The OpenNET Project / Index page

[ новости /+++ | форум | теги | ]

форумы  помощь  поиск  регистрация  майллист  вход/выход  слежка  RSS
"Коллеги, помогите настроить site-to-site ipsec на двух Cisco AS"
Вариант для распечатки  
Пред. тема | След. тема 
Форум Маршрутизаторы CISCO и др. оборудование. (VPN, VLAN, туннель)
Изначальное сообщение [ Отслеживать ]

"Коллеги, помогите настроить site-to-site ipsec на двух Cisco AS"  +/
Сообщение от node1 email(ok) on 02-Фев-12, 15:51 
Коллеги, помогите настроить site-to-site ipsec на двух Cisco ASA 5505
Схема такая: 10.10.10.0/24---(ASA1)---86.110....((Internet))---213.243....---(ASA2)---10.10.8.0/24
Сам туннель я поднял быстро визардом в ASDM с 2 сторон с одинаковыми параметрами. В мониторинге-VPN сессия устанавливается и при обрыве (logout) тут же поднимается снова.
проблема в том что не идет трафик из сетки 10.10.10.0/24 в 10.10.8.0/24

Делаю packet-tracer input LAN tcp 10.10.10.1 80 10.10.8.1 80 detailed
На 12 фазе постоянный DROP с руганью на implicit rule, чтобы я не делал - не проходит, ACL перепробовал разные.
Помогите найти грабли.

Result of the command: "packet-tracer input LAN tcp 10.10.10.1 80 10.10.8.1 80 detailed"
Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         WAN
Phase: 3
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   LAN             255.255.255.0   LAN
Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group LAN_access_in in interface LAN
access-list LAN_access_in extended permit ip any any
Additional Information:
Forward Flow based lookup yields rule:
in  id=0xdd37a290, priority=12, domain=permit, deny=false
    hits=83387, user_data=0xd64ef650, cs_id=0x0, flags=0x0, protocol=0
    src ip=0.0.0.0, mask=0.0.0.0, port=0
    dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in  id=0xd8280ca0, priority=0, domain=inspect-ip-options, deny=true
    hits=48901580, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
    src ip=0.0.0.0, mask=0.0.0.0, port=0
    dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 6
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map global-class
match default-inspection-traffic
policy-map global-policy
class global-class
  inspect http
service-policy global-policy global
Additional Information:
Forward Flow based lookup yields rule:
in  id=0xd83b1588, priority=70, domain=inspect-http, deny=false
    hits=31887, user_data=0xd8321850, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
    src ip=0.0.0.0, mask=0.0.0.0, port=0
    dst ip=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0
Phase: 7
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map global-class
match default-inspection-traffic
policy-map global-policy
class global-class
  inspect waas
service-policy global-policy global
Additional Information:
Forward Flow based lookup yields rule:
in  id=0xd9fd7598, priority=70, domain=inspect-waas, deny=false
    hits=81089, user_data=0xd82d1e50, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
    src ip=0.0.0.0, mask=0.0.0.0,
    dst ip=0.0.0.0, mask=0.0.0.0,
    sport range<0> : 1-65535
Phase: 8
Type: NAT-EXEMPT
Subtype:
Result: ALLOW
Config:
nat-control
  match ip LAN LAN 255.255.255.0 WAN NIK 255.255.255.0
    NAT exempt
    translate_hits = 48987, untranslate_hits = 0
Additional Information:
Forward Flow based lookup yields rule:
in  id=0xd9d32f00, priority=6, domain=nat-exempt, deny=false
    hits=48987, user_data=0xdd02f2d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
    src ip=LAN, mask=255.255.255.0, port=0
    dst ip=NIK, mask=255.255.255.0, port=0, dscp=0x0
Phase: 9
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (LAN) 0 0.0.0.0 0.0.0.0
nat-control
  match ip LAN any WAN any
    no translation group, implicit deny
    policy_hits = 20864
Additional Information:
Forward Flow based lookup yields rule:
in  id=0xd82953f0, priority=0, domain=nat, deny=false
    hits=21095, user_data=0xdb447c18, cs_id=0x0, flags=0x0, protocol=0
    src ip=0.0.0.0, mask=0.0.0.0, port=0
    dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 10
Type: NAT
Subtype: host-limits
Result: ALLOW
Config:
nat (LAN) 0 0.0.0.0 0.0.0.0
nat-control
  match ip LAN any WAN any
    no translation group, implicit deny
    policy_hits = 20864
Additional Information:
Forward Flow based lookup yields rule:
in  id=0xd82dcdd8, priority=0, domain=host, deny=false
    hits=296, user_data=0xdb447c18, cs_id=0x0, reverse, flags=0x0, protocol=0
    src ip=0.0.0.0, mask=0.0.0.0, port=0
    dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 11
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
out id=0xdcfa7958, priority=70, domain=encrypt, deny=false
    hits=267, user_data=0xa2882c, cs_id=0xdc3f7070, reverse, flags=0x0, protocol=0
    src ip=LAN, mask=255.255.255.0, port=0
    dst ip=NIK, mask=255.255.255.0, port=0, dscp=0x0
Phase: 12
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
out id=0xd8404310, priority=11, domain=permit, deny=true
    hits=385465, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0
    src ip=0.0.0.0, mask=0.0.0.0, port=0
    dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Result:
input-interface: LAN
input-status: up
input-line-status: up
output-interface: WAN
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule

Вот конфиг асы на одном конце:

: Saved
:
ASA Version 8.2(2)
!
hostname asacher
domain-name alfa.fake
enable password ------- encrypted
passwd ------- encrypted
names

..............

dns-guard
!
interface Vlan1
shutdown
nameif M9
security-level 0
ip address .............
!
interface Vlan2
nameif WAN
security-level 0
ip address ...............
ospf cost 10
!
interface Vlan22
nameif LAN
security-level 100
ip address 10.10.10.10 255.255.255.0
ospf cost 10
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
switchport access vlan 32
!
interface Ethernet0/3
switchport access vlan 42
!
interface Ethernet0/4
switchport access vlan 42
!
interface Ethernet0/5
switchport access vlan 22
!
interface Ethernet0/6
switchport access vlan 22
!
interface Ethernet0/7
switchport access vlan 22
!
boot system disk0:/asa822-k8.bin
ftp mode passive
clock timezone MSK/MSD 3
clock summer-time MSK/MDD recurring last Sun Mar 2:00 last Sun Oct 3:00
dns domain-lookup LAN
dns server-group DefaultDNS
name-server gegel
name-server diogen
name-server sokrat
domain-name alfa.fake
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network Internet_full_access
description Internet full access
network-object host atom

.................

object-group service WAN_TCP_Incoming tcp
port-object range 6129 6129
port-object eq domain
port-object eq www
port-object eq imap4
port-object eq pop3
port-object eq ssh
port-object eq smtp
port-object eq https
port-object eq pptp
port-object eq 5900
port-object eq 5901
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
access-list WAN_1_cryptomap_1 extended permit ip LAN 255.255.255.0 NIK 255.255.255.0
access-list WAN_access_out extended permit ip interface WAN any
access-list WAN_access_out extended permit ip host ............. any
access-list WAN_access_out extended permit ip host ............. any
access-list WAN_access_in extended permit tcp any any object-group WAN_TCP_Incoming log alerts
access-list WAN_access_in extended permit icmp any any echo-reply
access-list WAN_cryptomap_1 extended permit icmp LAN 255.255.255.0 NIK 255.255.255.0
access-list LAN_nat_static extended permit tcp host gegel eq 6129 any
access-list LAN_nat_outbound extended permit ip object-group Internet_full_access any
access-list LAN_nat_static_1 extended permit tcp host sokrat eq smtp any
access-list LAN_nat0_outbound extended permit ip LAN 255.255.255.0 NIK 255.255.255.0
access-list WAN_cryptomap_2 extended permit tcp LAN 255.255.255.0 NIK 255.255.255.0
access-list LAN_nat_static_8 extended permit tcp host sokrat eq https any
access-list LAN_nat_static_4 extended permit tcp host muhanov eq 6130 any
access-list LAN_nat_static_3 extended permit tcp host muhanov eq 6129 any
access-list LAN_nat_static_5 extended permit tcp host muhanov eq 6129 any
access-list LAN_nat_static_6 extended permit tcp host sokrat eq https any
access-list WAN_nat_static extended permit tcp host sokrat eq https any
access-list LAN_nat_static_2 extended permit tcp host sokrat eq https any
access-list LAN_nat_static_7 extended permit tcp host sokrat eq https any
access-list LAN_nat_static_9 extended permit tcp host diogen eq https any
access-list LAN_nat_static_10 extended permit tcp host geraklit eq pptp any
access-list WAN_1_cryptomap extended permit ip LAN 255.255.255.0 NIK 255.255.255.0
access-list LAN_nat_static_13 extended permit tcp host gegel eq 6129 any
access-list M9_access_in extended permit tcp any any object-group WAN_TCP_Incoming
access-list M9_access_in extended permit icmp any any echo-reply
access-list M9_access_out extended permit ip host M9 any
access-list LAN_nat_static_14 extended permit tcp host sokrat eq smtp any
access-list LAN_nat_static_15 extended permit tcp host sokrat eq https any
access-list LAN_access_in extended permit ip any any
access-list LAN_nat_static_12 extended permit tcp host geraklit eq pptp any
access-list LAN_nat_static_11 extended permit tcp host diogen eq 6129 any
pager lines 24
logging enable
logging history informational
logging asdm informational
no logging message 106015

...................

flow-export destination LAN 10.10.10.106 9996
flow-export template timeout-rate 1
flow-export delay flow-create 10
mtu WAN 1500
mtu LAN 1500
mtu M9 1500
ip verify reverse-path interface WAN
ip verify reverse-path interface LAN
no failover
no monitor-interface WAN
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-621.bin
asdm history enable
arp timeout 14400
nat-control
global (WAN) 1 interface
global (WAN) 4 ............ netmask 255.255.255.255
global (WAN) 5 ............ netmask 255.255.255.255
global (LAN) 3 interface
nat (LAN) 0 access-list LAN_nat0_outbound
nat (LAN) 1 access-list LAN_nat_outbound
static (LAN,M9) tcp interface 6129 access-list LAN_nat_static_13
static (LAN,WAN) tcp interface 6129 access-list LAN_nat_static
static (LAN,M9) tcp interface https access-list LAN_nat_static_15
static (LAN,WAN) tcp interface https access-list LAN_nat_static_7
static (LAN,WAN) tcp ............. 6129 access-list LAN_nat_static_11
static (LAN,WAN) tcp ............. 6129 access-list LAN_nat_static_5
static (LAN,M9) tcp interface smtp access-list LAN_nat_static_14
static (LAN,WAN) tcp interface smtp access-list LAN_nat_static_1
static (LAN,M9) tcp interface pptp access-list LAN_nat_static_12
static (LAN,WAN) tcp interface pptp access-list LAN_nat_static_10
access-group WAN_access_in in interface WAN
access-group WAN_access_out out interface WAN
access-group LAN_access_in in interface LAN
access-group M9_access_in in interface M9
access-group M9_access_out out interface M9
route WAN 0.0.0.0 0.0.0.0 ............... 255
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server ALFA.FAKE protocol nt
aaa-server ALFA.FAKE (LAN) host gegel
nt-auth-domain-controller 10.10.10.4
aaa-server ALFA.FAKE (LAN) host sokrat
nt-auth-domain-controller diogen
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication telnet console LOCAL
http server enable
http server idle-timeout 30
http server session-timeout 30
http LAN 255.255.255.0 LAN
snmp-server group Authentication&Encryption v3 priv
snmp-server user snmp Authentication&Encryption v3 encrypted auth md5 03:a1:d1:0c:2f:6a:63:d4:fd:18:0a:b6:85:e6:c6:b7 priv 3des 03:a1:d1:0c:2f:6a:63:d4:fd:18:0a:b6:85:e6:c6:b7:65:e9:c7:bd:55:72:15:5a:db:d3:93:1c:34:e0:7f:e1
snmp-server host LAN 10.10.10.150 community ***** udp-port 161
snmp-server host LAN atom community ***** udp-port 161
snmp-server host LAN geraklit community ***** udp-port 161
no snmp-server location
no snmp-server contact
snmp-server community *****
snmp-server enable traps snmp authentication linkup linkdown coldstart
snmp-server enable traps syslog
snmp-server enable traps ipsec start stop
snmp-server enable traps entity config-change fru-insert fru-remove
snmp-server enable traps remote-access session-threshold-exceeded
auth-prompt prompt hi
auth-prompt accept welcome to hell
auth-prompt reject go away
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map WAN_map 1 match address WAN_1_cryptomap_1
crypto map WAN_map 1 set pfs group1
crypto map WAN_map 1 set peer NIK_Firewall
crypto map WAN_map 1 set transform-set ESP-3DES-SHA
crypto map WAN_map interface WAN
crypto isakmp enable WAN
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh LAN 255.255.255.0 LAN
ssh timeout 20
ssh version 2
console timeout 0

threat-detection basic-threat
threat-detection scanning-threat shun except ip-address LAN 255.255.255.0
threat-detection scanning-threat shun except ip-address 10.10.5.0 255.255.255.0
threat-detection scanning-threat shun except ip-address NIK 255.255.255.0
threat-detection scanning-threat shun duration 3600
threat-detection statistics
threat-detection statistics host number-of-rate 3
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
webvpn
group-policy DfltGrpPolicy attributes
username admin password ................ encrypted privilege 15
tunnel-group DefaultWEBVPNGroup general-attributes
authentication-server-group (LAN) ALFA.FAKE
tunnel-group ............. type ipsec-l2l
tunnel-group ............. ipsec-attributes
pre-shared-key *****
!
class-map global-class
match default-inspection-traffic
!
!
policy-map type inspect im Drop_Yahoo_&_MSN
parameters
match protocol msn-im yahoo-im
  drop-connection log
policy-map global-policy
class global-class
  inspect ctiqbe
  
  ..................
  
  inspect xdmcp
!
service-policy global-policy global
prompt hostname context
call-home
profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:a73e817d87207cbf2eef09955958c57b
: end
asdm image disk0:/asdm-621.bin
asdm location agrazhd 255.255.255.255 LAN
asdm location M9 255.255.255.255 LAN
asdm location NIK_Firewall 255.255.255.255 LAN
asdm history enable


Ответить | Правка | Cообщить модератору

Оглавление

Сообщения по теме [Сортировка по времени | RSS]


1. "Коллеги, помогите настроить site-to-site ipsec на двух Cisco AS"  +/
Сообщение от Aleks305 (ok) on 02-Фев-12, 15:59 
sysopt connection permit-vpn вводили?
С обоих концов vpn
Ответить | Правка | ^ к родителю #0 | Наверх | Cообщить модератору

2. "Коллеги, помогите настроить site-to-site ipsec на двух Cisco AS"  +/
Сообщение от node1 email(ok) on 02-Фев-12, 16:18 
> sysopt connection permit-vpn вводили?
> С обоих концов vpn

Нет, просвятите что это? Я не потеряю удаленный офис? )))

Ответить | Правка | ^ к родителю #1 | Наверх | Cообщить модератору

3. "Коллеги, помогите настроить site-to-site ipsec на двух Cisco AS"  +/
Сообщение от node1 email(ok) on 02-Фев-12, 16:23 
>> sysopt connection permit-vpn вводили?
>> С обоих концов vpn
> Нет, просвятите что это? Я не потеряю удаленный офис? )))

Ввел, ничего не поменялось, рубит implicit рулом на лан интерфейсе

Ответить | Правка | ^ к родителю #2 | Наверх | Cообщить модератору

4. "Коллеги, помогите настроить site-to-site ipsec на двух Cisco AS"  +/
Сообщение от node1 email(ok) on 02-Фев-12, 16:59 
>>> sysopt connection permit-vpn вводили?
>>> С обоих концов vpn
>> Нет, просвятите что это? Я не потеряю удаленный офис? )))
> Ввел, ничего не поменялось, рубит implicit рулом на лан интерфейсе

Ура, заработало. Нехватало acl на wan out

Ответить | Правка | ^ к родителю #3 | Наверх | Cообщить модератору

Архив | Удалить

Рекомендовать для помещения в FAQ | Индекс форумов | Темы | Пред. тема | След. тема




Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру