• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

SR66 and ER router are unable to communicate after IPSec was established

2020-05-21 Published
  • 0关注
  • 0收藏 1365浏览
孟普 六段
粉丝:2人 关注:0人

Network Topology

  • The client uses the V3 device as the headquarters router, ER3100 and ER5200 in the two branches respectively, and the communication between the headquarter and the branches uses the IPSEC tunnel established in the main mode .Now, the old device is replaced with the  V5 SR66. After completing the configuration, it is found that only one branch (ER3100) is communicating normally and the other one is not. The topology is as follows:

  • Private network 192.168.2.0/24 --(ER3100) 211. X.X. ---headquarters - -222.X.X.92(ER5200)---private network192.168.1.0/24 


Problem Description

 Only one branch (ER3100) is communicating normally and the other one is not.  


Process Analysis

1. Check IKE SA and Ipsec SA, both of which have been established normally: 

<SR6602>dis ike sa
    total phase-1 SAs:  2
    connection-id  peer                    flag        phase   doi
  ----------------------------------------------------------------
     15            211.X.X.12           RD|ST       1       IPSEC
     17            222.X.X.92          RD          1       IPSEC
     16            211.X.X.12           RD|ST       2       IPSEC
     18            222.X.X.92          RD          2       IPSEC

<SR6602>dis ipsec sa
===============================
Interface: GigabitEthernet0/0/1
    path MTU: 1500
===============================

  -----------------------------
  IPsec policy name: "bfy2"
  sequence number: 1
  acl version: ACL4
  mode: isakmp
  -----------------------------
    PFS: N, DH group: none
    tunnel:
        local  address: 121.X.X.222
        remote address: 211.X.X.12
    flow:
        sour addr: 192.168.35.0/255.255.255.0  port: 0  protocol: IP
        dest addr: 192.168.2.0/255.255.255.0  port: 0  protocol: IP

    [inbound ESP SAs]
      spi: 0xA1DA1B76(2715425654)
      transform: ESP-ENCRYPT-3DES ESP-AUTH-MD5
      in use setting: Tunnel
      connection id: 3
      sa duration (kilobytes/sec): 1843200/3600
      sa remaining duration (kilobytes/sec): 1843154/3063
      anti-replay detection: Enabled
        anti-replay window size(counter based): 32
      udp encapsulation used for nat traversal: N

    [outbound ESP SAs]
      spi: 0xA7135208(2803061256)
      transform: ESP-ENCRYPT-3DES ESP-AUTH-MD5
      in use setting: Tunnel
      connection id: 4
      sa duration (kilobytes/sec): 1843200/3600
      sa remaining duration (kilobytes/sec): 1843106/3063
      anti-replay detection: Enabled
        anti-replay window size(counter based): 32
      udp encapsulation used for nat traversal: N
===============================
Interface: GigabitEthernet0/0/1
    path MTU: 1500
===============================

  -----------------------------
  IPsec policy name: "bfy2"
  sequence number: 2
  acl version: ACL4
  mode: isakmp
  -----------------------------
    PFS: N, DH group: none
    tunnel:
        local  address: 121.X.X.222
        remote address: 222.X.X.92
    flow:
        sour addr: 192.168.35.0/255.255.255.0  port: 0  protocol: IP
        dest addr: 192.168.1.0/255.255.255.0  port: 0  protocol: IP

    [inbound ESP SAs]
      spi: 0x96C45E7B(2529451643)
      transform: ESP-ENCRYPT-3DES ESP-AUTH-MD5
      in use setting: Tunnel
      connection id: 5
      sa duration (kilobytes/sec): 1843200/3600
      sa remaining duration (kilobytes/sec): 1843189/3067
      anti-replay detection: Enabled
        anti-replay window size(counter based): 32
      udp encapsulation used for nat traversal: N
               
    [outbound ESP SAs]
      spi: 0x8357A1BE(2203558334)
      transform: ESP-ENCRYPT-3DES ESP-AUTH-MD5
      in use setting: Tunnel
      connection id: 6
      sa duration (kilobytes/sec): 1843200/3600
      sa remaining duration (kilobytes/sec): 1843200/3067
      anti-replay detection: Enabled
        anti-replay window size(counter based): 32
      udp encapsulation used for nat traversal: N

 

2. Check the route of the headquarters, and it is normal  

===============display ip routing-table===============
============================================================
Routing Tables: Public
 Destinations : 23 Routes : 23

Destination/Mask    Proto  Pre  Cost         NextHop         Interface

0.0.0.0/0           Static 60   0            121.X.X.217   GE0/0/1

3. The ipsec policy configuration of the headquarters is as follows. According to the client"s feedback, after the exchange of 1 and 2 of bfy2, the business of branch 1 will pass, but 2 will not.


      ipsec policy bfy2 1 isakmp
      security acl 3001
      ike-peer xiamen
      transform-set xiamen
    #
      ipsec policy bfy2 2 isakmp
      security acl 3002
      ike-peer 8yuan
      transform-set 8yuan
    #

4. View the interest streams of the two branches:  

acl number 3001
    description bfy---xiamen
    rule 0 permit ip source 192.168.35.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    rule 2 deny ip
    acl number 3002
    description bfy---bky(8yuan)
    rule 10 permit ip source 192.168.35.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    rule 20 deny ip
   #



Solution

In the application of IPsec, the "permit"of  ACL rules means the matching flow need to be encrypted by IPsec tunnel, while the "deny" rule means the matching flow don"t need to be encrypted by IPsec tunnel. Because the "rule 2 deny ip" deny all traffic, said don"t need to do a IPsec protection, So the business of the latter node is not valid. 

Delete the deny node of the two ACLs. 


该案例对您是否有帮助:

您的评价:1

若您有关于案例的建议,请反馈:

0 comments

No comments

Add Comments:

举报

×

侵犯我的权益 >
对根叔知了社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔知了社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作