• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

msr36-10,ipsec连接上以后,发起端可以ping通对端,接收端无法ping通发起端。

2019-10-21提问
  • 0关注
  • 1收藏,1252浏览
粉丝:0人 关注:0人

问题描述:

之前一直使用ipsec偶VPN连接,最近突然出现发起端可以ping通对端,接收端无法ping通发起端的情况,发起端所有的设备无变动,配置无变动。接收端配置信息如下。

此图为发起端配置


组网及组网描述:

  以下为接收端配置

  1. policy-based-route aaa permit node 1
  2. if-match acl 3100
  3. #
  4. policy-based-route aaa permit node 2
  5. if-match acl 3300
  6. apply next-hop 58.215.*.*
  7. #
  8. policy-based-route aaa permit node 5
  9. if-match acl 3200
  10. apply output-interface Dialer0
  11. #
  12. controller Cellular0/0
  13. #
  14. controller Cellular0/1
  15. #
  16. interface Aux0
  17. #
  18. interface Dialer0
  19. mtu 1400
  20. ppp chap password cipher $c$3$NVxVXgc1fmuCa/GIvCziVpTnNJxlBIQ5eg== 
  21. ppp chap user 051012208068 
  22. ppp ipcp dns admit-any 
  23. ppp ipcp dns request 
  24. ppp pap local-user 051012208068 password cipher $c$3$ZoUN06Tj2qrX2VqMlr0fFmxTWrdte18ZAA== 
  25. dialer bundle enable
  26. dialer-group 1
  27. dialer timer idle 0
  28. dialer timer autodial 5
  29. ip address ppp-negotiate
  30. tcp mss 1024
  31. nat outbound
  32. #
  33. interface Virtual-Template0
  34. #
  35. interface NULL0
  36. #
  37. interface Vlan-interface1
  38. #
  39. interface GigabitEthernet0/0
  40. port link-mode route
  41. description Multiple_Line
  42. bandwidth 100000
  43. combo enable copper
  44. ip address 58.215.*.* 255.255.255.0
  45. dns server 221.228.255.1
  46. nat outbound
  47. nat outbound 3501
  48. nat server protocol tcp global 58.215.*.* 80 inside 192.168.100.223 80
  49. nat server protocol tcp global 58.215.*.* 81 inside 192.168.100.223 81
  50. nat server protocol tcp global 58.215.*.* 5222 inside 192.168.100.248 5222
  51. nat server protocol tcp global 58.215*.* 7070 inside 192.168.100.248 7070
  52. nat server protocol tcp global 58.215.*.* 8081 inside 192.168.100.251 8081
  53. nat server protocol tcp global 58.215.*.* 8082 inside 192.168.100.223 8082
  54. nat server protocol tcp global 58.215.*.* 8083 inside 192.168.100.236 8083
  55. nat server protocol tcp global 58.215.*.* 8089 inside 192.168.100.222 8089
  56. nat server protocol tcp global 58.215.*.* 8999 inside 192.168.100.248 8999
  57. nat server protocol tcp global 58.215.*.* 9000 inside 192.168.100.236 9000
  58. nat server protocol tcp global 58.215.*.* 33890 inside 192.168.100.222 33890
  59. nat static enable
  60. ipsec apply policy zb100
  61. #
  62. interface GigabitEthernet0/1
  63. port link-mode route
  64. description Multiple_Line
  65. duplex full
  66. speed 1000 
  67. mtu 1200
  68. shutdown
  69. tcp mss 1024
  70. pppoe-client dial-bundle-number 0
  71. #
  72. interface GigabitEthernet0/2
  73. port link-mode route
  74. ip address 192.168.100.254 255.255.255.0
  75. tcp mss 1024
  76. nat server protocol tcp global 58.215.*.* 80 inside 192.168.100.223 80
  77. nat server protocol tcp global 58.215.*.* 89 inside 192.168.100.251 89
  78. nat server protocol tcp global 58.215.*.* 8081 inside 192.168.100.251 8081
  79. nat server protocol tcp global 58.215.*.* 8082 inside 192.168.100.223 8082
  80. nat hairpin enable
  81. ip policy-based-route aaa
  82. #
  83. security-zone name Local
  84. #
  85. security-zone name Trust
  86. #
  87. security-zone name DMZ
  88. #
  89. security-zone name Untrust
  90. #
  91. security-zone name Management
  92. #
  93. scheduler logfile size 16
  94. #
  95. line class aux
  96. user-role network-admin
  97. #
  98. line class tty
  99. user-role network-operator
  100. #
  101. line class vty
  102. user-role network-operator
  103. #
  104. line aux 0
  105. user-role network-admin
  106. #
  107. line vty 0 4
  108. authentication-mode scheme
  109. user-role level-15
  110. user-role network-admin
  111. user-role network-operator
  112. #
  113. line vty 5 63
  114. user-role network-operator
  115. #
  116. ip route-static 0.0.0.0 0 GigabitEthernet0/0 58.215.*.*.preference 30
  117. ip route-static 0.0.0.0 0 Dialer0
  118. #
  119. acl advanced 3100
  120. rule 0 permit ip destination 192.168.100.0 0.0.0.255
  121. #
  122. acl advanced 3200
  123. rule 0 permit ip source 192.168.100.64 0.0.0.63
  124. rule 1 permit ip source 192.168.100.0 0.0.0.63
  125. rule 2 permit ip source 192.168.128.0 0.0.0.63
  126. rule 20 permit ip source 192.168.100.192 0
  127. rule 25 permit ip source 192.168.100.193 0
  128. rule 26 permit ip source 192.168.100.194 0
  129. rule 27 permit ip source 192.168.100.195 0
  130. rule 28 permit ip source 192.168.100.196 0
  131. rule 29 permit ip source 192.168.100.197 0
  132. rule 30 permit ip source 192.168.100.198 0
  133. rule 31 permit ip source 192.168.100.199 0
