VPN IPSEC non si alza, nemmeno col viagra :P
Inviato: gio 28 mag , 2009 10:30 am
Buongiorno
ho due sedi e vorrei fare un tunnel GRE+IPSEC (gre perchè non ho mai risolto problemi di frammentazione pacchetti).
Sede 1:
C1721 32F/128D 12.4(23) ADVSECK9
connettività RFC1483 1 punto punto 1.1.1.1
range /29. 1.1.1.1.232/29
LAN: 192.168.1.x
atm0.1 1.1.1.1
fast0: 192.168.1.254
loop0: 1.1.1.238/32
Sede 2:
C2611 16F/64D 12.3(25) completo
connettività RFC1483 con 1 ip assegnato al router
LAN: 192.168.2.x
atm0/0.1 ip punto punto 2.2.2.2
eth0/0: 192.168.2.254
Riesco a stabilire tranquillamente il tunnel gre tra i due router, e già riesco quindi a collegare le due lan. Il problema è che isakmp non funziona e in pratica non sale il tunnel GRE.
Ora di seguito le configurazioni:
ROUTER1 C1721
{SNIP}
crypto isakmp policy 1
encr 3des
authentication pre-share
group 5
crypto isakmp key xxxxx address IPROUTER2
crypto isakmp keepalive 10 3
!
!
crypto ipsec transform-set VPN-3DES esp-3des esp-sha-hmac
!
crypto map VPN local-address Loopback0
crypto map VPN 1 ipsec-isakmp
set peer IPROUTER2
set transform-set VPN-3DES
set pfs group5
match address 103
!
!
!
interface Loopback0
description hostname xxxx
ip address IP DEL RANGE /29 ASSEGNATOMI 255.255.255.255
no ip redirects
no ip proxy-arp
ip mtu 1500
!
interface Tunnel1
ip address 10.0.0.1 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
keepalive 10 3
tunnel source Loopback0
tunnel destination IP ROUTER2
tunnel checksum
tunnel path-mtu-discovery
!
interface Null0
no ip unreachables
!
interface ATM0
description SHDSL
no ip address
no ip redirects
no ip proxy-arp
atm ilmi-keepalive
!
interface ATM0.1 point-to-point
description Point to Point Uplink
bandwidth 3584
ip address IP PUNTO PUNTO
no ip redirects
no ip proxy-arp
ip mtu 1500
ip inspect OUT-IN in
ip inspect IN-OUT out
ip nat outside
ip virtual-reassembly max-reassemblies 256
crypto map VPN
pvc 8/35
protocol ip 77.93.236.161
encapsulation aal5snap
!
!
interface Ethernet0
description To LAN
ip address 192.168.1.251 255.255.255.0
no ip redirects
no ip proxy-arp
ip inspect IN-OUT-LAN in
ip nat inside
ip virtual-reassembly
no ip mroute-cache
full-duplex
no cdp enable
standby use-bia
standby delay minimum 20 reload 20
standby 20 ip 192.168.1.254
standby 20 preempt delay minimum 20 reload 20 sync 10
standby 20 name lan-gw
standby 20 track 1
standby 20 track ATM0
!
interface FastEthernet0
description To DMZ
ip address 172.16.0.27 255.255.255.224
no ip redirects
no ip proxy-arp
ip inspect IN-OUT-DMZ in
ip nat inside
ip virtual-reassembly
no ip mroute-cache
speed auto
no cdp enable
standby delay minimum 20 reload 20
standby 10 ip 172.16.0.30
standby 10 preempt delay minimum 20 reload 20 sync 10
standby 10 name border-routers
standby 10 track 1
standby 10 track ATM0
!
interface Virtual-Template1
ip unnumbered FastEthernet0
ip nat inside
ip virtual-reassembly
peer default ip address pool VPN-IN
ppp encrypt mppe auto required
ppp authentication ms-chap-v2
!
ip local pool VPN-IN 10.0.0.1 10.0.0.5
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 ATM0.1
ip route 192.168.2.0 255.255.255.0 10.0.0.2
!
no ip http server
no ip http secure-server
ip nat translation timeout 3600
ip nat translation tcp-timeout 1200
ip nat translation udp-timeout 100
ip nat translation finrst-timeout 15
ip nat translation syn-timeout 45
ip nat translation icmp-timeout 120
ip nat inside source list 102 interface Loopback0 overload
ip dns server
!
