Openswan-Sonicwall VPN 隧道

网络工程 虚拟专用网 音墙
2021-07-07 19:39:58

我一直试图弄清楚这一点,但我能找到的所有文档似乎都很旧。感觉似乎是,一旦戴尔收购了 Sonicwall,文档就变得稀少而且几乎毫无用处。由于一些谷歌搜索让我进入了一些对话,看起来人们最近在做这种事情并且知道他们在做什么,所以最终来到了 StackExchange。

这是我用作参考的主要文档,但正如您所看到的,它可以追溯到 2006 年,适用于 SonicOS 增强版 3。SonicwallOS 增强到 Openswan Linux,使用 GroupVPN 和 XAUTH

这里的环境

Sonicwall(SonicOS 增强版 5.9.0.2) - 互联网 - Netgear 路由器 - Cisco 集成商业路由器,881 系列(在 Netgear 路由器的 DMZ 中) - 运行 Openswan 的 Ubuntu 14.04。

Sonicwall 上的 LAN 子网:192.168.0.0/23
Cisco 后面的LAN :192.168.100.0/24
Ubuntu 私有 IP:192.168.100.25

那么我该从哪里开始呢?我按照该 PDF 中的描述配置了 ipsec.conf 文件:

conn TSBackup
    left=192.168.100.25
    leftsubnet=192.168.100.25/32
    leftnexthop=%defaultroute
    right=12.69.113.194
    rightsubnet=192.168.0.0/23
    rightnexthop=192.168.0.1
    rightid=@0017C568BE38
    auto=add
    authby=secret
    keyingtries=3
    pfs=no
    ike=3des-sha1;modp1024!
    esp=3des-sha1

在 Sonicwall 上,有一个使用以下设置定义的站点到站点:

Policy type: Site to site
Auth method: IKE using Preshared Secret
IPsec Primary gateway: (public IP of Ubuntu server)
Local IKE ID: (Sonicwall's ID)
Peer IKE ID: ubuntuid
Local network: Lan Subnets
Remote Network: (Address object, pointing to Ubuntu's private address 192.168.100.25)
Phase 1: Main Mode, Group 2, 3DES-Sha1 28800
Phase 2: ESP, 3DES, SHA1, perfect forward secret not checked,28800
Enable Keep alive
Dead peer detection: 180, 3
VPN policy bound to Zone WAN

我什至不知道去哪里寻找日志。我也重新开始了,想也许我在某个地方搞砸了。非常感谢任何帮助或建议,我很抱歉在这一切中保持绿色。

启动连接时的结果:

104 "TSBackup" #1: STATE_MAIN_I1: initiate
003 "TSBackup" #1: ignoring unknown Vendor ID payload [5b362bc820f60008]
003 "TSBackup" #1: received Vendor ID payload [RFC 3947] method set to=115
106 "TSBackup" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "TSBackup" #1: ignoring Vendor ID payload [Sonicwall 1 (TZ 170 Standard?)]
003 "TSBackup" #1: received Vendor ID payload [XAUTH]
003 "TSBackup" #1: received Vendor ID payload [Dead Peer Detection]
003 "TSBackup" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): i am NATed
108 "TSBackup" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "TSBackup" #1: next payload type of ISAKMP Hash Payload has an unknown value: 175
003 "TSBackup" #1: malformed payload in packet
010 "TSBackup" #1: STATE_MAIN_I3: retransmission; will wait 20s for response
003 "TSBackup" #1: ignoring informational payload, type INVALID_COOKIE msgid=00000000
003 "TSBackup" #1: received and ignored informational message

ipsec barf @ Pastebin

编辑:更新了 ipsec.conf 和 SonicWall 设置。添加了打开连接的结果。

编辑 2:添加了 ipsec barf 的链接。

0个回答
没有发现任何回复~