两台防火墙配置VPN 中心-分支的方式
现在IKE能起来 但是IPSEC起不来是什么问题,看下配置有没有问题或者怎么排查
(0)
最佳答案
分支侧认证总部:
#
ike profile 1
keychain 1
dpd interval 5 periodic
exchange-mode aggressive
local-identity fqdn branch //用的是FQDN
match remote identity address 222.249.236.104 255.255.255.255
match local address GigabitEthernet1/0/1
proposal 1
#
总部侧认证分支:
#
ike profile 1
keychain 1
dpd interval 5 periodic
exchange-mode aggressive
local-identity address 222.249.236.104
match remote identity address 0.0.0.0 0.0.0.0 //用的是IP
match local address GigabitEthernet1/0/2
proposal 1
#
总部侧也换成FQDN吧
(0)
您好,参考
1.查看感兴趣流的acl是否被匹配,使用命令dis acl all
2.查看出口的nat配置有没有拒绝掉感兴趣流,因为nat的优先级高于ipsec策略,需要在nat的acl中拒绝掉感兴趣流
3.查看ipsec sa起来了没(当然ipsec sa起来了一般都是通的),也可以使用debug ipsec error查看ipsec起不来的原因。
(0)
Failed to find SA by SP, SP Index = 0, SP Convert-Seq = 65536. *Nov 15 07:44:14:942 2021 11 IPSEC/7/ERROR: The reason of dropping packet is no available IPsec tunnel. *Nov 15 07:44:14:942 2021 11 IPSEC/7/EVENT: Found block-flow node. *Nov 15 07:44:14:942 2021 11 IPSEC/7/PACKET: Failed to find SA by SP, SP Index = 0, SP Convert-Seq = 65536. *Nov 15 07:44:14:942 2021 11 IPSEC/7/ERROR: The reason of dropping packet is no available IPsec tunnel. *Nov 15 07:44:14:943 2021 11 IPSEC/7/EVENT: Found block-flow node. *Nov 15 07:44:14:943 2021 11 IPSEC/7/PACKET: Failed to find SA by SP, SP Index = 0, SP Convert-Seq = 65536. *Nov 15 07:44:14:943 2021 11 IPSEC/7/ERROR: The reason of dropping packet is no available IPsec tunnel.
可以看下,debug ike all中有没有下面这个提示,如果有(1)检查两端IPSec和transformset是否匹配(2)检查两端感兴趣流是否互为镜像。 Failed to get IPSec policy for phase 2 responder. Delete IPSec SA. Failed to negotiate IPSec SA.
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明