Portál AbcLinuxu, 10. května 2025 08:14
ip route add vzdaleny_sbunet/maska via vnitrni_IP_hubu src lokalni_IP_routeru
.
Řešení dotazu:
ip route add subnet_dalsi_pobocky/maska via verejna_IP_teto_brany src LAN_adresa_teto_brany
) jsem videl ICMP odchazeji z "verejna_IP_teto_brany" na "LAN_adresa_vzdalene_brany_na_pobocce". Dle tcpdumpu tedy koncily "nekde v internetu".
Podla mojho nazoru su v IPSecovych tuneloch definovane urcite politiky na packety, ktore nimi maju prechadzat. Tie spocivaju napr v tom, ze packet, ktory ma tunelom prejst musi mat zdrojovu a cielovu IP adresu, ktore odpovedaju IP rozsahom oboch VPN stran (alebo proste definovanym konfigurovanym rozsahom oboch stran pri zostavovani spojenia)... teda ak je centrala 10.0.0.0/16 a pobocka je 172.16.1.0/24, tak packet musi mat ako cielovu a zdrojovu adresu iba niektoru z tychto rozsahov... teda ak chcete routovat medzi pobockami (dalsia pobocka 172.16.2.0/24), tak packet automaticky bude mat nejaku adresu inu, a teda nebude vpusteny do tunela medzi prvou pobockou a centralou.
A ano.. ako pisete, bez GRE si asi neporadite.
192.168.129.0/24 -> 192.168.0.0/16
na dalsi pobocce:
192.168.130.0/24 -> 192.168.0.0/16
a na centrale to same, ale opacne.
Diky tomu budou pobocky encapsulovat veskery provoz na cokoliv ve 192.168.0.0/16 do ipsecu, tim padem to dorazi na centralu, ktera to desifruje a bud odroutuje na lokalni sit (192.168.0.0/24), nebo odesle jinym tunelem dal.
Tomas
centrala-c:~# cat /etc/ipsec-tools.conf #!/usr/sbin/setkey -f flush; spdflush; spdadd 192.168.2.0/24 192.168.1.0/24 any -P in ipsec esp/tunnel/2.2.2.2-1.1.1.1/require; spdadd 192.168.1.0/24 192.168.2.0/24 any -P out ipsec esp/tunnel/1.1.1.1-2.2.2.2/require; spdadd 192.168.3.0/24 192.168.1.0/24 any -P in ipsec esp/tunnel/3.3.3.3-1.1.1.1/require; spdadd 192.168.1.0/24 192.168.3.0/24 any -P out ipsec esp/tunnel/1.1.1.1-2.2.2.2/require; centrala-c:~#
centrala-c:~# cat /etc/racoon/racoon.conf . . . sainfo address 192.168.0.0/16 any address 192.168.2.0/24 any { lifetime time 15 min; pfs_group modp1024; encryption_algorithm rijndael; authentication_algorithm hmac_sha1; compression_algorithm deflate; } sainfo address 192.168.0.0/16 any address 192.168.3.0/24 any { lifetime time 15 min; pfs_group modp1024; encryption_algorithm rijndael; authentication_algorithm hmac_sha1; compression_algorithm deflate; } centrala-c:~#
pobocka-a:~# cat /etc/ipsec-tools.conf #!/usr/sbin/setkey -f flush; spdflush; spdadd 192.168.2.0/24 192.168.2.0/24 any -P in none; spdadd 192.168.2.0/24 192.168.2.0/24 any -P out none; spdadd 192.168.2.0/24 192.168.0.0/16 any -P out ipsec esp/tunnel/2.2.2.2-1.1.1.1/require; spdadd 192.168.0.0/16 192.168.2.0/24 any -P in ipsec esp/tunnel/1.1.1.1-2.2.2.2/require; pobocka-a:~#
pobocka-a:~# cat /etc/racoon/racoon.conf . . . sainfo address 192.168.2.0/24 any address 192.168.0.0/16 any { lifetime time 15 min; pfs_group modp1024; encryption_algorithm rijndael; authentication_algorithm hmac_sha1; compression_algorithm deflate; } pobocka-a:~#
S openNHRP nikdo zkušenost nemá?
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.