IPSec VPN建立在两个NAT路由器上

1、测试拓扑:

图片.png

2、相关说明:

实际的网络情况中,Site1和Site2之间要建立IPSec VPN,已让 Site后面的内网网段互通。但是实际的情况往往也有访问internet的需求,所以一般会有NAT的情况,例如这里的情况和一般的NAT-T不一样。做VPN的设备和NAT的设备一样。

 

3、相关配置:

R1

crypto isakmp   policy 10

 encr 3des

 authentication pre-share

 group 2   

crypto isakmp key   cisco address 12.1.1.2

!

!

crypto ipsec   transform-set Trans esp-3des esp-md5-hmac

!

crypto map cisco   10 ipsec-isakmp

 set peer 12.1.1.2

 set transform-set Trans

 match address vpn

!

!

!

!

interface   Loopback0

 ip address 1.1.1.1 255.255.255.0

 ip nat inside

 ip virtual-reassembly

!

interface   Ethernet0/0

 ip address 12.1.1.1 255.255.255.0

 ip nat outside

 ip virtual-reassembly

 half-duplex

 crypto map cisco

!

ip route 2.2.2.0 255.255.255.0 12.1.1.2 >>>>这条静态路由,是为了让流量撞上VPN触发流量

!

!

ip nat inside   source list nat interface Ethernet0/0 overload

!

!

ip access-list   extended nat

 deny   ip 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255 >>>>这里是为了不让1.1.1.1访问2.2.2.2的流量撞上NAT

 permit ip any any

ip access-list   extended vpn

 permit ip 1.1.1.0 0.0.0.255 2.2.2.0   0.0.0.255

R2

crypto isakmp   policy 10

 encr 3des

 authentication pre-share

 group 2   

crypto isakmp key   cisco address 12.1.1.1

!

!

crypto ipsec   transform-set Trans esp-3des esp-md5-hmac

!

crypto map cisco   10 ipsec-isakmp

 set peer 12.1.1.1

 set transform-set Trans

 match address vpn

!

!

!

!

interface   Loopback0

 ip address 2.2.2.2 255.255.255.0

 ip nat outside

 ip virtual-reassembly

!

interface   Ethernet0/0

 ip address 12.1.1.2 255.255.255.0

 half-duplex

 crypto map cisco

!        

ip route 1.1.1.0   255.255.255.0 12.1.1.1

!

!

ip nat inside   source list nat interface Ethernet0/0 overload

!

!        

ip access-list   extended nat

 deny     ip 2.2.2.0 0.0.0.255 1.1.1.0 0.0.0.255

 permit ip any any

ip access-list   extended vpn

 permit ip 2.2.2.0 0.0.0.255 1.1.1.0   0.0.0.255

触发VPN

 

R1#ping 2.2.2.2 so 1.1.1.1

 

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 2.2.2.2, timeout is 2 seconds:

Packet sent with a source address of 1.1.1.1

.!!!!

Success rate is 80 percent (4/5), round-trip min/avg/max = 32/44/48 ms

 

4、分析建立过程:

第一阶段:

*Mar  1 04:49:24.886: ISAKMP (0:0): received packet from 12.1.1.1 dport 500 sport 500 Global (N) NEW SA

*Mar  1 04:49:24.886: ISAKMP: Created a peer struct for 12.1.1.1, peer port 500

*Mar  1 04:49:24.886: ISAKMP: New peer created peer = 0x64F66BC4 peer_handle = 0x80000007

*Mar  1 04:49:24.890: ISAKMP: Locking peer struct 0x64F66BC4, IKE refcount 1 for crypto_isakmp_process_block

*Mar  1 04:49:24.890: ISAKMP: local port 500, remote port 500

*Mar  1 04:49:24.890: insert sa successfully sa = 646DD604

*Mar  1 04:49:24.894: ISAKMP:(0:0:N/A:0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH

*Mar  1 04:49:24.894: ISAKMP:(0:0:N/A:0):Old State = IKE_READY  New State = IKE_R_MM1

 

