我正在尝试在 Cisco 路由器和 Linux 路由器之间创建 GRE/IPsec 隧道。隧道已启动并处于活动状态,但是当我在 Cisco 路由器上执行“显示加密会话”时,活动 SA 不断增加并达到 2800 的限制,然后再次重新启动。IPsec SPI 已重新设置密钥并在两侧不断增加。Phase1(86400 秒)和 Phase2(3600 秒)的生命周期,双方的策略也相同。在配置方面,我是否缺少任何重新生成密钥的参数。我错过了什么?对我来说似乎是一个小的参数变化?请在 Cisco & Linux 路由器上找到以下配置:
思科 2901
crypto isakmp policy 20
encr aes 256
authentication pre-share
group 2
crypto isakmp key PASS address 192.168.12.192
crypto isakmp invalid-spi-recovery
crypto isakmp keepalive 10 4 periodic
!
!
crypto ipsec transform-set AES esp-aes 256 esp-sha-hmac
mode transport
!
!
!
crypto map remote-sites 20 ipsec-isakmp
set peer 192.168.12.192
set transform-set AES
match address 100
!
!
!
!
!
interface Loopback120
ip address 12.12.12.12 255.255.255.0
!
interface Tunnel0
ip address 10.10.10.1 255.255.255.252
tunnel source 192.168.12.10
tunnel destination 192.168.12.192
!
interface Embedded-Service-Engine0/0
no ip address
!
interface GigabitEthernet0/0
ip address 192.168.12.10 255.255.255.0
duplex auto
speed auto
crypto map remote-sites
!
!
!
ip forward-protocol nd
!
!
ip route 0.0.0.0 0.0.0.0 192.168.12.1
!
access-list 100 permit gre host 192.168.12.10 host 192.168.12.192
Linux 路由器
en01
ipaddress 192.168.12.192/24
interface up
gre12
ipaddress 10.10.10.2 peer 10.10.10.1
tunnel 192.168.12.192 192.168.12.10
key disable
checksum disable
interface up
exit
loopback12
ipaddress 14.14.14.14/24
sec
ipsec enable
psk 192.168.12.10 PASS
vpn-template VZN 1 main aes256 sha1 24 hour 2 pre-shared-key address aes256 hmac-sha1 1 hour none
vpn TESTVPN VZN 192.168.12.192 192.168.12.10
ipsec-rule TESTVPN-rule 192.168.12.192 192.168.12.10 47 esp transport TESTVPN
如果我错过了分享一些重要的东西,请告诉我。