[c-nsp] freeswan + pix possible routing problem

Horváth Szabolcs Szabolcs.Horvath at integris.hu
Tue Jun 7 08:35:13 EDT 2005


Hello,

 

We're trying to setup a freeswan<->pix vpn connection in our test lab.

 

000 "bb":
10.240.2.0/24===10.240.7.1---10.240.7.2...10.240.8.2===10.240.9.0/24;
erouted; eroute owner: #2

000 "bb":   newest ISAKMP SA: #3; newest IPsec SA: #2;

000

000 #3: "bb" STATE_MAIN_R3 (sent MR3, ISAKMP SA established);
EVENT_SA_REPLACE in 447s; newest ISAKMP

000 #2: "bb" STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 25904s; newest IPSEC; eroute owner

000 #2: "bb" used 30s ago; esp.b6d27588 at 10.240.8.2 esp.f99b3f6b at 10.240.7.1
tun.1002 at 10.240.8.2 tun.1001 at 10.240.7.1

 

The connection is alive, the above output is from FreeSwan (10.240.7.1).

 

The participiants:

10.240.2.0/24: left subnet

10.240.7.1: FreeSwan

10.240.7.2 - 10.240.8.2: cisco 1601 series router

10.240.8.2: PIX 515

10.240.9.0/24: right subnet

 

When I'm trying to ping 10.240.2.5 to 10.240.9.5 through the VPN, the ping
sent, but the echo reply doesn't received.

On the pix I see (debug icmp trace):

1193: ICMP echo-request from inside:10.240.2.5 to 10.240.9.5 ID=29717
seq=2560 length=44

1194: ICMP echo-reply from outside:10.240.9.5 to 10.240.2.5 ID=29717
seq=2560 length=44

 

But the ethernet1 interface output counter (which mean the PIX send the
reply back to 10.240.2.5) doesn't grow.

I think the PIX doesn't know how to route back to 10.240.2.0/24. (But it is
impossible, because the VPN has been set up).

 

If I sniff the traffic, and I see the same thing: on the freeswan switchport
only the number of input packets is growing (echo-request), the output
packets doesn't change (echo-reply couldn't routed back). Why?

 

# show crypto isakmp sa

Total     : 1

Embryonic : 0

        dst               src        state     pending     created

      10.240.7.1       10.240.8.2    QM_IDLE         0           0

 

# show crypto ipsec sa

[...output cut...]

interface: inside

    Crypto map tag: mymap, local addr. 10.240.8.2

 

   local  ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)

   remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)

   current_peer: 10.240.7.1:0

       local crypto endpt.: 10.240.8.2, remote crypto endpt.: 10.240.7.1

     path mtu 1500, ipsec overhead 0, media mtu 1500

     current outbound spi: 0

 

    local  ident (addr/mask/prot/port): (10.240.9.0/255.255.255.0/0/0)

   remote ident (addr/mask/prot/port): (10.240.2.0/255.255.255.0/0/0)

   current_peer: 10.240.7.1:500

 

 

PIX configuration:

 

interface ethernet0 100full

interface ethernet1 100full

nameif ethernet0 outside security0

nameif ethernet1 inside security100

access-list nofw permit ip any any

mtu outside 1500

mtu inside 1500

ip address outside 10.240.9.1 255.255.255.0  # the pix-vpnusers subnet

ip address inside 10.240.8.2 255.255.255.0    # the pix-router subnet

nat (inside) 0 access-list nofw

access-group nofw in interface outside

access-group nofw in interface inside

route inside 10.240.7.0 255.255.255.0 10.240.8.1 1

crypto ipsec transform-set 3des-sha1 esp-3des esp-sha-hmac

crypto map mymap 10 ipsec-isakmp

crypto map mymap 10 match address nofw

crypto map mymap 10 set peer 10.240.7.1

crypto map mymap 10 set transform-set 3des-sha1

crypto map mymap interface inside

isakmp enable inside

isakmp key ******** address 10.240.7.1 netmask 255.255.255.255 no-xauth
no-config-mode

isakmp identity address

isakmp policy 1 authentication pre-share

isakmp policy 1 encryption 3des

isakmp policy 1 hash md5

isakmp policy 1 group 2

isakmp policy 1 lifetime 1000

 

If you have any idea, please tell me.

Thank you very much.

 

 

Szabolcs Horvath

 



More information about the cisco-nsp mailing list