*Mar  1 04:49:24.898: ISAKMP:(0:0:N/A:0): processing SA payload. message ID = 0

*Mar  1 04:49:24.898: ISAKMP:(0:0:N/A:0): processing vendor id payload

*Mar  1 04:49:24.898: ISAKMP:(0:0:N/A:0): vendor ID seems Unity/DPD but major 245 mismatch

*Mar  1 04:49:24.902: ISAKMP (0:0): vendor ID is NAT-T v7

*Mar  1 04:49:24.902: ISAKMP:(0:0:N/A:0): processing vendor id payload

*Mar  1 04:49:24.902: ISAKMP:(0:0:N/A:0): vendor ID seems Unity/DPD but major 157 mismatch

*Mar  1 04:49:24.902: ISAKMP:(0:0:N/A:0): vendor ID is NAT-T v3

*Mar  1 04:49:24.906: ISAKMP:(0:0:N/A:0): processing vendor id payload

*Mar  1 04:49:24.906: ISAKMP:(0:0:N/A:0): vendor ID seems Unity/DPD but major 123 mismatch

*Mar  1 04:49:24.906: ISAKMP:(0:0:N/A:0): vendor ID is NAT-T v2

*Mar  1 04:49:24.906: ISAKMP:(0:0:N/A:0):found peer pre-shared key matching 12.1.1.1

*Mar  1 04:49:24.910: ISAKMP:(0:0:N/A:0): local preshared key found

*Mar  1 04:49:24.910: ISAKMP : Scanning profiles for xauth ...

*Mar  1 04:49:24.910: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 1 against priority 10 policy >>>检查我们配置的isakmp policy 10

*Mar  1 04:49:24.910: ISAKMP:      encryption 3DES-CBC

*Mar  1 04:49:24.910: ISAKMP:      hash SHA

*Mar  1 04:49:24.914: ISAKMP:      default group 2

*Mar  1 04:49:24.914: ISAKMP:      auth pre-share

*Mar  1 04:49:24.914: ISAKMP:      life type in seconds

*Mar  1 04:49:24.914: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80

*Mar  1 04:49:24.914: ISAKMP:(0:0:N/A:0):atts are acceptable. Next payload is 0

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): processing vendor id payload

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): vendor ID seems Unity/DPD but major 245 mismatch

*Mar  1 04:49:24.946: ISAKMP (0:134217729): vendor ID is NAT-T v7

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): processing vendor id payload

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): vendor ID seems Unity/DPD but major 157 mismatch

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): vendor ID is NAT-T v3

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): processing vendor id payload

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): vendor ID seems Unity/DPD but major 123 mismatch

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): vendor ID is NAT-T v2

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM1  New State = IKE_R_MM1

 

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): constructed NAT-T vendor-07 ID

*Mar  1 04:49:24.946: ISAKMP:(0:1:SW:1): sending packet to 12.1.1.1 my_port 500 peer_port 500 (R) MM_SA_SETUP

*Mar  1 04:49:24.950: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE

*Mar  1 04:49:24.950: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM1  New State = IKE_R_MM2

 

*Mar  1 04:49:25.046: ISAKMP (0:134217729): received packet from 12.1.1.1 dport 500 sport 500 Global (R) MM_SA_SETUP

*Mar  1 04:49:25.046: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH

*Mar  1 04:49:25.050: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM2  New State = IKE_R_MM3

 

*Mar  1 04:49:25.054: ISAKMP:(0:1:SW:1): processing KE payload. message ID = 0

*Mar  1 04:49:25.086: ISAKMP:(0:1:SW:1): processing NONCE payload. message ID = 0

*Mar  1 04:49:25.086: ISAKMP:(0:1:SW:1):found peer pre-shared key matching 12.1.1.1

*Mar  1 04:49:25.090: ISAKMP:(0:1:SW:1):SKEYID state generated

*Mar  1 04:49:25.090: ISAKMP:(0:1:SW:1): processing vendor id payload

*Mar  1 04:49:25.090: ISAKMP:(0:1:SW:1): vendor ID is Unity

*Mar  1 04:49:25.094: ISAKMP:(0:1:SW:1): processing vendor id payload

*Mar  1 04:49:25.094: ISAKMP:(0:1:SW:1): vendor ID is DPD

*Mar  1 04:49:25.094: ISAKMP:(0:1:SW:1): processing vendor id payload

*Mar  1 04:49:25.094: ISAKMP:(0:1:SW:1): speaking to another IOS box!

