Date: Mon, 13 Jan 2003 16:40:58 -0200 From: "Daniel C. Sobral" <dcs@tcoip.com.br> To: Bob Bishop <rb@gid.co.uk> Cc: current@FreeBSD.ORG Subject: Re: FAST_IPSEC/racoon vs CISCO PIX anyone? Message-ID: <3E23083A.6060802@tcoip.com.br> In-Reply-To: <4.3.2.7.2.20030113120239.03397190@gid.co.uk> References: <4.3.2.7.2.20030113120239.03397190@gid.co.uk> <4.3.2.7.2.20030113120239.03397190@gid.co.uk> <4.3.2.7.2.20030113170059.033a0198@gid.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
Bob Bishop wrote:
> At 16:09 13/1/03, Daniel C. Sobral wrote:
>
> > Bob Bishop wrote:
> >
> >> Hi,
> >>
> >> Problems interworking this combination, with ESP tunnel. SA gets
> >> negotiated OK, but ESP packets get rejected by the PIX: it says "host
> >> not found a.b.c.d" where a.b.c.d is its own endpoint address, and sends
> >> "invalid SPI" back to our end, even thought the SPI on the rejected ESP
> >> packet is the one just negitiated.
> >>
> >> This is RC2, racoon-20021120a. FWIW the same problem occurs on 4.7 with
> >> 'ordinary' IPSEC too.
> >>
> >> Any suggestions? TIA
> >
> >
> > Well, this question can be silly, specially if you have already
> > established tunnels before, but... Did you negotiate a SA for each
> > direction?
>
>
> Yes, symmetrically. And we have done this stuff before (but not to a PIX).
Ok. Well, I don't _use_ Pix/Cisco, but we have some tunnels to both from
an isakmpd-based software.
Below is a configuration used on a Pix using site. "Remote" refers to
us, and Local to the Pix. Personally, I think some lines are rather
dubious. It's better to have _them_ initiate the tunnel negotiation, and
debug to see exactly what they are proposing. Any difference will cause
problem. The most common difference is Pix-users defining the
access-list of the tunnel just like the firewall rule. Since my side
only negotiates protocol IP, this cause problem, we the rules on their
side are for TCP tunnels, ICMP tunnels, etc. The first rule of the
access-list here doesn't seem strictly necessary, as long as there is a
rule enabling UDP port 500 and ESP between the gateways.
name <remote-ip> GatewayRemote
name <local-ip> GatewayLocal
access-list tunnel_specification permit ip host GatewayLocal host
GatewayRemote
access-list tunnel_specification permit ip host EndPointLocal host
EndPointRemote
isakmp enable outside (Is the the interface??? I don't know)
isakmp key SHAREDSECRET address GatewayRemote netmask 255.255.255.255
no-xauth no-config-mode
isakmp policy 20 authentication pre-shared
isakmp policy 20 encryption des
isakmp policy 20 hash sha
isakmp policy 20 group 2
isakmp policy 20 lifetime 864000
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address tunnel_specification
crypto map outside_map 20 set peer GatewayRemote
crypto map outside_map 20 set transform-set ESP-DES-SHA
crypto map outside_map 20 set security-association lifetime seconds 3600
kilobytes 4500
--
Daniel C. Sobral (8-DCS)
Gerencia de Operacoes
Divisao de Comunicacao de Dados
Coordenacao de Seguranca
TCO
Fones: 55-61-313-7654/Cel: 55-61-9618-0904
E-mail: Daniel.Capo@tco.net.br
Daniel.Sobral@tcoip.com.br
dcs@tcoip.com.br
Outros:
dcs@newsguy.com
dcs@freebsd.org
capo@notorious.bsdconspiracy.net
Men are superior to women.
-- The Koran
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3E23083A.6060802>
