2023年12月6日发(作者:爱谷雪)
联想网御防火墙和SecPath 100F实现IPsec互通
某项目测试中,遇到联想网御300防火墙和我司SECPATH 100F,进行IPSEC对接测试,测试中碰到一点问题,拿出来和大家分享。
组网:
组网说明:
PC机A的地址是192.168.1.100 网关地址192.168.1.254。PC机B的地址192.168.0.100,网关地址192.168.0.254。
SECPATH100F防火墙模拟中心节点设备,联想网御防火墙模拟分支节点设备。使用IPSEC野蛮模式进行互连。
故障现象:
两端配置一样 , IKE SA始终无法建立。
我司SECPATH配置情况:
IKE PROPOSA是3DES加密,MD5认证,使用野蛮模式:
ike proposal 1
encryption-algorithm 3des-cbc
dh group5
authentication-algorithm md5
sa duration 28800
ike peer lx
exchange-mode aggressive pre-shared-key 12345678
id-type name
remote-name lx
IPSEC PROPOSA都是 3DES加密,MD5认证:
ipsec proposal 1
esp encryption-algorithm 3des
查看IKE SA:
[huawei-ike-proposal-1]dis ike sa
connection-id peer flag phase doi
----------------------------------------------------------
7
IKE SA没有建立
提示错误信息
#Nov 12 10:15:22:992 2006 huawei IKEMONIT/5/No SA Failure:
No SA Failure
%Nov 12 10:15:22:992 2006 huawei IKE/4/DROP:
IKE packet dropped: (src addr: 10.1.5.253, dst addr: 10.1.5.254) with I_Cookie f5c9ae3bef83aa8a
and R_Cookie 0000, because of ' No proposal is chosen ' from payload
PROPOSAL.
联想WEB配置
联想“远程VPN”,对应我司的IKE PROPOSA:
联想“网关隧道配置”,对应我司IPSEC PROPOSA:
原理和解决方法:
打开debugging ike message查看IKE协商信息,发现如下提示:
*0.16938973 huawei IKE/8/DEBUG: Transform 0's attributes
*0.16938973 huawei IKE/8/DEBUG: Attribute LIFE_TYPE : SECONDS
*0.16938973 huawei IKE/8/DEBUG: Attribute LIFE_DURATION : 28800
*0.16938973 huawei IKE/8/DEBUG: Attribute ENCRYPTION_ALGORITHM : 3DES_CBC
*0.16938973 huawei IKE/8/DEBUG: Attribute HASH_ALGORITHM : SHA
*0.16938973 huawei IKE/8/DEBUG: Attribute AUTHENTICATION_METHOD : PRE_SHARED
*0.16938974 huawei IKE/8/DEBUG: Attribute GROUP_DESCRIPTION : MODP_1024
*0.16938974 huawei IKE/8/DEBUG:validate payload KEY_EXCH of message 844c6d64
*0.16938974 huawei IKE/8/DEBUG:validate payload ID of message 844c6d64
由上面信息可以看到联想实际发送过来的IKE PROPOSA验证算法是SHA,由此可以肯定联想设备的WEB设置和后台实际运行配置不一致,造成了和SECPATH 的IKE SA无法建立。
修改SECPATH 100F IKE PROPOSA 1 的验证算法为SHA。 联想默认发送过来的DH组是dh group2即10248-bit的Diffie-Hellman组,而SECPATH 100F上面配置的是dh group5(默认是dh group1),修改SECPATH 100F为dh group2。
查看IKE SA
[huawei]dis ike sa
connection-id peer flag phase doi
----------------------------------------------------------
198 10.1.5.254 RD 1 IPSEC
flag meaning
RD--READY ST--STAYALIVE RL--REPLACED FD--FADING TO--TIMEOUT
可以看到IKE SA 已经建立。
备注:
查看IKE SA VERBOSE信息如下:
[huawei]dis ike sa verbose
---------------------------------------------
connection id: 198
transmitting entity: responder
---------------------------------------------
local ip: 10.1.5.253
local id type: FQDN
local id: huawei
remote ip: 10.1.5.254
remote id type: FQDN
remote id: lx
authentication-method: PRE-SHARED-KEY
authentication-algorithm: HASH-SHA1 encryption-algorithm: 3DES-CBC
life duration(sec): 28800
remaining key duration(sec): 28193
exchange-mode: AGGRESSIVE
diffie-hellman group: GROUP2
nat traversal: NO
查看IPSEC 信息,已经全部建立起来:
[huawei]dis ipsec sa
===============================
Interface: Ethernet1/1
path MTU: 1500
===============================
-----------------------------
IPsec policy name: "1"
sequence number: 1
mode: isakmp
-----------------------------
Created by: "Host"
connection id: 4
encapsulation mode: tunnel
perfect forward secrecy: None
tunnel:
local address: 10.1.5.253
remote address: 10.1.5.254
flow: (5 times matched) sour addr: 192.168.1.0/255.255.255.0 port: 0 protocol: IP
dest addr: 192.168.0.0/255.255.255.0 port: 0 protocol: IP
[inbound ESP SAs]
spi: 3613558760 (0xd76287e8)
proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5
sa remaining key duration (bytes/sec): 1887436580/3574
max received sequence-number: 5
udp encapsulation used for nat traversal: N
[outbound ESP SAs]
spi: 903478232 (0x35d9fbd8)
proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5
sa remaining key duration (bytes/sec): 1887436800/3574
max sent sequence-number: 1
udp encapsulation used for nat traversal: N
[huawei]dis ipsec tunnel
------------------------------------------------
Connection ID : 4
Perfect forward secrecy: None
SA's SPI :
Inbound : 3613558760 (0xd76287e8) [ESP]
Outbound : 903478232 (0x35d9fbd8) [ESP]
Tunnel :
Local Address: 10.1.5.253 Remote Address : 10.1.5.254
Flow : (8 times matched)
Sour Addr : 192.168.1.0/255.255.255.0 Port: 0 Protocol : IP
Dest Addr : 192.168.0.0/255.255.255.0 Port: 0 Protocol : IP
2023年12月6日发(作者:爱谷雪)
联想网御防火墙和SecPath 100F实现IPsec互通
某项目测试中,遇到联想网御300防火墙和我司SECPATH 100F,进行IPSEC对接测试,测试中碰到一点问题,拿出来和大家分享。
组网:
组网说明:
PC机A的地址是192.168.1.100 网关地址192.168.1.254。PC机B的地址192.168.0.100,网关地址192.168.0.254。
SECPATH100F防火墙模拟中心节点设备,联想网御防火墙模拟分支节点设备。使用IPSEC野蛮模式进行互连。
故障现象:
两端配置一样 , IKE SA始终无法建立。
我司SECPATH配置情况:
IKE PROPOSA是3DES加密,MD5认证,使用野蛮模式:
ike proposal 1
encryption-algorithm 3des-cbc
dh group5
authentication-algorithm md5
sa duration 28800
ike peer lx
exchange-mode aggressive pre-shared-key 12345678
id-type name
remote-name lx
IPSEC PROPOSA都是 3DES加密,MD5认证:
ipsec proposal 1
esp encryption-algorithm 3des
查看IKE SA:
[huawei-ike-proposal-1]dis ike sa
connection-id peer flag phase doi
----------------------------------------------------------
7
IKE SA没有建立
提示错误信息
#Nov 12 10:15:22:992 2006 huawei IKEMONIT/5/No SA Failure:
No SA Failure
%Nov 12 10:15:22:992 2006 huawei IKE/4/DROP:
IKE packet dropped: (src addr: 10.1.5.253, dst addr: 10.1.5.254) with I_Cookie f5c9ae3bef83aa8a
and R_Cookie 0000, because of ' No proposal is chosen ' from payload
PROPOSAL.