*Mar  1 04:49:25.098: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE

*Mar  1 04:49:25.098: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM3  New State = IKE_R_MM3

 

*Mar  1 04:49:25.102: ISAKMP:(0:1:SW:1): sending packet to 12.1.1.1 my_port 500 peer_port 500 (R) MM_KEY_EXCH

*Mar  1 04:49:25.102: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE

*Mar  1 04:49:25.102: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM3  New State = IKE_R_MM4

 

*Mar  1 04:49:25.154: ISAKMP (0:134217729): received packet from 12.1.1.1 dport 500 sport 500 Global (R) MM_KEY_EXCH

*Mar  1 04:49:25.158: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH

*Mar  1 04:49:25.158: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM4  New State = IKE_R_MM5

 

*Mar  1 04:49:25.162: ISAKMP:(0:1:SW:1): processing ID payload. message ID = 0

*Mar  1 04:49:25.166: ISAKMP (0:134217729): ID payload

        next-payload : 8

        type         : 1

        address      : 12.1.1.1

        protocol     : 17

        port         : 500

        length       : 12

*Mar  1 04:49:25.166: ISAKMP:(0:1:SW:1):: peer matches *none* of the profiles

*Mar  1 04:49:25.166: ISAKMP:(0:1:SW:1): processing HASH payload. message ID = 0

*Mar  1 04:49:25.170: ISAKMP:(0:1:SW:1): processing NOTIFY INITIAL_CONTACT protocol 1

        spi 0, message ID = 0, sa = 646DD604

*Mar  1 04:49:25.170: ISAKMP:(0:1:SW:1):SA authentication status:

        authenticated

*Mar  1 04:49:25.174: ISAKMP:(0:1:SW:1): Process initial contact,

bring down existing phase 1 and 2 SA's with local 12.1.1.2 remote 12.1.1.1 remote port 500

*Mar  1 04:49:25.174: ISAKMP:(0:1:SW:1):SA authentication status:

        authenticated

*Mar  1 04:49:25.178: ISAKMP:(0:1:SW:1):SA has been authenticated with 12.1.1.1

*Mar  1 04:49:25.178: ISAKMP: Trying to insert a peer 12.1.1.2/12.1.1.1/500/,  and inserted successfully 64F66BC4.

*Mar  1 04:49:25.178: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE

*Mar  1 04:49:25.182: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM5  New State = IKE_R_MM5

 

*Mar  1 04:49:25.182: IPSEC(key_engine): got a queue event with 1 kei messages

*Mar  1 04:49:25.186: ISAKMP:(0:1:SW:1):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR

*Mar  1 04:49:25.186: ISAKMP (0:134217729): ID payload

        next-payload : 8

        type         : 1

        address      : 12.1.1.2

        protocol     : 17

        port         : 500

        length       : 12

*Mar  1 04:49:25.190: ISAKMP:(0:1:SW:1):Total payload length: 12

*Mar  1 04:49:25.194: ISAKMP:(0:1:SW:1): sending packet to 12.1.1.1 my_port 500 peer_port 500 (R) MM_KEY_EXCH

*Mar  1 04:49:25.198: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE

*Mar  1 04:49:25.198: ISAKMP:(0:1:SW:1):Old State = IKE_R_MM5  New State = IKE_P1_COMPLETE

 

*Mar  1 04:49:25.202: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE

*Mar  1 04:49:25.202: ISAKMP:(0:1:SW:1):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE

 

第二阶段:

*Mar  1 04:49:25.266: ISAKMP (0:134217729): received packet from 12.1.1.1 dport 500 sport 500 Global (R) QM_IDLE     

*Mar  1 04:49:25.266: ISAKMP: set new node 1812581365 to QM_IDLE     

*Mar  1 04:49:25.270: ISAKMP:(0:1:SW:1): processing HASH payload. message ID = 1812581365

*Mar  1 04:49:25.274: ISAKMP:(0:1:SW:1): processing SA payload. message ID = 1812581365

