.2.0.0
0.0.255.255
Current peer: 19.1.255.254
Security association lifetime: 4608000 kilobytes/3600 seconds
PFS (Y/N): Y
DH group: group2
Transform sets={
IL,
}
Interfaces using crypto map IL:
GigabitEthernet4/27
6500#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS
level-2
ia - IS-IS inter area, * - candidate default, U - per-user static
route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
19.0.0.0/16 is subnetted, 2 subnets
S 19.2.0.0 [1/0] via 19.1.255.254
C 19.1.0.0 is directly connected, GigabitEthernet4/27
C 21.0.0.0/8 is directly connected, GigabitEthernet4/11.1
C 20.0.0.0/8 is directly connected, GigabitEthernet4/10.1
66.0.0.0/16 is subnetted, 1 subnets
C 66.6.0.0 is directly connected, GigabitEthernet4/28
am activat debugging verbose pe ipsec
#debug crypto verbose
3.------subnet-uri------
a) o masina in spatele linuxului, cu IP 19.2.0.1/16 care are ca default
gateway masina de linux (interfata interna este 19.2.0.254)
b) o masina in spatele cisco-ului, cu IP 66.6.0.10/16 care are ca
default gateway masina cisco (interfata interna este 66.6.0.1)
4.----scenarii incercate----
a) ping de pe linux catre cisco-interfata-externa 19.1.255.253 =>
succes, fara ipsec
b) ping de la linux catre cisco-interfata-interna 66.6.0.1 => succes,
fara ipsec
c) ping de la cisco catre linux-interfata-externa 19.1.255.254 =>
succes, fara ipsec
d) ping de la cisco catre linux-interfata-interna 19.2.0.254 => succes,
fara ipsec
e) ping de la masina 19.2.0.1 catre cisco-interfata-externa 19.1.255.253
=> succes, fara ipsec
f) ping de la masina 19.2.0.1 catre cisco-interfata-interna 66.6.0.1 =>
niciun raspuns, logul de crypto de pe cisco nu arata nicio negociere !
g) ping de la masina 19.2.0.1 catre masina 66.6.0.10 => niciun raspuns,
logul de crypto de pe cisco nu arata nicio negociere !
h) ping de la masina 66.6.0.10 catre linux-interfata-externa
19.1.255.254 => succes, fara ipsec
i) ping de la masina 66.6.0.10 catre linux-interfata-interna 19.2.0.254
=> succes, fara ipsec !
j) ping de la masina 66.6.0.10 catre masina 19.2.0.1 => niciun raspuns,
logul de crypto de pe cisco nu arata nicio negociere !
In cazurile in care nu am niciun raspuns la ping (f, g, j) observ ca se
incrementeaza nr. de 'matches' din access-list 100
(
6500#sh access-lists
Extended IP access list 100
10 permit ip 19.2.0.0 0.0.255.255 66.6.0.0 0.0.255.255
20 permit ip 66.6.0.0 0.0.255.255 19.2.0.0 0.0.255.255 (23 matches)
)
---------------------
Toate scenariile pe care le ai exceptie cele care nu rapsund la ping nu
se aplica la ce vrei sa faci
Access-listul iti spune ca numai din 66.6. catre 19.2. si in reverse sa
incerce sa faca ipsec.
Ce e ciudat este faptul ca numai 66.6 incearca sa trimita traffic si nu
si 19.2 - la g in mod sigur trebuia
Sa vada ceva in prima line de access-list si sa incrementeze matches.
--------------------------
---------------------------
insa nu are loc nicio negociere
Deasemenea, daca
- access-list-ul 100 nu este definit pe subnet-uri, ci are numai permit
ip any any si
- dau ping de pe cisco pe linux
logurile de pe cisco incep sa arate negociere (logul este cel atasat in
mailul anterior): se realizeaza Phase1, dar nu si Phase 2 (
7w3d: ISAKMP:(0:1:SW:1):deleting SA reason "recevied fatal
informational" state (I) QM_IDLE (peer 19.1.255.254) input queue
0
7w3d: ISAKMP:(0:1:SW:1):deleting node -2036547555 error FALSE reason
"informational (in) state 1"
7w3d: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
7w3d: ISAKMP:(0:1:SW:1):Old State = IKE_P1_COMPLETE New State =
IKE_P1_COMPLETE
)
Incearca sa dai un clear pe ipsec
clear crypto isakmp
clear crypto sa
-------------------
Sper sa fie utile info astea si sa ma puteti ajuta.
Mersi frumos,
Cristina
---------------------
Ce version de IOS ai pe supervisor ?
Inteleg ca switchul merge cu ipsec cu alti peers ?
--------------------
> Daca ai alte access-list pe interfate trebuie sa ii dai access intre
> cele doua capete de tunnel 19.1.255.254 19.1.255.253 Sa communice de
> genul permit ip 19.1.255.254 19.1.255.253 . Daca vrei sa fii mai
> specifica ca exemplu
>
> access-list 110 permit udp any host IPSec headend device eq 500
> access-list 110 permit udp any host IPSec headend device eq 4500
> access-list 110 permit 50 any host IPSec headend device access-list
> 110 permit 51 any host IPSec headend device access-list 110 deny ip
> any host IPSec headend device
>
>
> Depinde de ce rute ai prin retea poate e necesar sa le spui celor doua
> capete cum sa ajunga unul la altul pentru reteau pe Care o protejezi
>
> Ca exemplu
>
> Router(config)# ip route 19.2.0.0 255.255.0.0 19.1.255.254
>
> In cisco pe crypto map IL 10 pune 'set pfs group2' - asta se aplica
> numai pentru peerul 19.1.255.254 daca ai alte tunele nu au acelasi
> Settings.
>
>
> Daca faci tunnel intre cele doua capete in mod normal poti sa dai un
> ping din reteau 19.2.0.0/16 pe 66.6.0.0/16 dar nu inseamna Ca daca
> faci ping de pe linux gateway pe cisco automat o sa ai ipsec creat
> (traficul a fost definit in access-list 100 !) Daca e in mod Transport
> poti sa faci ipsec numai intre cele doua capete - linux-cisco
> (access-list trebuie sa fie diferita)
>
> Silviu
>
> Ps: uite un exemplu de ipsec facut intre doua IOS e destul de
> explicatoriu http://www.vpnc.org/InteropProfiles/cisco-ios.txt
_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug
___________________________________________________________
Want ideas for reducing your carbon footprint? Visit Yahoo! For Good
http://uk.promotions.yahoo.com/forgood/environment.html
_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug
_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug