与上海端ipsecvpn建立不起来,debug信息如下
I-COOKIE: becee6a471f438b2
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Main
flags:
message ID: 0
length: 196
*Dec 1 13:32:21:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sending an IPv4 packet.
*Dec 1 13:32:21:856 2020 H3C IKE/7/EVENT: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sent data to socket successfully.
*Dec 1 13:32:32:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Retransmit phase 1 packet.
*Dec 1 13:32:32:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sending packet to 175.102.21.221 remote port 500, local port 500.
*Dec 1 13:32:32:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
I-COOKIE: becee6a471f438b2
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Main
flags:
message ID: 0
length: 196
*Dec 1 13:32:32:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sending an IPv4 packet.
*Dec 1 13:32:32:856 2020 H3C IKE/7/EVENT: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sent data to socket successfully.
*Dec 1 13:32:43:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Retransmit phase 1 packet.
*Dec 1 13:32:43:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sending packet to 175.102.21.221 remote port 500, local port 500.
*Dec 1 13:32:43:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
I-COOKIE: becee6a471f438b2
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Main
flags:
message ID: 0
length: 196
*Dec 1 13:32:43:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sending an IPv4 packet.
*Dec 1 13:32:43:856 2020 H3C IKE/7/EVENT: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sent data to socket successfully.
*Dec 1 13:32:59:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Retransmit phase 1 packet.
*Dec 1 13:32:59:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sending packet to 175.102.21.221 remote port 500, local port 500.
*Dec 1 13:32:59:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
I-COOKIE: becee6a471f438b2
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Main
flags:
message ID: 0
length: 196
*Dec 1 13:32:59:856 2020 H3C IKE/7/PACKET: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sending an IPv4 packet.
*Dec 1 13:32:59:856 2020 H3C IKE/7/EVENT: vrf = 0, local = 58.240.44.62, remote = 175.102.21.221/500
Sent data to socket successfully.
%Dec 1 13:33:04:006 2020 H3C LOGIN/5/
(0)
看日志,IKE阶段1一直在重传
IPSEC 拍错思路
一、基础配置
地址,路由
二、确定感兴趣流
通过定义ACL来确定要保护的数据
三、部署IKE
IKE的keychain的部署
IKE profile的部署
四、安全联盟的部署【决定对数据进行怎样的加密和验证】
IPsec transform-set
protocol esp
ESP 的加密使用3-des
ESP 的验证使用sha1
五、IPsec policy的部署
IPsec policy 名称 序列号 isakmp//IKE协商
security acl
Ike-profile
transform-set
remote-address 对端地址//对端IPsec policy下发的接口所在地址
六、接口下发
在接口下输入:IPsec apply policy 名称
以上就是ipsec的配置注意事项
(0)
您好,请知:
关于IPSEC VPN无法建立,以下是排查要点,请参考:
1、检查两端的路由是否可达。
2、检查两端IPSEC VPN的加密算法、认证算法、认证密钥是否一致。
3、检查两端IPSEC VPN已相互指向。
4、检查两端IPSEC VPN模式是否都一致。
5、检查两端IPSEC VPN已正确下发到端口。
6、检查两端IPSEC VPN感兴趣数据流已正确指定了源和目的。
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论