  134. rule 32 permit ip source 192.168.100.200 0
  135. #
  136. acl advanced 3300
  137. rule 5 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
  138. rule 10 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.5.0 0.0.0.255
  139. rule 15 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.8.0 0.0.0.255
  140. rule 20 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.11.0 0.0.0.255
  141. rule 25 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.80.0 0.0.0.255
  142. rule 30 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.0.0 0.0.0.255
  143. rule 35 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.6.0 0.0.0.255
  144. rule 40 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.3.0 0.0.0.255
  145. rule 45 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.9.0 0.0.0.255
  146. rule 50 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.18.0 0.0.0.255
  147. rule 55 permit ip source 192.168.100.0 0.0.0.255 destination 192.168.31.0 0.0.0.255
  148. #
  149. acl advanced 3501
  150. rule 0 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.5.0 0.0.0.255
  151. rule 1 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.18.0 0.0.0.255
  152. rule 2 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.0.0 0.0.0.255
  153. rule 3 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.6.0 0.0.0.255
  154. rule 4 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
  155. rule 5 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.80.0 0.0.0.255
  156. rule 6 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.11.0 0.0.0.255
  157. rule 7 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.8.0 0.0.0.255
  158. rule 8 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.3.0 0.0.0.255
  159. rule 9 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.31.0 0.0.0.255
  160. rule 10 deny ip source 192.168.100.0 0.0.0.255 destination 192.168.9.0 0.0.0.255
  161. rule 31 permit ip
  162. #
  163. domain system
  164. #
  165. domain default enable system
  166. #
  167. role name level-0
  168. description Predefined level-0 role
  169. #
  170. role name level-1
  171. description Predefined level-1 role
  172. #
  173. role name level-2
  174. description Predefined level-2 role
  175. #
  176. role name level-3
  177. description Predefined level-3 role
  178. #
  179. role name level-4
  180. description Predefined level-4 role
  181. #
  182. role name level-5
  183. description Predefined level-5 role
  184. #
  185. role name level-6
  186. description Predefined level-6 role
  187. #
  188. role name level-7
  189. description Predefined level-7 role
  190. #
  191. role name level-8
  192. description Predefined level-8 role
  193. #
  194. role name level-9
  195. description Predefined level-9 role
  196. #
  197. role name level-10
  198. description Predefined level-10 role
  199. #
  200. role name level-11
  201. description Predefined level-11 role
  202. #
  203. role name level-12
  204. description Predefined level-12 role
  205. #
  206. role name level-13
  207. description Predefined level-13 role
  208. #
  209. role name level-14
  210. description Predefined level-14 role
  211. #
  212. user-group system
  213. #
  214. local-user admin class manage
  215. password hash $h$6$X5KlqjblPVQPGArx$LWJtAADuMwbOp7TD7cLPhGQHLxfnBdaq1agklTnAkAezs0Xuf1HgayJ5G501fcGsf2qACPEWp9sfwIqqB9IsRA==
  216. service-type ftp
  217. service-type ssh telnet terminal http https
  218. authorization-attribute user-role level-15
  219. authorization-attribute user-role network-admin
  220. authorization-attribute user-role network-operator
  221. #
  222. ipsec transform-set 1
  223. esp encryption-algorithm 3des-cbc 
  224. esp authentication-algorithm md5 
  225. pfs dh-group2
  226. #
  227. ipsec transform-set 31
  228. esp encryption-algorithm 3des-cbc 
  229. esp authentication-algorithm md5 
  230. #
  231. ipsec policy-template zb11wh 1
  232. transform-set 1 
  233. ike-profile 11wuhan
  234. sa duration time-based 3600
  235. sa duration traffic-based 1843200
  236. #
  237. ipsec policy-template zb18mh 1
  238. transform-set 1 
  239. ike-profile 18minhou
  240. sa duration time-based 3600
  241. sa duration traffic-based 1843200
  242. #
  243. ipsec policy-template zb31sz 1
  244. transform-set 31 
  245. ike-profile 31suzhou
  246. sa duration time-based 3600
  247. sa duration traffic-based 1843200
  248. #
  249. ipsec policy-template zb3sz 1
  250. transform-set 1 
  251. ike-profile 3suzhou
  252. sa duration time-based 3600
  253. sa duration traffic-based 1843200
  254. #
  255. ipsec policy-template zb80wh 1
  256. transform-set 1 
