IPSEC VPN racoon
Jan Koukal - FS
jan.koukal at fs.cvut.cz
Tue Jul 1 12:14:14 CEST 2008
Dobry den,
Mame zakaznika, který ma podobne na Vigorech pobocky a jako VPN koncentrator se pouziva PfSense a s DRAYTEK Vigor 2820n se to chovalo velmi podobne. Vigor se restarnul vždy po navazani VPN asi po 5-15 minutach,bez ni bezel v poho. Museli jsme ho vymenit za starsi shodou okolnosti 2700G s fw 2.7.3.3_1401302, kde to ale funguje. Bohuzel Vam nyní nemuzu poslat konfiguraci,az pristi tyden :(
Zdravi,
Jan Koukal
P.s: Myslim,ze Draytekuv IPSec nebude z nejlepsich.....
-----Original Message-----
From: users-l-bounces at freebsd.cz [mailto:users-l-bounces at freebsd.cz] On Behalf Of Stefan Valko
Sent: Tuesday, July 01, 2008 11:17 AM
To: users-l at freebsd.cz
Subject: IPSEC VPN racoon
Zdravim riesim nasledujuci problem. Mam IPSEC VPN server (racoon) ktory spaja
22 pobociek LAN - LAN (FreeBSD - Vigor 2700) na Vigore je posledny fw 2.7.3 od T-COMu (kedze zo starsimi,robilo problem to ze po vytoceni VPNky sa resetol na tvrdo VIGOR) , problem mam ten ze niekedy padne VPNka medzi BSD a Vigorom a niektore Vigori vytocia si VPN spojenie ktore je v poriadku prechadzaju hned data a je to ok, ale niektore si vytvoria VPN spojenie ale nepretecie cez tunnel nic :( len sa tvari ze VPN je vytvorena. Potom pomoze len to ze racoon restartnem a potom sa tie VPNky ktore mali tz. neuplny tunnel pripoja uplne bez problemov !!! Neriesil niekto nieco podobne? V logoch racoonu som nic mimoriadne nevsimol a na google som nic normalne nenasiel :( Vychadza mi to na problem Vigorov ale pre istotu sa tu pytam ze ci nahodou ma niekto nevie nakopnut a nejako to doladit. Tyka sa to cca 3 - 4 Vigorov z 22. PS. Pred tym to na CISCO slo ok..... (nechcel som meni) aj zo starym firmware
ipsec.conf
flush;
spdflush;
spdadd LAN_BSD/24 LAN_VIGOR/24 any -P out ipsec esp/tunnel/WAN_BSD-WAN_VIGOR/require;
spdadd LAN_VIGOR/24 LAN_BSD/24 any -P in ipsec esp/tunnel/WAN_VIGOR-WAN_BSD/require;
racoon.conf
remote WAN_VIGOR
{
#exchange_mode main,aggressive,base;
exchange_mode main;
my_identifier address WAN_BSD;
peers_identifier address WAN_VIGOR;
verify_identifier on;
nonce_size 16;
lifetime time 86400 sec ; # sec,min,hour
proposal_check obey;
# phase 1 proposal (for ISAKMP SA)
proposal {
encryption_algorithm 3des;
hash_algorithm sha1;
authentication_method pre_shared_key;
dh_group 2;
}
}
sainfo address LAN_BSD/24 any address LAN_VIGOR/24 any {
pfs_group 1;
lifetime time 86400 sec;
encryption_algorithm 3des;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}
Stefan Valko
--
FreeBSD mailing list (users-l at freebsd.cz) http://www.freebsd.cz/listserv/listinfo/users-l
More information about the Users-l
mailing list