>Can you post your IPsec configs and ifconfig -a to the list also,
>including whether you configured IPsec tunnel policy with ipsecconf or
>the old school ifconfig.
Not sure about the old school way. I created the hostname.iptun0- and the
ipsecinit.conf file.
Since Juniper support asked me to reduce the Tunnel-IPS to /32, I added
192.168.100.2 255.255.255.255 to /etc/netmasks, but a
svcadm restart svc:/network/physical:default
then showed the netmask for tun0 as /24, so I manually ran
ifconfig ip.tun0 192.168.100.2/32
to get the mask right:
r...@kunde003-wan:~# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232
index 1
inet 127.0.0.1 netmask ff000000
dmz103001: flags=201100843<UP,BROADCAST,RUNNING,MULTICAST,ROUTER,IPv4,CoS> mtu
1500 index 2
inet 82.100.231.233 netmask fffffff8 broadcast 82.100.231.239
ether 0:21:28:75:b9:4c
ip.tun0: flags=11008d1<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST,ROUTER,IPv4> mtu
1480 index 3
inet tunnel src 213.172.123.138 tunnel dst 82.100.214.138
tunnel security settings --> use 'ipsecconf -ln -i ip.tun0'
tunnel hop limit 60
inet 192.168.100.2 --> 192.168.100.1 netmask ffffffff
ip.tun1:
flags=11028d1<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST,UNNUMBERED,ROUTER,IPv4>
mtu 1480 index 4
inet tunnel src 213.172.123.138 tunnel dst 82.102.214.138
tunnel security settings --> use 'ipsecconf -ln -i ip.tun1'
tunnel hop limit 60
inet 82.100.231.233 --> 103.0.0.33 netmask fffffff8
wan3001:
flags=201108843<UP,BROADCAST,RUNNING,MULTICAST,PRIVATE,ROUTER,IPv4,CoS> mtu
1500 index 5
inet 213.172.123.138 netmask fffffff8 broadcast 213.172.123.143
ether 0:21:28:75:b9:4b
lo0: flags=2002000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv6,VIRTUAL> mtu 8252
index 1
inet6 ::1/128
r...@kunde003-wan:~# cat /etc/hostname.ip.tun0
192.168.100.2 192.168.100.1 tsrc 213.172.123.138 tdst 82.100.214.138 router up
r...@kunde003-wan:~# cat /etc/inet/ipsecinit.conf
{tunnel ip.tun0 negotiate tunnel laddr 0.0.0.0/0 raddr 192.168.100.0/30} ipsec
{encr_algs 3des encr_auth_algs sha1 sa shared}
{tunnel ip.tun1 negotiate tunnel laddr 0.0.0.0/0 raddr 103.0.0.0/24} ipsec
{encr_algs 3des encr_auth_algs sha1 sa shared}
The current config doesn't reflect my actual requirement (i.e. reaching the LAN
120.0.0.0/24 behind the remote router).
For now I'm concerned to get OSPF working, hence I tailored the ipsec config to
guarantee reachability between the tunnel interfaces.
Would you need any additional configs / command outputs / debugs?
Thanks for giving it a shot,
Kai
_______________________________________________
networking-discuss mailing list
[email protected]