Portál AbcLinuxu, 8. května 2025 02:36
Řešení dotazu:
add check-gateway=arp comment="VPN route se znackou vpn_route" distance=1 gateway=10.20.10.1 routing-mark=vpn_route
a to již neprojde a hlásí to nedostupná IP, čemuž nerozumím když se na ní pingnu.
Já jako gateway vyberu ten odchozí interface....
[petr@router-bezrucova] > /ip route print Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit # DST-ADDRESS PREF-SRC GATEWAY DISTANCE 0 ADS 0.0.0.0/0 O2-VDSL 1 1 ADC 10.12.61.5/32 10.243.17.185 O2-VDSL 0 2 A S ;;; Olomouc router 192.168.1.0/24 Olomouc 1 3 ADC 192.168.1.3/32 192.168.10.3 Olomouc 0 4 ADC 192.168.2.0/24 192.168.2.2 ether1 0 5 ADC 192.168.10.0/24 192.168.10.1 bridge1 0
Asi by to chtělo zde vypsat jak to máte konkrétně nastavené.....
192.168.1.x Olomouc
192.168.2.x modem DSL
192.168.10.x Zlaté Hory
server: [admin@pobB] /ppp secret> print detail Flags: X - disabled 0 name="l2tp_link_pobA" service=l2tp caller-id="" password="pwdA" profile=l2tpProfile remote-address=10.20.10.201 routes="" limit-bytes-in=0 limit-bytes-out=0 1 name="l2tp_link_pobC" service=l2tp caller-id="" password="pwdC" profile=l2tpProfile remote-address=10.20.10.203 routes="" limit-bytes-in=0 limit-bytes-out=0 [admin@remeri] /ip route> print detail Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit 0 A S ;;; gateway do ISP dst-address=0.0.0.0/0 pref-src=10.110.102.9 gateway=10.110.102.1 gateway-status=10.110.102.1 reachable via ether1 distance=1 scope=30 target-scope=10 1 A S ;;; Routa do pobA dst-address=10.10.10.0/24 gateway=10.20.10.201 gateway-status=10.20.10.201 reachable via <l2tp-l2tp_link_pobA> distance=1 scope=30 target-scope=10 2 ADC dst-address=10.110.102.0/24 pref-src=10.110.102.9 gateway=ether1 gateway-status=ether1 reachable distance=0 scope=10 3 A S ;;; Routa do pobC dst-address=10.30.10.0/24 gateway=10.20.10.203 gateway-status=10.20.10.203 reachable via <l2tp-l2tp_link_pobC> distance=1 scope=30 target-scope=10 4 ADC dst-address=10.20.10.0/24 pref-src=10.20.10.1 gateway=bridge gateway-status=bridge reachable distance=0 scope=10 5 ADC dst-address=10.20.10.203/32 pref-src=10.20.10.254 gateway=bridge,<l2tp-l2tp_link_pobC> gateway-status=bridge reachable,<l2tp-l2tp_link_pobC> reachable distance=0 scope=10 6 ADC dst-address=10.20.10.201/32 pref-src=10.20.10.254 gateway=<l2tp-l2tp_link_pobA> gateway-status=<l2tp-l2tp_link_pobA> reachable distance=0 scope=10 [admin@pobB] /interface l2tp-server> print detail Flags: X - disabled, D - dynamic, R - running 0 DR name="<l2tp-l2tp_link_pobA>" user="l2tp_link_pobA" mtu=1450 mru=1450 client-address="158.199.17.219" uptime=34m58s encoding="cbc(aes) + hmac(sha1)" 1 DR name="<l2tp-l2tp_link_pobC>" user="l2tp_link_pobC" mtu=1450 mru=1450 client-address="190.253.17.157" uptime=33m10s encoding="cbc(aes) + hmac(sha1)" client A: [admin@pobA] > /interface l2tp-client print detail Flags: X - disabled, R - running 0 R name="l2tp_client" max-mtu=1450 max-mru=1450 mrru=disabled connect-to=vpn.pobB.cz user="l2tp_link_pobA" password="pwdA" profile=default-encryption keepalive-timeout=60 use-ipsec=yes ipsec-secret="xxx" allow-fast-path=no add-default-route=no dial-on-demand=no allow=pap,chap,mschap1,mschap2 client C: [admin@pobC] > interface l2tp-client print detail Flags: X - disabled, R - running 0 R name="l2tp_client" max-mtu=1450 max-mru=1450 mrru=disabled connect-to=vpn.pobB.cz user="l2tp_link_pobC" password="pwdC" profile=default-encryption keepalive-timeout=60 use-ipsec=yes ipsec-secret="xxx" allow-fast-path=no add-default-route=no dial-on-demand=no allow=pap,chap,mschap1,mschap2
5 ADC dst-address=10.20.10.203/32 pref-src=10.20.10.254 gateway=bridge,<l2tp-l2tp_link_pobC> gateway-status=bridge reachable,<l2tp-l2tp_link_pobC> reachable distance=0 scope=10 6 ADC dst-address=10.20.10.201/32 pref-src=10.20.10.254 gateway=<l2tp-l2tp_link_pobA> gateway-status=<l2tp-l2tp_link_pobA> reachable distance=0 scope=10Jedno máš přidané do bridge druhé ne. Podle mě to bridge tam nemá co dělat....a v tom bude ten zádrhel asi...