  257. ike-profile 80wuhan
  258. sa duration time-based 3600
  259. sa duration traffic-based 1843200
  260. #
  261. ipsec policy-template zb8mh 1
  262. transform-set 1 
  263. ike-profile 8minhou
  264. sa duration time-based 3600
  265. sa duration traffic-based 1843200
  266. #
  267. ipsec policy-template zb9dt 1
  268. transform-set 1 
  269. ike-profile 9daotian
  270. sa duration time-based 3600
  271. sa duration traffic-based 1843200
  272. #
  273. ipsec policy-template zbfz 1
  274. transform-set 1 
  275. ike-profile 5fuzhou
  276. sa duration time-based 3600
  277. sa duration traffic-based 1843200
  278. #
  279. ipsec policy-template zbjth 1
  280. transform-set 1 
  281. ike-profile jintaihu
  282. sa duration time-based 3600
  283. sa duration traffic-based 1843200
  284. #
  285. ipsec policy-template zbjx 1
  286. transform-set 1 
  287. ike-profile 6jiangxia
  288. sa duration time-based 3600
  289. sa duration traffic-based 1843200
  290. #
  291. ipsec policy-template zbjy 1
  292. transform-set 1 
  293. ike-profile 2jiangyin
  294. sa duration time-based 3600
  295. sa duration traffic-based 1843200
  296. #
  297. ipsec policy zb100 1 isakmp template zbjth
  298. #
  299. ipsec policy zb100 2 isakmp template zbfz
  300. #
  301. ipsec policy zb100 3 isakmp template zbjx
  302. #
  303. ipsec policy zb100 4 isakmp template zbjy
  304. #
  305. ipsec policy zb100 5 isakmp template zb80wh
  306. #
  307. ipsec policy zb100 6 isakmp template zb11wh
  308. #
  309. ipsec policy zb100 7 isakmp template zb8mh
  310. #
  311. ipsec policy zb100 8 isakmp template zb3sz
  312. #
  313. ipsec policy zb100 9 isakmp template zb31sz
  314. #
  315. ipsec policy zb100 10 isakmp template zb9dt
  316. #
  317. ipsec policy zb100 11 isakmp template zb18mh
  318. #
  319. ike profile 11wuhan
  320. keychain test
  321. dpd interval 10 periodic
  322. exchange-mode aggressive
  323. local-identity address 58.215.*.*
  324. match remote identity fqdn 11wuhan
  325. proposal 2 
  326. #
  327. ike profile 18minhou
  328. keychain test
  329. dpd interval 10 periodic
  330. exchange-mode aggressive
  331. local-identity fqdn zb100
  332. match remote identity fqdn 18minhou
  333. proposal 2 
  334. #
  335. ike profile 2jiangyin
  336. keychain test
  337. dpd interval 10 periodic
  338. exchange-mode aggressive
  339. local-identity address 58.215.*.*
  340. match remote identity fqdn 2jiangyin
  341. proposal 2 
  342. #
  343. ike profile 31suzhou
  344. keychain test
  345. dpd interval 10 periodic
  346. exchange-mode aggressive
  347. local-identity address 58.215.*.*
  348. match remote identity fqdn 31suzhou
  349. proposal 2 
  350. #
  351. ike profile 3suzhou
  352. keychain test
  353. dpd interval 10 periodic
  354. exchange-mode aggressive
  355. local-identity address 58.215.*.*
  356. match remote identity fqdn 3suzhou
  357. proposal 2 
  358. #
  359. ike profile 5fuzhou
  360. keychain test
  361. dpd interval 10 periodic
  362. exchange-mode aggressive
  363. local-identity address 58.215.*.*
  364. match remote identity fqdn 5fuzhou
  365. proposal 2 
  366. #
  367. ike profile 6jiangxia
  368. keychain test
  369. dpd interval 10 periodic
  370. exchange-mode aggressive
  371. local-identity address 58.215.*.*
  372. match remote identity fqdn 6jiangxia
  373. proposal 2 
  374. #
  375. ike profile 80wuhan
  376. keychain test
  377. dpd interval 10 periodic
  378. exchange-mode aggressive
  379. local-identity address 58.215.*.*
  380. match remote identity fqdn 80wuhan
  381. proposal 2 
  382. #
  383. ike profile 8minhou
  384. keychain test
  385. dpd interval 10 periodic
  386. exchange-mode aggressive
  387. local-identity fqdn zb100
  388. match remote identity fqdn 8minhou
  389. proposal 2 
  390. #
  391. ike profile 9daotian
  392. keychain test
  393. dpd interval 10 periodic
  394. exchange-mode aggressive
  395. local-identity address 58.215.*.*
  396. match remote identity fqdn 9daotian
  397. proposal 2 
  398. #
  399. ike profile jintaihu
  400. keychain test
  401. dpd interval 10 periodic
  402. exchange-mode aggressive
  403. local-identity address 58.215.*.*.
  404. match remote identity fqdn 0jintaihu
  405. proposal 2 
  406. #
  407. ike proposal 2
  408. encryption-algorithm 3des-cbc
  409. dh group2
  410. #
  411. ike keychain test
  412. pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$Fpsouoa9Pf/HnFLN9K6cwsFHfCDyOX6pungY
  413. #
  414. ip http port 8989
  415. ip https port 18989
  416. ip http enable
  417. ip https enable
  418. #
  419. wlan global-configuration
  420. #
  421. wlan ap-group default-group
  422. #
  423. return 