*Mar  1 04:49:25.274: ISAKMP:(0:1:SW:1):Checking IPSec proposal 1

*Mar  1 04:49:25.274: ISAKMP: transform 1, ESP_3DES

*Mar  1 04:49:25.274: ISAKMP:   attributes in transform:

*Mar  1 04:49:25.274: ISAKMP:      encaps is 1 (Tunnel)

*Mar  1 04:49:25.278: ISAKMP:      SA life type in seconds

*Mar  1 04:49:25.278: ISAKMP:      SA life duration (basic) of 3600

*Mar  1 04:49:25.278: ISAKMP:      SA life type in kilobytes

*Mar  1 04:49:25.278: ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0

*Mar  1 04:49:25.278: ISAKMP:      authenticator is HMAC-MD5

*Mar  1 04:49:25.282: ISAKMP:(0:1:SW:1):atts are acceptable.

*Mar  1 04:49:25.282: IPSEC(validate_proposal_request): proposal part #1,

  (key eng. msg.) INBOUND local= 12.1.1.2, remote= 12.1.1.1,

    local_proxy= 2.2.2.0/255.255.255.0/0/0 (type=4),

    remote_proxy= 1.1.1.0/255.255.255.0/0/0 (type=4),

    protocol= ESP, transform= esp-3des esp-md5-hmac  (Tunnel),

    lifedur= 0s and 0kb,

    spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x2

*Mar  1 04:49:25.286: Crypto mapdb : proxy_match

        src addr     : 2.2.2.0

        dst addr     : 1.1.1.0

        protocol     : 0

        src port     : 0

        dst port     : 0

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1): processing NONCE payload. message ID = 1812581365

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1): processing ID payload. message ID = 1812581365

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1): processing ID payload. message ID = 1812581365

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1): asking for 1 spis from ipsec

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1):Node 1812581365, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1):Old State = IKE_QM_READY  New State = IKE_QM_SPI_STARVE

*Mar  1 04:49:25.290: IPSEC(key_engine): got a queue event with 1 kei messages

*Mar  1 04:49:25.290: IPSEC(spi_response): getting spi 2345636103 for SA

        from 12.1.1.2 to 12.1.1.1 for prot 3

*Mar  1 04:49:25.290: ISAKMP: received ke message (2/1)

*Mar  1 04:49:25.290: ISAKMP: Locking peer struct 0x64F66BC4, IPSEC refcount 1 for for stuff_ke

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1): Creating IPSec SAs

*Mar  1 04:49:25.290:         inbound SA from 12.1.1.1 to 12.1.1.2 (f/i)  0/ 0

        (proxy 1.1.1.0 to 2.2.2.0)

*Mar  1 04:49:25.290:         has spi 0x8BCF9107 and conn_id 0 and flags 2

*Mar  1 04:49:25.290:         lifetime of 3600 seconds

*Mar  1 04:49:25.290:         lifetime of 4608000 kilobytes

*Mar  1 04:49:25.290:         has client flags 0x0

*Mar  1 04:49:25.290:         outbound SA from 12.1.1.2 to 12.1.1.1 (f/i) 0/0

        (proxy 2.2.2.0 to 1.1.1.0)

*Mar  1 04:49:25.290:         has spi 685105074 and conn_id 0 and flags A

*Mar  1 04:49:25.290:         lifetime of 3600 seconds

*Mar  1 04:49:25.290:         lifetime of 4608000 kilobytes

*Mar  1 04:49:25.290:         has client flags 0x0

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1): sending packet to 12.1.1.1 my_port 500 peer_port 500 (R) QM_IDLE     

*Mar  1 04:49:25.290: ISAKMP:(0:1:SW:1):Node 1812581365, Input = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY

*Mar  1 04:49:25.294: ISAKMP:(0:1:SW:1):Old State = IKE_QM_SPI_STARVE  New State = IKE_QM_R_QM2