[admin@pobB] > ip address print detail Flags: X - disabled, I - invalid, D - dynamic 0 address=10.110.102.9/24 network=10.110.102.0 interface=ether1 actual-interface=ether1 1 address=10.20.10.1/24 network=10.20.10.0 interface=bridge actual-interface=bridge 2 D address=10.20.10.254/32 network=10.20.10.201 interface=<l2tp-l2tp_link_pobA> actual-interface=<l2tp-l2tp_link_pobA> 3 D address=10.20.10.254/32 network=10.20.10.203 interface=<l2tp-l2tp_link_pobC> actual-interface=<l2tp-l2tp_link_pobC>
Je možné nějak donutit OpenVPN aby přenášel krom TCP/UDP i další protokoly požívané v sítích?Uff, snad jo? Přes ten tun by doufám mělo projít jakékoli IP. Jako minimálně ICMP zjevně chodí
Když provádím ping do druhé sítě a restartuje se připojení, začne ho směrovač pouštět na default GW a trvá to i po obnovení spojení dokud to na chvíli nepřeruším. Nevím zda to může něčemu vadit, ale v monitoringu to je nepříjemné. Lze to odstranit?Přidat si routu nebo pravidlo firewallu, které to pošlou do nikam?
1.) Netuším OpenVPN nepoužívám a údajně na mikrotiku je to právě osekané.
2.) Netuším mám propojené pouze dva mikrotiky, ale zkus se kouknout do firewallu a zkusit zakázat fasttrack zda to nedělá on že si pamatuje kam posílat pakety...
3.) Podle mě si tím nepomůžeš, možná výkonnější HW s HW šifrováním.
4.) webmin nepoužívám takže neporadím.
5.) Taktéž netušim windows nepoužívám.
/interface l2tp-client add connect-to=IP_SERVERU disabled=no ipsec-secret=private name=IP_SERVERU password=password use-ipsec=yes user=\ usernameV logu MK je vidět:
23:50:21 l2tp,ppp,info IP_SERVERU: initializing... 23:50:21 l2tp,ppp,info IP_SERVERU: connecting... 23:50:22 ipsec,info initiate new phase 1 (Identity Protection): 10.110.102.9[500]<=>IP_SERVERU[500] 23:50:52 l2tp,ppp,info IP_SERVERU: terminating... - session closed 23:50:52 l2tp,ppp,info IP_SERVERU: disconnected 23:50:52 l2tp,ppp,info IP_SERVERU: initializing... 23:50:52 l2tp,ppp,info IP_SERVERU: connecting... 23:50:54 l2tp,ppp,info IP_SERVERU: terminating... 23:50:54 l2tp,ppp,info IP_SERVERU: disabled 23:50:55 ipsec,info ISAKMP-SA deleted 10.110.102.9[500]-IP_SERVERU[500] spi:cf3d7c46978772e3:0000000000000000 rekey:1Na serveru to hlásí něco o špatném paketu:
systemctl status xl2tpd.service ● xl2tpd.service - LSB: layer 2 tunelling protocol daemon Loaded: loaded (/etc/init.d/xl2tpd; generated) Active: active (running) since Fri 2020-11-13 23:35:57 CET; 1min 52s ago Docs: man:systemd-sysv-generator(8) Process: 800 ExecStart=/etc/init.d/xl2tpd start (code=exited, status=0/SUCCESS) Tasks: 1 (limit: 4659) CGroup: /system.slice/xl2tpd.service └─852 /usr/sbin/xl2tpd Nov 13 23:36:41 vm27105 xl2tpd[852]: handle_packet: bad control packet! Nov 13 23:36:48 vm27105 xl2tpd[852]: check_control: Received out of order control packet on tunnel 134 (got 3, expected 1) Nov 13 23:36:48 vm27105 xl2tpd[852]: handle_packet: bad control packet! Nov 13 23:36:49 vm27105 xl2tpd[852]: check_control: Received out of order control packet on tunnel -1 (got 1, expected 0) Nov 13 23:36:49 vm27105 xl2tpd[852]: handle_packet: bad control packet! Nov 13 23:36:57 vm27105 xl2tpd[852]: check_control: Received out of order control packet on tunnel -1 (got 1, expected 0) Nov 13 23:36:57 vm27105 xl2tpd[852]: handle_packet: bad control packet! Nov 13 23:37:04 vm27105 xl2tpd[852]: Maximum retries exceeded for tunnel 8562. Closing. Nov 13 23:37:04 vm27105 xl2tpd[852]: Connection 134 closed to MOJE_IP, port 1701 (Timeout) Nov 13 23:37:35 vm27105 xl2tpd[852]: Unable to deliver closing message for tunnel 8562. Destroying anyway.Log /var/log/xl2tpns.log jsem nenašel, vadí tomu jiná verze ubuntu?
