statum
Dies interiit. Capulus bibo. Discipulus nexum VPN inter duo puncta statuit et evanuit. Perspicio: vere cuniculum est, sed in cuniculo nullum est commercium. Discipulus vocat non respondet.
lebetem posui et in portam S-Terrae intendere fermentum. Experientiam meam ac methodum communico.
initial notitia
GRE cuniculo interiectae duae sites geographicae connexae sunt. GRE encrypted debet;
GRE cuniculi functionem reprehendo. Ad hoc faciendum curro ping a fabrica R1 ad GRE instrumenti R2. Hoc est scopum negotiationis encryption. Nihil respondes:
root@R1:~# ping 1.1.1.2 -c 4
PING 1.1.1.2 (1.1.1.2) 56(84) bytes of data.
--- 1.1.1.2 ping statistics ---
4 packets transmitted, 0 received, 100% packet loss, time 3057ms
Tigna in Gate1 et Gate2 aspicio. Stipes feliciter tradit ipsum cuniculum feliciter emissum esse, nullas difficultates:
root@Gate1:~# cat /var/log/cspvpngate.log
Aug 5 16:14:23 localhost vpnsvc: 00100119 <4:1> IPSec connection 5 established, traffic selector 172.17.0.1->172.16.0.1, proto 47, peer 10.10.10.251, id "10.10.10.251", Filter
IPsec:Protect:CMAP:1:LIST, IPsecAction IPsecAction:CMAP:1, IKERule IKERule:CMAP:1
In statisticis cuniculi IPsec in Gate1 video revera esse cuniculum, sed Rсvd calculi ad nihilum repositum;
root@Gate1:~# sa_mgr show
ISAKMP sessions: 0 initiated, 0 responded
ISAKMP connections:
Num Conn-id (Local Addr,Port)-(Remote Addr,Port) State Sent Rcvd
1 3 (10.10.10.251,500)-(10.10.10.252,500) active 1070 1014
IPsec connections:
Num Conn-id (Local Addr,Port)-(Remote Addr,Port) Protocol Action Type Sent Rcvd
1 3 (172.16.0.1,*)-(172.17.0.1,*) 47 ESP tunn 480 0
S-Terra hoc sic laboro: exspecto enim ubi scopos facis in itinere ab R1 ad R2. In processu (praedo) errorem invenio.
Troubleshooting
Gradus 1. Quid Gate1 accipit R1
constructo-in schoeno utar — tcpdump. Sufferum in interna colligo (Gi0/1 in Cisco-ut notatio seu eth1 in Debian OS notatio) interface:
root@Gate1:~# tcpdump -i eth1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
14:53:38.879525 IP 172.16.0.1 > 172.17.0.1: GREv0, key=0x1, length 92: IP 1.1.1.1 > 1.1.1.2: ICMP echo request, id 2083, seq 1, length 64
14:53:39.896869 IP 172.16.0.1 > 172.17.0.1: GREv0, key=0x1, length 92: IP 1.1.1.1 > 1.1.1.2: ICMP echo request, id 2083, seq 2, length 64
14:53:40.921121 IP 172.16.0.1 > 172.17.0.1: GREv0, key=0x1, length 92: IP 1.1.1.1 > 1.1.1.2: ICMP echo request, id 2083, seq 3, length 64
14:53:41.944958 IP 172.16.0.1 > 172.17.0.1: GREv0, key=0x1, length 92: IP 1.1.1.1 > 1.1.1.2: ICMP echo request, id 2083, seq 4, length 64
GRE video fasciculos a R1 accepisse. Im iero.
Gradus 2. Quod Gate1 facit cum GRE facis?
Utens utilitate klogview videre possum quid agatur cum GRE facis intra S-Terra VPN agitator:
root@Gate1:~# klogview -f 0xffffffff
filtration result for out packet 172.16.0.1->172.17.0.1, proto 47, len 112, if eth0: chain 4 "IPsecPolicy:CMAP", filter 8, event id IPsec:Protect:CMAP:1:LIST, status PASS
encapsulating with SA 31: 172.16.0.1->172.17.0.1, proto 47, len 112, if eth0
passed out packet 10.10.10.251->10.10.10.252, proto 50, len 160, if eth0: encapsulated
Video scopum GRE mercaturae (proto 47) 172.16.0.1 -> 172.17.0.1 sub regulae encryptionis in CMAP crypto tabulae venisse et encapsulare. Deinceps fasciculus fusus est (passed out). Nulla responsio mercaturae in output klogview est.
Accessum tabulae in Gate1 fabrica reprehendo. Unum album accessum video LISTULA, quae scopo negotiationis encryptionis definit, quod significat regulas firewall non figuratas esse;
Gate1#show access-lists
Extended IP access list LIST
10 permit gre host 172.16.0.1 host 172.17.0.1
Conclusio: quaestio non cum Gate1 fabrica.