*Mar  1 04:49:25.294: IPSEC(key_engine): got a queue event with 2 kei messages

*Mar  1 04:49:25.298: IPSEC(initialize_sas): ,

  (key eng. msg.) INBOUND local= 12.1.1.2, remote= 12.1.1.1,

    local_proxy= 2.2.2.0/255.255.255.0/0/0 (type=4),

    remote_proxy= 1.1.1.0/255.255.255.0/0/0 (type=4),

    protocol= ESP, transform= esp-3des esp-md5-hmac  (Tunnel),

    lifedur= 3600s and 4608000kb,

    spi= 0x8BCF9107(2345636103), conn_id= 0, keysize= 0, flags= 0x2

*Mar  1 04:49:25.302: IPSEC(initialize_sas): ,

  (key eng. msg.) OUTBOUND local= 12.1.1.2, remote= 12.1.1.1,

    local_proxy= 2.2.2.0/255.255.255.0/0/0 (type=4),

    remote_proxy= 1.1.1.0/255.255.255.0/0/0 (type=4),

    protocol= ESP, transform= esp-3des esp-md5-hmac  (Tunnel),

    lifedur= 3600s and 4608000kb,

    spi= 0x28D5DFB2(685105074), conn_id= 0, keysize= 0, flags= 0xA

*Mar  1 04:49:25.306: Crypto mapdb : proxy_match

        src addr     : 2.2.2.0

        dst addr     : 1.1.1.0

        protocol     : 0

        src port     : 0

        dst port     : 0

*Mar  1 04:49:25.306: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and 12.1.1.1

*Mar  1 04:49:25.306: IPSec: Flow_switching Allocated flow for sibling 8000000B

*Mar  1 04:49:25.310: IPSEC(policy_db_add_ident): src 2.2.2.0, dest 1.1.1.0, dest_port 0

 

*Mar  1 04:49:25.310: ISAKMP: Locking peer struct 0x64F66BC4, IPSEC refcount 2 for from create_transforms

*Mar  1 04:49:25.310: IPSEC(create_sa): sa created,

  (sa) sa_dest= 12.1.1.2, sa_proto= 50,

    sa_spi= 0x8BCF9107(2345636103),

    sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2003

*Mar  1 04:49:25.314: IPSEC(create_sa): sa created,

  (sa) sa_dest= 12.1.1.1, sa_proto= 50,

    sa_spi= 0x28D5DFB2(685105074),

    sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2002

*Mar  1 04:49:25.314: ISAKMP: Unlocking IPSEC struct 0x64F66BC4 from create_transforms, count 1

*Mar  1 04:49:25.374: ISAKMP (0:134217729): received packet from 12.1.1.1 dport 500 sport 500 Global (R) QM_IDLE     

*Mar  1 04:49:25.378: ISAKMP:(0:1:SW:1):deleting node 1812581365 error FALSE reason "QM done (await)"

*Mar  1 04:49:25.378: ISAKMP:(0:1:SW:1):Node 1812581365, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH

*Mar  1 04:49:25.382: ISAKMP:(0:1:SW:1):Old State = IKE_QM_R_QM2  New State = IKE_QM_PHASE2_COMPLETE

*Mar  1 04:49:25.382: IPSEC(key_engine): got a queue event with 1 kei messages

*Mar  1 04:49:25.386: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP

*Mar  1 04:49:25.386: IPSEC(key_engine_enable_outbound): enable SA with spi 685105074/50

5、报文抓取:【在R2E0/0抓取的报文】

主模式1-6个包,快速模式1-3个包

计算机生成了可选文字: 2,乙2222222 月土月土月上月土月上月土月山弓二月上 222222222 月上月土月上月土月上月土月上月土月上 33292018一05一18 33302018一05一18 33312018一05一18 33322018一05一18 33332018一05一18 33342018一05一18 33352018一05一18 33362018一05一18 33372018一05一18 14:08:39.500089 14:08:39.578225 14:08:39.656357 14:08:39.718863 14:08:39.781370 14:08:39.828250 14:08:39.875130 14:08:39.922015 14:08:39.973636 1.1.1 1.1.2 1.1.1 1.1.2 1.1.1 1.1.2 1.1.1 1.1.2 1.1.1 1.1.2 1.1.1 1.1.2 1.1.1 1.1.2 1.1.1 1.1.2 1.1.1 1.1.2 ISA舒IP ISA冷IP ISA舒勺P ISAKMP ISAK州P ISAKMP ISAK州P ISAKMP ISA舒IP 186IdentityProtection(Main而de) 146IdentityProtection(MainMode) 346IdentityProtection(Main而de) 346IdentityProtection(Main而de) 142IdentityProtection(Main州ode) 110IdentityProtection(Main而de) 214Quick而de 214Quick南de 102QuickMode

