华为SecPath 100F防火墙和联想网御防火墙实现IPsec互通_无忧网客联盟_ ...

某项目测试中,遇到联想网御300和 我司SECPATH 100F,进行IPSEC对接测试,测试中碰到 一点问题,拿出来和大家分享。

组网:

   

组网说明:

PC机A的地址是192.168.1.100 网关地址192.168.1.254。PC机B的地址192.168.0.100,网关地址192.168.0.254。

SECPATH100F防火墙模拟中心节点设备,联想网御防火墙模拟分支节点设备。使用IPSEC野蛮模式进行互连。

故障现象:

两端配置一样 , IKE SA始终无法建立。

我司SECPATH配置情况:

IKE  PROPOSA是3DES加密,MD5认证,使用野蛮模式:



ike proposal 1

encryption-algorithm 3des-cbc

dh group5

authentication-algorithm md5           

sa duration 28800

ike peer lx                             

exchange-mode aggressive               

pre-shared-key 12345678                

id-type name                           

remote-name lx



IPSEC  PROPOSA都是 3DES加密,MD5认证:

ipsec proposal 1

esp encryption-algorithm 3des

查看IKE SA:

[huawei-ike-proposal-1]dis ike sa

connection-id  peer            flag        phase   doi

----------------------------------------------------------

7          <unnamed>       NONE          1     IPSEC

IKE SA没有建立

提示错误信息

#Nov 12 10:15:22:992 2006 huawei IKEMONIT/5/No SA Failure:

No SA Failure



%Nov 12 10:15:22:992 2006 huawei IKE/4/DROP:

IKE packet dropped: (src addr: 10.1.5.253, dst addr: 10.1.5.254) with I_Cookie f5c9ae3bef83aa8a and R_Cookie 0000000000000000, because of ' No proposal is chosen ' from payload PROPOSAL.



联想WEB配置

联想“远程 VPN”,对应我司的IKE  PROPOSA:





联想“网关隧道配置”,对应我司IPSEC  PROPOSA:





原理和解决方法:

打开debugging ike message查看IKE协商信息,发现如下提示:

*0.16938973 huawei IKE/8/DEBUG:  Transform 0's attributes

*0.16938973 huawei IKE/8/DEBUG:  Attribute LIFE_TYPE : SECONDS

*0.16938973 huawei IKE/8/DEBUG:  Attribute LIFE_DURATION : 28800

*0.16938973 huawei IKE/8/DEBUG:  Attribute ENCRYPTION_ALGORITHM : 3DES_CBC

*0.16938973 huawei IKE/8/DEBUG:  Attribute HASH_ALGORITHM : SHA

*0.16938973 huawei IKE/8/DEBUG:  Attribute AUTHENTICATION_METHOD : PRE_SHARED

*0.16938974 huawei IKE/8/DEBUG:  Attribute GROUP_DESCRIPTION : MODP_1024

*0.16938974 huawei IKE/8/DEBUG:validate payload KEY_EXCH of message 844c6d64

*0.16938974 huawei IKE/8/DEBUG:validate payload ID of message 844c6d64

由上面信息可以看到联想实际发送过来的IKE PROPOSA验证算法是SHA,由此可以肯定联想设备的WEB设置和后台实际运行配置不一致,造成了和SECPATH 的IKE SA无法建立。

修改SECPATH 100F  IKE PROPOSA 1 的验证算法为SHA。

联想默认发送过来的DH 组是dh group2即10248-bit的Diffie-Hellman组,而SECPATH 100F上面配置的是dh group5(默认是dh group1),修改SECPATH 100F为dh group2。

查看IKE SA

[huawei]dis ike sa

connection-id  peer            flag        phase   doi

----------------------------------------------------------

198          10.1.5.254      RD            1     IPSEC

flag meaning

RD--READY ST--STAYALIVE RL--REPLACED FD--FADING TO--TIMEOUT

可以看到IKE SA 已经建立。

备注:

查看IKE SA VERBOSE信息如下:

[huawei]dis ike sa verbose

---------------------------------------------

connection id: 198

transmitting entity: responder

---------------------------------------------

local ip: 10.1.5.253

local id type: FQDN

local id: huawei



remote ip: 10.1.5.254

remote id type: FQDN

remote id: lx



authentication-method: PRE-SHARED-KEY

authentication-algorithm: HASH-SHA1

encryption-algorithm: 3DES-CBC



life duration(sec): 28800

remaining key duration(sec): 28193

exchange-mode: AGGRESSIVE

diffie-hellman group: GROUP2

nat traversal: NO



查看IPSEC 信息,已经全部建立起来:

[huawei]dis ipsec sa

===============================

Interface: Ethernet1/1

path MTU: 1500

===============================

-----------------------------

IPsec policy name: "1"

sequence number: 1

mode: isakmp

-----------------------------

Created by: "Host"

connection id: 4

encapsulation mode: tunnel

perfect forward secrecy: None

tunnel:

local  address: 10.1.5.253

remote address: 10.1.5.254

flow:    (5 times matched)

sour addr: 192.168.1.0/255.255.255.0  port: 0  protocol: IP

dest addr: 192.168.0.0/255.255.255.0  port: 0  protocol: IP

[inbound ESP SAs]

spi: 3613558760 (0xd76287e8)

proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5

sa remaining key duration (bytes/sec): 1887436580/3574

max received sequence-number: 5

udp encapsulation used for nat traversal: N

[outbound ESP SAs]

spi: 903478232 (0x35d9fbd8)

proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5

sa remaining key duration (bytes/sec): 1887436800/3574

max sent sequence-number: 1

udp encapsulation used for nat traversal: N



[huawei]dis ipsec tunnel

------------------------------------------------

Connection ID : 4

Perfect forward secrecy: None

SA's SPI :

Inbound :  3613558760 (0xd76287e8) [ESP]

Outbound : 903478232 (0x35d9fbd8) [ESP]

Tunnel :

Local Address:  10.1.5.253  Remote Address : 10.1.5.254

Flow :     (8 times matched)

Sour Addr : 192.168.1.0/255.255.255.0  Port: 0  Protocol : IP
Dest Addr : 192.168.0.0/255.255.255.0  Port: 0  Protocol : IP




郑重声明:资讯 【华为SecPath 100F防火墙和联想网御防火墙实现IPsec互通_无忧网客联盟_ ...】由 发布,版权归原作者及其所在单位,其原创性以及文中陈述文字和内容未经(企业库qiyeku.com)证实,请读者仅作参考,并请自行核实相关内容。若本文有侵犯到您的版权, 请你提供相关证明及申请并与我们联系(qiyeku # qq.com)或【在线投诉】,我们审核后将会尽快处理。
—— 相关资讯 ——