On 06/30/2011 09:41 AM, [email protected] wrote:
Hello Kevin,
...
I don't know if you can help with this or not, but I've set up a Debug
flow filter on the ISG1000 to see the sessions going through the
ISG1000. The xx.yy.5.46 is the address I gave to the Laptop and the
aa.bbb.63.5 is the server I'm trying to reach. I can see the connexion
being received from the VPN tunne 434 which is the right tunnel for this
connexion, it finds the correct route to the server and forwards it to
the right interface but the return is, I think, where the problem is, it
finds an existing session for the connexion which is the right one, then
I see the following: going into tunnel 4000021f. I don't know why it
won't go into the tunnel 434 or if 4000021f refers to tunnel 434.
If it refers to the tunnel 434 then I'm lost, as I get no response on
the laptop. I've compared this debug with an other one that have a
similar setup, in the other scenario, it refers to the tunnel number and
not to a weird tunnel ID like the one in this example.
pak from tunnel 0x4000021f
pak from tunnel, tunnel=4000021f
**st: <VPN|tunnel.434|Root|0>
4d9c144:
2b19:xx.yy.5.46/600->aa.bbb.63.5/300,1,60
****** 17928694.0: <VPN/tunnel.434>
packet received [60]******
ipid = 11033(2b19), @04d9c144
packet passed sanity check.
flow_decap_vector IPv4 process
packet decapsulated, type=ipsec, len=60
ipid = 11033(2b19), @04d9c144
tunnel.434:xx.yy.5.46/768->aa.bbb.63.5/1536,1(8/0)<Root>
no session found
flow_first_sanity_check: in
<tunnel.434>, out <N/A>
chose interface tunnel.434 as
incoming nat if.
flow_first_routing: in <tunnel.434>,
out <N/A>
search route to (tunnel.434,
xx.yy.5.46->aa.bbb.63.5) in vr
trust-vr for vsd-0/flag-0/ifp-null
[ Dest] 8.route
aa.bbb.63.5->10.120.132.1, to
ethernet1/1
routed (x_dst_ip aa.bbb.63.5) from
tunnel.434 (tunnel.434 in 0) to
ethernet1/1
policy search from zone 1000-> zone 2
policy_flow_search policy search
nat_crt from zone 1000-> zone 2
RPC Mapping Table search returned 0
matched service(s) for (vsys Root,
ip aa.bbb.63.5, port 17500, proto 1)
No SW RPC rule match, search HW rule
swrs_search_ip: policy matched
id/idx/action = 63/110/0x9
Permitted by policy 63
No src xlate choose interface
ethernet1/1 as outgoing phy if
check nsrp pak fwd:
in_tun=0x4000021f, VSD 0 for out ifp
ethernet1/1
no loop on ifp ethernet1/1.
session application type 0, name
None, nas_id 0, timeout 60sec
service lookup identified service 0.
flow_first_final_check: in
<tunnel.434>, out <ethernet1/1>
SM_RULE:0
existing vector list 25-231c4004.
Session (id:520851) created for
first pak 25
flow_first_install_session======>
route to 10.120.132.1
arp entry found for 10.120.132.1
ifp2 ethernet1/1, out_ifp
ethernet1/1, flag 00800800, tunnel
ffffffff, rc 1
outgoing wing prepared, ready
handle tunnel reverse route
search route to (ethernet1/1,
aa.bbb.63.5->xx.yy.5.46) in vr
trust-vr for
vsd-0/flag-3000/ifp-tunnel.434
[ Dest] 513.route
xx.yy.5.46->xx.yy.5.46, to tunnel.434
route to xx.yy.5.46
going into tunnel.
ifp2 tunnel.434, out_ifp tunnel.434,
flag 00002801, tunnel 4000021f, rc 1
flow got session.
flow session id 520851
flow_main_body_vector in ifp
tunnel.434 out ifp ethernet1/1
flow vector index 0x25, vector addr
0x231c4004, orig vector 0x231c4004
vsd 0 is active
post addr xlation:
xx.yy.5.46->aa.bbb.63.5.
skipping pre-frag
no more encapping needed
packet send out to 0015f97bde46
through ethernet1/1
**st: <Trust|ethernet1/1|Root|0>
4c304c0:
6018:aa.bbb.63.5/600->xx.yy.5.46/300,1,60
****** 17928694.0:
<Trust/ethernet1/1> packet received
[60]******
ipid = 24600(6018), @04c304c0
packet passed sanity check.
flow_decap_vector IPv4 process
ethernet1/1:aa.bbb.63.5/1536->xx.yy.5.46/768,1(0/0)<Root>
existing session found. sess token 3
flow got session.
flow session id 520851
flow_main_body_vector in ifp
ethernet1/1 out ifp N/A
flow vector index 0x25, vector addr
0x231c4004, orig vector 0x231c4004
vsd 0 is active
post addr xlation:
aa.bbb.63.5->xx.yy.5.46.
skipping pre-frag
going into tunnel 4000021f.
flow_encrypt: enc vector=c077d4.
Hi Marie,
I apologize for my late response, I've been travelling the last month or so.
First off, tunnel 4000021f does seem to match up with tunnel.434 as this
line from the inbound packet suggests:
> ifp2 tunnel.434, out_ifp tunnel.434, flag 00002801, tunnel 4000021f, rc 1
However, once the packet goes into the tunnel, then I think the
addressing changes. The address that you were filtering on (xx.yy.5.46)
is the VPN client address ("inside" address), but once the packet goes
into the tunnel, the packet is then addressed to the host laptop
(Internet address). So you might also need to do flow filters on the
"outside" address to see if perhaps the Juniper is having problems
sending/routing to those addresses.
_______________________________________________
vpn-help mailing list
[email protected]
http://lists.shrew.net/mailman/listinfo/vpn-help