Ок, про ACL понял - спасибо. А вот что происходит при включенных дебагах ipsec и isakmp, после того как сбрасываем канал командами clear. Значит, ввожу команды - и пошло... до поднятия VPN несколько минут проходит, ниже означенное пишется в терминале:avppix(config)#clear isakmp sa
ISADB: reaper checking SA 0x3b24a2c, conn_id = 0
ISAKMP (0): deleting IPSEC SAs with peer at 217.72.145.186IPSEC(key_engine): got a queue event...
IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
IPSEC(key_engine_delete_sas): delete all SAs shared with 217.72.145.186
map_free_entry: freeing entry 2
CRYPTO(epa_release_conn): released conn 2
VPN Peer: IPSEC: Peer ip:217.72.145.186/500 Decrementing Ref cnt to:2 Total VPN Peers:1map_free_entry: freeing entry 1
CRYPTO(epa_release_conn): released conn 1
VPN Peer: IPSEC: Peer ip:217.72.145.186/500 Decrementing Ref cnt to:1 Total VPN Peers:1
ISAKMP (0): deleting SA: src 217.114.33.79, dst 217.72.145.186
crypto_isakmp_process_block:src:217.72.145.186, dest:217.114.33.79 spt:500 dpt:500
ISAKMP: drop msg for deleted saclear isakmp sa
ISADB: reaper checking SA 0x3b24a2c, conn_id = 0 DELETE IT!
VPN Peer: ISAKMP: Peer ip:217.72.145.186/500 Ref cnt decremented to:0 Total VPN Peers:1
VPN Peer: ISAKMP: Deleted peer: ip:217.72.145.186/500 Total VPN peers:0IPSEC(key_engine): got a queue event...
IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
IPSEC(key_engine_delete_sas): delete all SAs shared with 217.72.clear ipsec sa
avppix(config)#clear ipsec sa
avppix(config)#
ISAKMP (0): beginning Main Mode exchange
ISAKMP (0): retransmitting phase 1 (0)...IPSEC(key_engine): request timer fired: count = 1,
(identity) local= 217.114.33.79, remote= 217.72.145.186,
local_proxy= 172.25.0.0/255.255.0.0/0/0 (type=4),
remote_proxy= 172.30.0.0/255.255.0.0/0/0 (type=4)
ISAKMP (0): retransmitting phase 1 (1)...
ISAKMP (0): deleting SA: src 217.114.33.79, dst 217.72.145.186
ISADB: reaper checking SA 0x3b24a2c, conn_id = 0 DELETE IT!
VPN Peer:ISAKMP: Peer Info for 217.72.145.186/500 not found - peers:0
IPSEC(key_engine): request timer fired: count = 2,
(identity) local= 217.114.33.79, remote= 217.72.145.186,
local_proxy= 172.25.0.0/255.255.0.0/0/0 (type=4),
remote_proxy= 172.30.0.0/255.255.0.0/0/0 (type=4)
ISAKMP (0): beginning Main Mode exchange
crypto_isakmp_process_block:src:217.72.145.186, dest:217.114.33.79 spt:500 dpt:500
OAK_MM exchange
ISAKMP (0): processing SA payload. message ID = 0
ISAKMP (0): Checking ISAKMP transform 1 against priority 20 policy
ISAKMP: encryption 3DES-CBC
ISAKMP: hash SHA
ISAKMP: default group 1
ISAKMP: auth pre-share
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80
ISAKMP (0): atts are acceptable. Next payload is 0
ISAKMP (0): processing vendor id payload
ISAKMP (0): SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
return status is IKMP_NO_ERROR
crypto_isakmp_process_block:src:217.72.145.186, dest:217.114.33.79 spt:500 dpt:500
OAK_MM exchange
ISAKMP (0): processing KE payload. message ID = 0
ISAKMP (0): processing NONCE payload. message ID = 0
ISAKMP (0): processing vendor id payload
ISAKMP (0): processing vendor id payload
ISAKMP (0): received xauth v6 vendor id
ISAKMP (0): processing vendor id payload
ISAKMP (0): speaking to another IOS box!
ISAKMP (0): processing vendor id payload
ISAKMP (0): speaking to a VPN3000 concentrator
ISAKMP (0): ID payload
next-payload : 8
type : 1
protocol : 17
port : 500
length : 8
ISAKMP (0): Total payload length: 12
return status is IKMP_NO_ERROR
crypto_isakmp_process_block:src:217.72.145.186, dest:217.114.33.79 spt:500 dpt:500
OAK_MM exchange
ISAKMP (0): processing ID payload. message ID = 0
ISAKMP (0): processing HASH payload. message ID = 0
ISAKMP (0): processing vendor id payload
ISAKMP (0): remote peer supports dead peer detection
ISAKMP (0): SA has been authenticated
ISAKMP (0): beginning Quick Mode exchange, M-ID of -1709865365:9a15866bIPSEC(key_engine): got a queue event...
IPSEC(spi_response): getting spi 0x8c360355(2352350037) for SA
from 217.72.145.186 to 217.114.33.79 for prot 3
return status is IKMP_NO_ERROR
ISAKMP (0): sending INITIAL_CONTACT notify
ISAKMP (0): sending NOTIFY message 24578 protocol 1
VPN Peer: ISAKMP: Added new peer: ip:217.72.145.186/500 Total VPN Peers:1
VPN Peer: ISAKMP: Peer ip:217.72.145.186/500 Ref cnt incremented to:1 Total VPN Peers:1
crypto_isakmp_process_block:src:217.72.145.186, dest:217.114.33.79 spt:500 dpt:500
OAK_QM exchange
oakley_process_quick_mode:
OAK_QM_IDLE
ISAKMP (0): processing SA payload. message ID = 2585101931
ISAKMP : Checking IPSec proposal 1
ISAKMP: transform 1, ESP_3DES
ISAKMP: attributes in transform:
ISAKMP: SA life type in seconds
ISAKMP: SA life duration (basic) of 28800
ISAKMP: SA life type in kilobytes
ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
ISAKMP: encaps is 1
ISAKMP: authenticator is HMAC-SHA
ISAKMP (0): atts are acceptable.IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) dest= 217.72.145.186, src= 217.114.33.79,
dest_proxy= 172.30.0.0/255.255.0.0/0/0 (type=4),
src_proxy= 172.25.0.0/255.255.0.0/0/0 (type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
ISAKMP (0): processing NONCE payload. message ID = 2585101931
ISAKMP (0): processing ID payload. message ID = 2585101931
ISAKMP (0): processing ID payload. message ID = 2585101931map_alloc_entry: allocating entry 1
map_alloc_entry: allocating entry 2
ISAKMP (0): Creating IPSec SAs
inbound SA from 217.72.145.186 to 217.114.33.79 (proxy 172.30.0.0 to 172.25.0.0)
has spi 2352350037 and conn_id 1 and flags 4
lifetime of 28800 seconds
lifetime of 4608000 kilobytes
outbound SA from 217.114.33.79 to 217.72.145.186 (proxy 172.25.0.0 to 172.30.0.0)
has spi 1764560327 and conn_id 2 and flags 4
lifetime of 28800 seconds
lifetime of 4608000 kilobytesIPSEC(key_engine): got a queue event...
IPSEC(initialize_sas): ,
(key eng. msg.) dest= 217.114.33.79, src= 217.72.145.186,
dest_proxy= 172.25.0.0/255.255.0.0/0/0 (type=4),
src_proxy= 172.30.0.0/255.255.0.0/0/0 (type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 28800s and 4608000kb,
spi= 0x8c360355(2352350037), conn_id= 1, keysize= 0, flags= 0x4
IPSEC(initialize_sas): ,
(key eng. msg.) src= 217.114.33.79, dest= 217.72.145.186,
src_proxy= 172.25.0.0/255.255.0.0/0/0 (type=4),
dest_proxy= 172.30.0.0/255.255.0.0/0/0 (type=4),
protocol= ESP, transform= esp-3des esp-sha-hmac ,
lifedur= 28800s and 4608000kb,
spi= 0x692d0dc7(1764560327), conn_id= 2, keysize= 0, flags= 0x4
VPN Peer: IPSEC: Peer ip:217.72.145.186/500 Ref cnt incremented to:2 Total VPN Peers:1
VPN Peer: IPSEC: Peer ip:217.72.145.186/500 Ref cnt incremented to:3 Total VPN Peers:1
return status is IKMP_NO_ERROR
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 120.113.143.43 -> 28.179.235.202
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 218.103.51.190 -> 67.207.34.114
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 125.41.185.45 -> 20.164.21.245
IPSEC(cipher_ipsec_request): decap failed for 172.83.30.249 -> 211.37.239.103
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 62.222.209.185 -> 50.54.78.186
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 199.146.90.245 -> 166.231.218.99
ISADB: reaper checking SA 0x3c60614, conn_id = 0IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 236.40.46.137 -> 218.198.229.187
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 248.62.249.235 -> 88.27.236.78
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 29.91.15.66 -> 1.66.73.35
Ну вот и пошли бесконечные (с перерывами - тогда пинг есть) сообщения с рандомными IP-адресами. Что это такое - вообще не понимаю... Пинг запускается с внутренней сетки за центральным Пиксом 525. Грешу в общем уже на какой-то компонент этого неудачного 515-го Пикса, потому что центральный 525 нормально работает с другим удаленным Пиксом, который хоть и 506, но операционка та же, что и на 515, т.е. 6.3 версии - а настройки аналогичны. Понять бы, что вот это значит:
"
IPSEC(bv_esp_post_decap): authentication signature does not match
IPSEC(cipher_ipsec_request): decap failed for 29.91.15.66 -> 1.66.73.35
"
почему? по какому принципу адреса берутся? никакой логики пока в общем...