联想WEB配置
联想“远程VPN”,对应我司的IKE PROPOSA:
联想“网关隧道配置”,对应我司IPSEC PROPOSA:
原理和解决方法:
打开debugging ike message查看IKE协商信息,发现如下提示:
*0.16938973 huawei IKE/8/DEBUG: Transform 0's attributes
*0.16938973 huawei IKE/8/DEBUG: Attribute LIFE_TYPE : SECONDS
*0.16938973 huawei IKE/8/DEBUG: Attribute LIFE_DURATION : 28800
*0.16938973 huawei IKE/8/DEBUG: Attribute ENCRYPTION_ALGORITHM : 3DES_CBC
*0.16938973 huawei IKE/8/DEBUG: Attribute HASH_ALGORITHM : SHA
*0.16938973 huawei IKE/8/DEBUG: Attribute AUTHENTICATION_METHOD : PRE_SHARED
*0.16938974 huawei IKE/8/DEBUG: Attribute GROUP_DESCRIPTION : MODP_1024
*0.16938974 huawei IKE/8/DEBUG:validate payload KEY_EXCH of message 844c6d64
*0.16938974 huawei IKE/8/DEBUG:validate payload ID of message 844c6d64
由上面信息可以看到联想实际发送过来的IKE PROPOSA验证算法是SHA,由此可以肯定联想设备的WEB设置和后台实际运行配置不一致,造成了和SECPATH 的IKE SA无法建立。
修改SECPATH 100F IKE PROPOSA 1 的验证算法为SHA。 联想默认发送过来的DH组是dh group2即10248-bit的Diffie-Hellman组,而SECPATH 100F上面配置的是dh group5(默认是dh group1),修改SECPATH 100F为dh group2。
查看IKE SA
[huawei]dis ike sa
connection-id peer flag phase doi
----------------------------------------------------------
198 10.1.5.254 RD 1 IPSEC
flag meaning
RD--READY ST--STAYALIVE RL--REPLACED FD--FADING TO--TIMEOUT
可以看到IKE SA 已经建立。
备注:
查看IKE SA VERBOSE信息如下:
[huawei]dis ike sa verbose
---------------------------------------------
connection id: 198
transmitting entity: responder
---------------------------------------------
local ip: 10.1.5.253
local id type: FQDN
local id: huawei
remote ip: 10.1.5.254
remote id type: FQDN
remote id: lx
authentication-method: PRE-SHARED-KEY
authentication-algorithm: HASH-SHA1 encryption-algorithm: 3DES-CBC
life duration(sec): 28800
remaining key duration(sec): 28193
exchange-mode: AGGRESSIVE
diffie-hellman group: GROUP2
nat traversal: NO
查看IPSEC 信息,已经全部建立起来:
[huawei]dis ipsec sa
===============================
Interface: Ethernet1/1
path MTU: 1500
===============================
-----------------------------
IPsec policy name: "1"
sequence number: 1
mode: isakmp
-----------------------------
Created by: "Host"
connection id: 4
encapsulation mode: tunnel
perfect forward secrecy: None
tunnel:
local address: 10.1.5.253
remote address: 10.1.5.254
flow: (5 times matched) sour addr: 192.168.1.0/255.255.255.0 port: 0 protocol: IP
dest addr: 192.168.0.0/255.255.255.0 port: 0 protocol: IP
[inbound ESP SAs]
spi: 3613558760 (0xd76287e8)
proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5
sa remaining key duration (bytes/sec): 1887436580/3574
max received sequence-number: 5
udp encapsulation used for nat traversal: N
[outbound ESP SAs]
spi: 903478232 (0x35d9fbd8)
proposal: ESP-ENCRYPT-3DES ESP-AUTH-MD5
sa remaining key duration (bytes/sec): 1887436800/3574
max sent sequence-number: 1
udp encapsulation used for nat traversal: N
[huawei]dis ipsec tunnel
------------------------------------------------
Connection ID : 4
Perfect forward secrecy: None
SA's SPI :
Inbound : 3613558760 (0xd76287e8) [ESP]
Outbound : 903478232 (0x35d9fbd8) [ESP]
Tunnel :
Local Address: 10.1.5.253 Remote Address : 10.1.5.254
Flow : (8 times matched)
Sour Addr : 192.168.1.0/255.255.255.0 Port: 0 Protocol : IP
Dest Addr : 192.168.0.0/255.255.255.0 Port: 0 Protocol : IP