More about klogview
Coegi VPN omnia retiacula tractat, non solum negotiatio quae encrypto debet. Hae sunt epistulae in klogview conspicuae si VPN coegi processit ad mercaturam retis et illud unencrypted transmisit:
root@R1:~# ping 172.17.0.1 -c 4
root@Gate1:~# klogview -f 0xffffffff
filtration result for out packet 172.16.0.1->172.17.0.1, proto 1, len 84, if eth0: chain 4 "IPsecPolicy:CMAP": no match
passed out packet 172.16.0.1->172.17.0.1, proto 1, len 84, if eth0: filtered
Video ICMP mercaturam (proto 1) 172.16.0.1-> 172.17.0.1 in regulas encryptionis CMAP crypto card. Fasciculus fusus est in textu perspicuo.
Gradus 3. Quid Gate2 accipit a Gate1
Gate0 interface in luridum immitto (eth2)
root@Gate2:~# tcpdump -i eth0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
16:05:45.104195 IP 10.10.10.251 > 10.10.10.252: ESP(spi=0x30088112,seq=0x1), length 140
16:05:46.093918 IP 10.10.10.251 > 10.10.10.252: ESP(spi=0x30088112,seq=0x2), length 140
16:05:47.117078 IP 10.10.10.251 > 10.10.10.252: ESP(spi=0x30088112,seq=0x3), length 140
16:05:48.141785 IP 10.10.10.251 > 10.10.10.252: ESP(spi=0x30088112,seq=0x4), length 140
Gate2 video quod fasciculus ESP a Gate1 accipit.
Gradus 4. Quod Gate2 facit cum ESP packages
Klogview utilitatem in Gate2 immitto:
root@Gate2:~# klogview -f 0xffffffff
filtration result for in packet 10.10.10.251->10.10.10.252, proto 50, len 160, if eth0: chain 17 "FilterChain:L3VPN", filter 21, status DROP
dropped in packet 10.10.10.251->10.10.10.252, proto 50, len 160, if eth0: firewall
Video fasciculos ESP (proto 50) a regula firewall (L3VPN) esse delapsas. Pro certo habeo Gi0/0 re vera habere album accessum L3VPN ei annexum;
Gate2#show ip interface gi0/0
GigabitEthernet0/0 is up, line protocol is up
Internet address is 10.10.10.252/24
MTU is 1500 bytes
Outgoing access list is not set
Inbound access list is L3VPN
Inventore consequat.
Gradus 5. Quid mali accessum album
Aspicio quid sit index accessus L3VPN:
Gate2#show access-list L3VPN
Extended IP access list L3VPN
10 permit udp host 10.10.10.251 any eq isakmp
20 permit udp host 10.10.10.251 any eq non500-isakmp
30 permit icmp host 10.10.10.251 any
Video ISAKMP facis licere, ergo IPsec cuniculus constat. Sed nulla potest esse regula pro ESP. Videtur, discipulus confusa icmp et csp.
Accessum album emendo:
Gate2(config)#
ip access-list extended L3VPN
no 30
30 permit esp host 10.10.10.251 any
Gradus 6. Reprehendo functionality
Imprimis, fac ut index accessus L3VPN recte sit;
Gate2#show access-list L3VPN
Extended IP access list L3VPN
10 permit udp host 10.10.10.251 any eq isakmp
20 permit udp host 10.10.10.251 any eq non500-isakmp
30 permit esp host 10.10.10.251 any
Nunc deducunt scopum negotiationis ex fabrica R1:
root@R1:~# ping 1.1.1.2 -c 4
PING 1.1.1.2 (1.1.1.2) 56(84) bytes of data.
64 bytes from 1.1.1.2: icmp_seq=1 ttl=64 time=35.3 ms
64 bytes from 1.1.1.2: icmp_seq=2 ttl=64 time=3.01 ms
64 bytes from 1.1.1.2: icmp_seq=3 ttl=64 time=2.65 ms
64 bytes from 1.1.1.2: icmp_seq=4 ttl=64 time=2.87 ms
--- 1.1.1.2 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3006ms
rtt min/avg/max/mdev = 2.650/10.970/35.338/14.069 ms
Victoriam. GRE cuniculum conditum est. Ineuntes traffic counter in IPsec statistica non nulla est:
root@Gate1:~# sa_mgr show
ISAKMP sessions: 0 initiated, 0 responded
ISAKMP connections:
Num Conn-id (Local Addr,Port)-(Remote Addr,Port) State Sent Rcvd
1 3 (10.10.10.251,500)-(10.10.10.252,500) active 1474 1350
IPsec connections:
Num Conn-id (Local Addr,Port)-(Remote Addr,Port) Protocol Action Type Sent Rcvd
1 4 (172.16.0.1,*)-(172.17.0.1,*) 47 ESP tunn 1920 480
In porta porta, in output klogview, nuntii apparuerunt scopo negotiationis 2->172.16.0.1, feliciter decrypta (TRANS) per regulam LIST in crypto CMAP;
root@Gate2:~# klogview -f 0xffffffff
filtration result for in packet 172.16.0.1->172.17.0.1, proto 47, len 112, if eth0: chain 18 "IPsecPolicy:CMAP", filter 25, event id IPsec:Protect:CMAP:1:LIST, status PASS
passed in packet 172.16.0.1->172.17.0.1, proto 47, len 112, if eth0: decapsulated
results
Discipulus diem suum perdidit.
Cave apud ME praecepta.
Anonymous Engineer
t.me/anonymous_engineer
Source: www.habr.com