两个路由建立了 ipsec 隧道,但是两个 lan 之间 ping 不通,谁能帮我看一下 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
willamtang
V2EX    路由器

两个路由建立了 ipsec 隧道,但是两个 lan 之间 ping 不通,谁能帮我看一下

  •  
  •   willamtang 2015-03-11 10:11:25 +08:00 6546 次点击
    这是一个创建于 3867 天前的主题,其中的信息可能已经有所发展或是发生改变。

    拓扑
    192.168.10.x---1.1.1.1-----internet------2.2.2.2-----10.2.1.x

    两个路由建立了ipsec隧道,显示remote peer也都连上了,就是ping不通。
    NAT的accept也加上了。
    谁能帮我看看里还有问题。谢谢。
    Route1

    [admin@R_Shanghai] > ip ipsec peer print Flags: X - disabled, D - dynamic 0 address=1.1.1.1/32 local-address=0.0.0.0 passive=no port=500 auth-method=pre-shared-key secret="***" generate-policy=no policy-template-group=default exchange-mode=main send-initial-cOntact=yes nat-traversal=yes proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=2m dpd-maximum-failures=5 [admin@R_Shanghai] > ip ipsec policy print Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes 1 src-address=10.2.1.0/24 src-port=any dst-address=192.168.10.0/24 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=2.2.2.2 sa-dst-address=1.1.1.1 proposal=default priority=0 [admin@R_Shanghai] > ip ipsec remote-peers print 0 local-address=2.2.2.2 remote-address=1.1.1.1 state=established side=responder established=49m11s [admin@R_Shanghai] > ip firewall nat print Flags: X - disabled, I - invalid, D - dynamic 0 chain=srcnat action=accept src-address=192.168.10.0/24 dst-address=10.2.1.0/24 log=no log-prefix="" [admin@R_Shanghai] > ping 192.168.10.1 src-address=10.2.1.1 SEQ HOST SIZE TTL TIME STATUS 0 192.168.10.1 timeout 1 192.168.10.1 timeout 2 192.168.10.1 timeout sent=3 received=0 packet-loss=100% 

    Route2

    [admin@R_Beijing] > ip ipsec peer print Flags: X - disabled, D - dynamic 0 address=2.2.2.2/32 local-address=0.0.0.0 passive=no port=500 auth-method=pre-shared-key secret="***" generate-policy=no policy-template-group=default exchange-mode=main send-initial-cOntact=yes nat-traversal=yes proposal-check=obey hash-algorithm=sha1 enc-algorithm=3des,aes-128 dh-group=modp1024 lifetime=1d lifebytes=0 dpd-interval=2m dpd-maximum-failures=5 [admin@R_Beijing] > ip ipsec policy print Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default 0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes 1 src-address=192.168.10.0/24 src-port=any dst-address=10.2.1.0/24 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes sa-src-address=1.1.1.1 sa-dst-address=2.2.2.2 proposal=default priority=0 [admin@R_Beijing] > ip ipsec remote-peers print 0 local-address=1.1.1.1 remote-address=2.2.2.2 state=established side=responder established=54m23s [admin@R_Beijing] > ip firewall nat print Flags: X - disabled, I - invalid, D - dynamic 0 chain=srcnat action=accept src-address=10.2.1.0/24 dst-address=192.168.10.0/24 log=no log-prefix="" 1 X chain=srcnat action=masquerade log=no log-prefix="" [admin@R_Beijing] > ping 10.2.1.1 src-address=192.168.10.1 SEQ HOST SIZE TTL TIME STATUS 0 10.2.1.1 timeout 1 10.2.1.1 timeout 2 10.2.1.1 timeout sent=3 received=0 packet-loss=100% 
    9 条回复    2015-04-09 11:30:14 +08:00
    linchanx
        1
    linchanx  
       2015-03-11 10:16:18 +08:00   1
    你的对接地址都不在同一个网段 怎么通? 一边是1.1.1.1 另外一边是2.2.2.2 。还用的32位。
    bellchu
        2
    bellchu  
       2015-03-11 10:51:13 +08:00   1
    看src-address和dst-address都是内网地址,应该是nat做错了

    另外需要指定路由192.168.10.0/24的走2.2.2.2的Interface,10.2.1.0/24的走1.1.1.1的Interface才可以用ping 10.2.1.1 src-address=192.168.10.1和 ping 192.168.10.1 src-address=10.2.1.1的命令ping,不然路由器不知道如何选路,因为路由表内没有相应记录

    PS:mikrotik routeros的设备我没配过(应该是吧?)
    willamtang
        3
    willamtang  
    OP
       2015-03-11 11:33:59 +08:00
    @linchanx 真实对接地址是两个公网地址,我改成示例地址了。
    willamtang
        4
    willamtang  
    OP
       2015-03-11 11:49:39 +08:00
    @bellchu 呃,nat的action用的accept不应该两边都是内网地址么?
    直接路由制定2.2.2.2的话好像不能激活路由记录。制定wan口的时候可以激活但是却不通。
    bellchu
        5
    bellchu  
       2015-03-11 12:06:50 +08:00   1
    @willamtang nat默认不就是accept么?不要和firewall的action混淆起来。虽然我对mikrotik不了解,只看过它的文档和几个视频。但是nat不就是inside和outside的一个translation么,不可能是两个不同网段的inside interface互相translate的,不然的话这既不是source nat又不是destination nat

    你如果目的只是要两边lan互通的话,把nat去掉,直接写路由就OK了。
    invite
        6
    invite  
       2015-03-11 14:41:22 +08:00
    这型号路由器没见过。
    willamtang
        7
    willamtang  
    OP
       2015-03-11 15:37:08 +08:00
    @bellchu 现在加的nat rule 不是给ipsec的tunnel用么?
    WuDao
        8
    WuDao  
       2015-03-12 14:09:28 +08:00   1
    不懂路过,纯帮顶……
    willamtang
        9
    willamtang  
    OP
       2015-04-09 11:30:14 +08:00
    问题解决了,配置本身没啥问题,问题在中间的防火墙没有打开500端口。。。
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     2466 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 26ms UTC 01:45 PVG 09:45 LAX 18:45 JFK 21:45
    Do have faith in what you're doing.
    ubao snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86