!
no logging trap
[SNIP}
access-list 102 deny ip 172.16.0.0 0.0.0.31 192.168.2.0 0.0.0.255
access-list 102 deny ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 102 permit ip 172.16.0.0 0.0.0.31 any
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip 10.0.0.0 0.0.0.255 any
access-list 103 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 110 permit icmp 172.16.0.0 0.0.0.31 192.168.1.0 0.0.0.255 echo-reply
access-list 110 permit tcp 172.16.0.0 0.0.0.31 192.168.1.0 0.0.0.255 established
access-list 110 deny ip 172.16.0.0 0.0.0.31 192.168.1.0 0.0.0.255
access-list 110 permit ip 172.16.0.0 0.0.0.31 any
ROUTER 2 C2611
[SNIP]
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 5
crypto isakmp key PASSWORD address REMOTE PEER
crypto isakmp keepalive 10 3
!
!
crypto ipsec transform-set VPN-3DES esp-3des esp-sha-hmac
!
crypto map VPN 1 ipsec-isakmp
set peer REMOTEPEER
set transform-set VPN-3DES
set pfs group5
match address 103
!
!
!
!
interface Null0
no ip unreachables
!
interface Tunnel1
ip address 10.0.0.2 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
keepalive 10 3
tunnel source ATM0/0.1
tunnel destination REMOTE PEER
tunnel checksum
tunnel path-mtu-discovery
!
interface ATM0/0
no ip address
no ip redirects
no ip proxy-arp
no ip mroute-cache
atm ilmi-keepalive
dsl operating-mode auto
hold-queue 224 in
!
interface ATM0/0.1 point-to-point
bandwidth 640
ip address IP MIO DEL ROUTER
no ip redirects
no ip proxy-arp
ip mtu 1500
ip nat outside
ip inspect OUT-IN in
no ip mroute-cache
crypto map VPN
pvc 8/35
encapsulation aal5snap
!
!
interface Ethernet0/0
description LAN Interface
ip address 192.168.2.254 255.255.255.0
no ip redirects
no ip proxy-arp
ip nat inside
ip inspect IN-OUT in
no ip mroute-cache
full-duplex
no cdp enable
hold-queue 100 in
hold-queue 100 out
!
interface Ethernet0/1
description Public WAN Subnet /29
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
no ip mroute-cache
shutdown
half-duplex
no cdp enable
hold-queue 100 in
hold-queue 100 out
!
ip nat translation timeout 3600
ip nat translation tcp-timeout 1200
ip nat translation udp-timeout 100
ip nat translation finrst-timeout 15
ip nat translation syn-timeout 45
ip nat translation icmp-timeout 120
ip nat inside source list 102 interface ATM0/0.1 overload
no ip http server
no ip http secure-server
ip classless
ip route 0.0.0.0 0.0.0.0 IP PUNTO PUNTO
ip route 10.0.0.1 255.255.255.255 REMOTE PEER
ip route 192.168.1.0 255.255.255.0 10.0.0.1
!
ip dns server
!
logging history notifications
no logging trap
access-list 102 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 102 permit ip 192.168.2.0 0.0.0.255 any
access-list 103 permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
[SNIP]
!
!
!
banner login ^C
You are connected to $(hostname).$(domain) on line $(line).
If you are not authorized to access this system, disconnect now.
THIS IS FOR AUTHORIZED USE ONLY
Unauthorized or improper use of this system may result in
administrative disciplinary action and civil and criminal penalties.
By continuing to use this system you indicate your awareness of and consent
to these terms and conditions of use. LOG OFF IMMEDIATELY if you do not
agree to the conditions stated in this warning.
Network Administrator: [email protected]
^C
!
line con 0
login local
transport output telnet
stopbits 1
line aux 0
transport preferred none
transport output telnet
stopbits 1
line vty 0 4
login local
transport preferred ssh
transport input ssh
transport output all
flowcontrol software
!
scheduler max-task-time 5000
ntp clock-period 17208800
ntp server 192.43.244.18
ntp server 193.204.114.105
!
end
Mi dite perfavore dove sbaglio e perchè la ipsec non funziona???
ho fatto un sh crypto ipsec sa e anche sh crypto isakmp sa e tutto è 0
ho disattivato le ACL ed è tutto libero
non c'è verso di farlo andare
ho due sedi e vorrei fare un tunnel GRE+IPSEC (gre perchè non ho mai risolto problemi di frammentazione pacchetti).