第一个报文SA内容:R1-R2交互crypto isakmp policy 10配置的加密,校验,DH组等参数。

计算机生成了可选文字: 》IKEAttribute(t=1,1=2):Encryption一Algorithm:3DES一CBC >IKEAttribute(t=2,1=2):Hash一Algorithm:SHA >IKEAttribute(t=4,1=2):Group一Description:Alternate1024一bit阳DPgroup >IKEAttribute(t=3,1=2):Authentication一Method:Pre一sharedkey ,IKEAttribute(t二11,1二2):Li下e一Type:Second、 >IKEAttribute(t=12,1=4):Life一Duration:86400

第二个报文SA内容:R2-R1,1-2个包中的这些信息一致

计算机生成了可选文字: ,IKEAttribute(t=1,1=2):Encryption一Algorithm:3DES一CBC 》IKEAttribute(t=2,1=2):Hash一Algorithm:SHA 》IKEAttribute(t=4,1=2):Group一Description:Alternate1024一bit阳DPgroup 'IKEAttribute(t=3,1=2):Authentication一Method:Pre一sharedkey IKEAttribute(t=11,1=2):Life一Type:Seconds IKEAttribute(t=12,1=4):Life一Duration:86400

第三个报文Key Exchange、Vendor ID【CISCO-UNITY;DPD;XAUTH】、NAT-Discovery:R1-R2,主要交互密钥资源,以便为5-6包提供安全算法所需密钥

计算机生成了可选文字: vPayload:KeyExchange NeXtpayload:Nonce ReserVed:00 Payloadlen琳h:132 KeyExchangeData: (4) (10 49CS212292d19fbd0C5e2f8d394bbSaSS日dobe日722ble81C。。。

第四个报文:R2-R1,格式内容和第三个报文一样

计算机生成了可选文字: vPayload:KeyExchange NeXtpayload:Nonce ReserVed:00 Payloadlen盯h:132 KeyExchangeData: (4) (10) 日2C0632Cfed98ebb70f1669df5f69672De06124C145C5726…

第五个报文:R1-R2,传递的是加密的数据,5-6报文都是在加密的环境中传输的

计算机生成了可选文字: InternetSecurityAssociationandKeyManagementProtocol InitiatorSPI:720370b202589b47 ResponderSPI:acfbeaee8781cc46 Nextpayload:Identification(5) Ve广Sion:1.0 Exchangetype:IdentityProtection(MainMode)(2) Flags:0x01 MessageID:0x00000000 Len琳h:100 EncryptedData(72bytes)

第六个报文:R2-R1

计算机生成了可选文字: InternetSecurityAssociationandKeyManagementProtocol InitiatorSPI:720370b202589b47 ResponderSPI:acfbeaee8781cc46 Nextpayload:Identification(5) Ve广Sion:1.0 Exchangetype:IdentityProtection(MainMode)(2) Flags:0x01 MessageID:0x00000000 Len旷h:68 EncryptedData(49bytes)

快速模式的1-3个报文【R1-R2R2-R1R1-R2

QM-1

计算机生成了可选文字: vInternetSecurityAssociationandKey州anagementProtocol InitiatorSPI:720370b202589b47 ResponderSPI:acfbeaee8781cc46 Nextpayioad:Hash(8) Ver5ion:1.0 Exchangetype:Quick州ode(32) Flags:0x01 Me55ageID:ox6c09cbfs Len酥h:172 EncryptedData(144bytes)

QM-2

计算机生成了可选文字: vInternetSecurityAssociationandKeyManagementProtocol InitiatorSPI:720370b202589b47 ResponderSPI:acfbeaee878lcc46 Nextpayload:Hash(8) Version:1.0 Exchangetype:QuickMode(32) Flags:oxol MessageID:ox6c09cbfs Len酥h:172 EncryptedData(144bytes)

QM-3

计算机生成了可选文字: ,InternetSecurityAssociationandKeyManagementProtocol Initi日torSPI:720370b202589b47 ResponderSPI:acfbeaee8781cc46 Nextpayload:Hash(8) Version:1.0 Exchangetype:Quick"ode(32) 、Flags:0x01 Me55ageID:OX6c09cbfS Length:60 EncryptedData(32bytes)

 

6、我们验证一下建立后的情况

R1#sho crypto engine connections active

 

  ID Interface            IP-Address      State  Algorithm           Encrypt  Decrypt

   2 Ethernet0/0          12.1.1.1        set    HMAC_SHA+3DES_56_C        0        0

2001 Ethernet0/0          12.1.1.1        set    3DES+MD5                  4        0

2004 Ethernet0/0          12.1.1.1        set    3DES+MD5                  0        4

 

R1#show crypto isakmp sa

dst             src             state          conn-id slot status

12.1.1.2        12.1.1.1        QM_IDLE              2    0 ACTIVE

 

R1#show crypto ipsec sa

 

interface: Ethernet0/0

    Crypto map tag: cisco, local addr 12.1.1.1

 

   protected vrf: (none)

   local  ident (addr/mask/prot/port): (1.1.1.0/255.255.255.0/0/0)

   remote ident (addr/mask/prot/port): (2.2.2.0/255.255.255.0/0/0)

   current_peer 12.1.1.2 port 500

     PERMIT, flags={origin_is_acl,}

    #pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4

    #pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4

    #pkts compressed: 0, #pkts decompressed: 0

    #pkts not compressed: 0, #pkts compr. failed: 0

    #pkts not decompressed: 0, #pkts decompress failed: 0

    #send errors 1, #recv errors 0

 

     local crypto endpt.: 12.1.1.1, remote crypto endpt.: 12.1.1.2

     path mtu 1500, ip mtu 1500, ip mtu idb Ethernet0/0

     current outbound spi: 0x50B82D9A(1354247578)

 

     inbound esp sas:

      spi: 0x777B0338(2004550456)

        transform: esp-3des esp-md5-hmac ,

        in use settings ={Tunnel, }

        conn id: 2004, flow_id: SW:4, crypto map: cisco

        sa timing: remaining key lifetime (k/sec): (4391758/3437)

        IV size: 8 bytes

        replay detection support: Y

        Status: ACTIVE

 

     inbound ah sas:

 

     inbound pcp sas:

 

     outbound esp sas:

      spi: 0x50B82D9A(1354247578)

        transform: esp-3des esp-md5-hmac ,

        in use settings ={Tunnel, }

        conn id: 2001, flow_id: SW:1, crypto map: cisco

        sa timing: remaining key lifetime (k/sec): (4391758/3436)

        IV size: 8 bytes

        replay detection support: Y

        Status: ACTIVE

 

     outbound ah sas:

 

     outbound pcp sas:

ACl匹配情况:

R1#sho access-lists                    

Extended IP access list nat

    10 deny ip 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255 (5 matches)

    20 permit ip any any (2 matches)

Extended IP access list vpn

    10 permit ip 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255 (9 matches)

可以ping公网上的地址:

R1#ping 12.1.1.2 so lo0

 

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 12.1.1.2, timeout is 2 seconds:

Packet sent with a source address of 1.1.1.1

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 16/22/32 ms

R1#sho acce

R1#sho access-l

R1#sho access-lists

Extended IP access list nat

    10 deny ip 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255 (5 matches)

    20 permit ip any any (3 matches) >>>>匹配了一个去做NAT

Extended IP access list vpn

    10 permit ip 1.1.1.0 0.0.0.255 2.2.2.0 0.0.0.255 (9 matches)

R1#sho

R1#show ip nat tr

R1#show ip nat translations

Pro Inside global      Inside local       Outside local      Outside global

icmp 12.1.1.1:23       1.1.1.1:23         12.1.1.2:23        12.1.1.2:23


猜你喜欢

转载自blog.51cto.com/momentsli/2117907