最佳答案

Guohao 九段
粉丝:36人 关注:2人

需要看一下故障时候dis ike sa和dis ipsec sa是否都有。另外要检查一下两端的路由对不对。

这个是我测试的摸一个网段,IKE sa 和ipsec sa 应该是都有 <H3C>dis ike sa Connection-ID Remote Flag DOI ------------------------------------------------------------------ 5 49.80.156.127 RD IPsec 2 110.83.16.88 RD IPsec 6 112.86.4.226 RD IPsec 3 180.113.172.24 RD IPsec 15 27.156.26.80 RD IPsec 7 27.155.238.36 RD IPsec 82 117.80.106.252 RD IPsec 20 111.175.84.83 RD IPsec 8 171.43.215.145 RD IPsec 88 27.156.26.140 Unknown IPsec 84 59.173.154.190 RD IPsec 67 59.173.154.190 RD|RL IPsec Flags: RD--READY RL--REPLACED FD-FADING RK-REKEY <H3C>dis ipsec sa ------------------------------- Interface: GigabitEthernet0/0 ----------------------------- IPsec policy: zb100 Sequence number: 3 Mode: Template ----------------------------- Tunnel id: 0 Encapsulation mode: tunnel Perfect Forward Secrecy: dh-group2 Inside VPN: Extended Sequence Numbers enable: N Traffic Flow Confidentiality enable: N Path MTU: 1444 Tunnel: local address: 58.215.215.146 remote address: 111.175.84.83 Flow: sour addr: 192.168.100.0/255.255.255.0 port: 0 protocol: ip dest addr: 192.168.6.0/255.255.255.0 port: 0 protocol: ip [Inbound ESP SAs] SPI: 3161781874 (0xbc74f672) Connection ID: 30064771074 Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1831672/2550 Max received sequence-number: 63663 Anti-replay check enable: Y Anti-replay window size: 64 UDP encapsulation used for NAT traversal: N Status: Active [Outbound ESP SAs] SPI: 453548495 (0x1b0899cf) Connection ID: 30064771075 Transform set: ESP-ENCRYPT-3DES-CBC ESP-AUTH-MD5 SA duration (kilobytes/sec): 1843200/3600 SA remaining duration (kilobytes/sec): 1835358/2550 Max sent sequence-number: 61596 UDP encapsulation used for NAT traversal: N Status: Active

zhiliao_Y18kV 发表时间:2019-10-21
1 个回答
已采纳
粉丝:134人 关注:6人

您好,请知:
当ipsec不同时,检查sa及ike是否还保留,另外确认路由是否还可达。
如果上述的信息还在,可重启ipsec的进程后再测试:


1.重启ipsec进程 reset sa ipsec  
2.重启ipsec策略 reset ipsec  sa policy  
3.重启ipsec statistics

路由不可达,sa和ike有存在。 您给的命令会报错。 Unrecognized command found at '^' position. 虽然命令没有执行,不过我重启过设备。情况依旧、

zhiliao_Y18kV 发表时间:2019-10-21

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明