Sede 1:
C1721 32F/128D 12.4(23) ADVSECK9
connettività RFC1483 1 punto punto 1.1.1.1
range /29. 1.1.1.1.232/29
LAN: 192.168.1.x
atm0.1 1.1.1.1
fast0: 192.168.1.254
loop0: 1.1.1.238/32
Sede 2:
C2611 16F/64D 12.3(25) completo
connettività RFC1483 con 1 ip assegnato al router
LAN: 192.168.2.x
atm0/0.1 ip punto punto 2.2.2.2
eth0/0: 192.168.2.254
Riesco a stabilire tranquillamente il tunnel gre tra i due router, e già riesco quindi a collegare le due lan. Il problema è che isakmp non funziona e in pratica non sale il tunnel GRE.
Ora di seguito le configurazioni:
ROUTER1 C1721
{SNIP}
crypto isakmp policy 1
encr 3des
authentication pre-share
group 5
crypto isakmp key xxxxx address IPROUTER2
crypto isakmp keepalive 10 3
!
!
crypto ipsec transform-set VPN-3DES esp-3des esp-sha-hmac
!
crypto map VPN local-address Loopback0
crypto map VPN 1 ipsec-isakmp
set peer IPROUTER2
set transform-set VPN-3DES
set pfs group5
match address 103
!
!
!
interface Loopback0
description hostname xxxx
ip address IP DEL RANGE /29 ASSEGNATOMI 255.255.255.255
no ip redirects
no ip proxy-arp
ip mtu 1500
!
interface Tunnel1
ip address 10.0.0.1 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
keepalive 10 3
tunnel source Loopback0
tunnel destination IP ROUTER2
tunnel checksum
tunnel path-mtu-discovery
!
interface Null0
no ip unreachables
!
interface ATM0
description SHDSL
no ip address
no ip redirects
no ip proxy-arp
atm ilmi-keepalive
!
interface ATM0.1 point-to-point
description Point to Point Uplink
bandwidth 3584
ip address IP PUNTO PUNTO
no ip redirects
no ip proxy-arp
ip mtu 1500
ip inspect OUT-IN in
ip inspect IN-OUT out
ip nat outside
ip virtual-reassembly max-reassemblies 256
crypto map VPN
pvc 8/35
protocol ip 77.93.236.161
encapsulation aal5snap
!
!
interface Ethernet0
description To LAN
ip address 192.168.1.251 255.255.255.0
no ip redirects
no ip proxy-arp
ip inspect IN-OUT-LAN in
ip nat inside
ip virtual-reassembly
no ip mroute-cache
full-duplex
no cdp enable
standby use-bia
standby delay minimum 20 reload 20
standby 20 ip 192.168.1.254
standby 20 preempt delay minimum 20 reload 20 sync 10
standby 20 name lan-gw
standby 20 track 1
standby 20 track ATM0
!
interface FastEthernet0
description To DMZ
ip address 172.16.0.27 255.255.255.224
no ip redirects
no ip proxy-arp
ip inspect IN-OUT-DMZ in
ip nat inside
ip virtual-reassembly
no ip mroute-cache
speed auto
no cdp enable
standby delay minimum 20 reload 20
standby 10 ip 172.16.0.30
standby 10 preempt delay minimum 20 reload 20 sync 10
standby 10 name border-routers
standby 10 track 1
standby 10 track ATM0
!
interface Virtual-Template1
ip unnumbered FastEthernet0
ip nat inside
ip virtual-reassembly
peer default ip address pool VPN-IN
ppp encrypt mppe auto required
ppp authentication ms-chap-v2
!
ip local pool VPN-IN 10.0.0.1 10.0.0.5
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 ATM0.1
ip route 192.168.2.0 255.255.255.0 10.0.0.2
!
no ip http server
no ip http secure-server
ip nat translation timeout 3600
ip nat translation tcp-timeout 1200
ip nat translation udp-timeout 100
ip nat translation finrst-timeout 15
ip nat translation syn-timeout 45
ip nat translation icmp-timeout 120
ip nat inside source list 102 interface Loopback0 overload
ip dns server
!
!
no logging trap
[SNIP}
access-list 102 deny ip 172.16.0.0 0.0.0.31 192.168.2.0 0.0.0.255
access-list 102 deny ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 102 permit ip 172.16.0.0 0.0.0.31 any
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip 10.0.0.0 0.0.0.255 any
access-list 103 permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 110 permit icmp 172.16.0.0 0.0.0.31 192.168.1.0 0.0.0.255 echo-reply
access-list 110 permit tcp 172.16.0.0 0.0.0.31 192.168.1.0 0.0.0.255 established
access-list 110 deny ip 172.16.0.0 0.0.0.31 192.168.1.0 0.0.0.255
access-list 110 permit ip 172.16.0.0 0.0.0.31 any
ROUTER 2 C2611
[SNIP]
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 5
crypto isakmp key PASSWORD address REMOTE PEER
crypto isakmp keepalive 10 3
!
!
crypto ipsec transform-set VPN-3DES esp-3des esp-sha-hmac
!
crypto map VPN 1 ipsec-isakmp
set peer REMOTEPEER
set transform-set VPN-3DES
set pfs group5
match address 103
!
!
!
!
interface Null0
no ip unreachables
!
interface Tunnel1
ip address 10.0.0.2 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1360
keepalive 10 3
tunnel source ATM0/0.1
tunnel destination REMOTE PEER
tunnel checksum
tunnel path-mtu-discovery
!
interface ATM0/0
no ip address
no ip redirects
no ip proxy-arp
no ip mroute-cache
atm ilmi-keepalive
dsl operating-mode auto
hold-queue 224 in
!
interface ATM0/0.1 point-to-point
bandwidth 640
ip address IP MIO DEL ROUTER
no ip redirects
no ip proxy-arp
ip mtu 1500
ip nat outside
ip inspect OUT-IN in
no ip mroute-cache
crypto map VPN
pvc 8/35
encapsulation aal5snap
!
!
interface Ethernet0/0
description LAN Interface
ip address 192.168.2.254 255.255.255.0
no ip redirects
no ip proxy-arp
ip nat inside
ip inspect IN-OUT in
no ip mroute-cache
full-duplex
no cdp enable
hold-queue 100 in
hold-queue 100 out
!
interface Ethernet0/1
description Public WAN Subnet /29
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
no ip mroute-cache
shutdown
half-duplex
no cdp enable
hold-queue 100 in
hold-queue 100 out
!
ip nat translation timeout 3600
ip nat translation tcp-timeout 1200
ip nat translation udp-timeout 100
ip nat translation finrst-timeout 15
ip nat translation syn-timeout 45
ip nat translation icmp-timeout 120
ip nat inside source list 102 interface ATM0/0.1 overload
no ip http server
no ip http secure-server
ip classless
ip route 0.0.0.0 0.0.0.0 IP PUNTO PUNTO
ip route 10.0.0.1 255.255.255.255 REMOTE PEER
ip route 192.168.1.0 255.255.255.0 10.0.0.1
!
ip dns server
!
logging history notifications
no logging trap
access-list 102 deny ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 102 permit ip 192.168.2.0 0.0.0.255 any
access-list 103 permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
[SNIP]
!
!
!
banner login ^C
You are connected to $(hostname).$(domain) on line $(line).
If you are not authorized to access this system, disconnect now.
THIS IS FOR AUTHORIZED USE ONLY
Unauthorized or improper use of this system may result in
administrative disciplinary action and civil and criminal penalties.
By continuing to use this system you indicate your awareness of and consent
to these terms and conditions of use. LOG OFF IMMEDIATELY if you do not
agree to the conditions stated in this warning.
Network Administrator: [email protected]
^C
!
line con 0
login local
transport output telnet
stopbits 1
line aux 0
transport preferred none
transport output telnet
stopbits 1
line vty 0 4
login local
transport preferred ssh
transport input ssh
transport output all
flowcontrol software
!
scheduler max-task-time 5000
ntp clock-period 17208800
ntp server 192.43.244.18
ntp server 193.204.114.105
!
end
Mi dite perfavore dove sbaglio e perchè la ipsec non funziona???
ho fatto un sh crypto ipsec sa e anche sh crypto isakmp sa e tutto è 0
ho disattivato le ACL ed è tutto libero
non c'è verso di farlo andare