systemctl status xl2tpd.service ● xl2tpd.service - LSB: layer 2 tunelling protocol daemon Loaded: loaded (/etc/init.d/xl2tpd; generated) Active: active (running) since Sat 2020-11-14 10:39:04 CET; 4min 33s ago Docs: man:systemd-sysv-generator(8) Process: 801 ExecStart=/etc/init.d/xl2tpd start (code=exited, status=0/SUCCESS) Tasks: 1 (limit: 4659) CGroup: /system.slice/xl2tpd.service └─882 /usr/sbin/xl2tpd Nov 14 10:39:03 vm27098 systemd[1]: Starting LSB: layer 2 tunelling protocol daemon... Nov 14 10:39:04 vm27098 xl2tpd[801]: Starting xl2tpd: xl2tpd. Nov 14 10:39:04 vm27098 xl2tpd[882]: xl2tpd version xl2tpd-1.3.10 started on vm27098 PID:882 Nov 14 10:39:04 vm27098 systemd[1]: Started LSB: layer 2 tunelling protocol daemon. Nov 14 10:39:04 vm27098 xl2tpd[882]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc. Nov 14 10:39:04 vm27098 xl2tpd[882]: Forked by Scott Balmos and David Stipp, (C) 2001 Nov 14 10:39:04 vm27098 xl2tpd[882]: Inherited by Jeff McAdams, (C) 2002 Nov 14 10:39:04 vm27098 xl2tpd[882]: Forked again by Xelerance (www.xelerance.com) (C) 2006-2016 Nov 14 10:39:04 vm27098 xl2tpd[882]: Listening on IP address 0.0.0.0, port 1701
10:44:02 l2tp,ppp,info IP_SERVERU: initializing... 10:44:02 l2tp,ppp,info IP_SERVERU: connecting... 10:44:02 ipsec,info initiate new phase 1 (Identity Protection): 10.110.102.9[500]<=>IP_SERVERU[500] 10:44:02 ipsec,info ISAKMP-SA established 10.110.102.9[4500]-IP_SERVERU[4500] spi:7ce63e5c3e0f396b:a550ae124a5069ff 10:44:26 l2tp,ppp,info IP_SERVERU: terminating... - session closed 10:44:26 l2tp,ppp,info IP_SERVERU: disconnected 10:44:26 l2tp,ppp,info IP_SERVERU: initializing... 10:44:26 l2tp,ppp,info IP_SERVERU: connecting... 10:44:26 l2tp,ppp,info IP_SERVERU: terminating... - old tunnel is not closed yet 10:44:26 l2tp,ppp,info IP_SERVERU: disconnected 10:44:26 l2tp,ppp,info IP_SERVERU: initializing... 10:44:26 l2tp,ppp,info IP_SERVERU: connecting... 10:44:34 l2tp,ppp,info IP_SERVERU: terminating... 10:44:34 l2tp,ppp,info IP_SERVERU: disabled 10:44:35 ipsec,info ISAKMP-SA deleted 10.110.102.9[4500]-IP_SERVERU[4500] spi:7ce63e5c3e0f396b:a550ae124a5069ff rekey:1
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.