Bonjour,
Je rencontre des problemes dans la configuration de VPN entre des IPCOP qui se trouvent derriere des routeurs.
Les VPNs montent de maniere aleatoire.
Lorsque les VPNs ne montent pas, les logs ipcop donnent:
13:45:17 pluto[525] packet from X.X.X.X:4500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
13:45:17 pluto[525] packet from X.X.X.X:4500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
13:45:17 pluto[525] packet from X.X.X.X:4500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
13:45:17 pluto[525] packet from X.X.X.X:4500: received Vendor ID payload [Dead Peer Detection]
13:45:17 pluto[525] packet from X.X.X.X:4500: initial Main Mode message received on 10.1.1.2:4500 but no connection has been authorized with policy=RSASIG
De temps en temps les VPNS Montent correctement
ipsec.conf IPCOP 1
config setup
interfaces=%defaultroute
klipsdebug=none
plutodebug=none
plutoload=%search
plutostart=%search
uniqueids=yes
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!10.0.4.0/255.255.255.0,%v4:!10.0.2.0/255.255
.255.0
conn %default
keyingtries=0
disablearrivalcheck=no
conn paris
left=192.168.0.2
leftnexthop=%defaultroute
leftsubnet=10.0.4.0/255.255.255.0
leftcert=/var/ipcop/certs/hostcert.pem
right=X.X.X.X
rightsubnet=10.0.2.0/255.255.255.0
rightnexthop=%defaultroute
rightcert=/var/ipcop/certs/pariscert.pem
ike=aes256-sha-modp1536,aes256-sha-modp1024,aes256-md5-modp1536,aes256-md5-modp1024,aes128-sha-modp1536,aes128-sha-mo
dp1024,aes128-md5-modp1536,aes128-md5-modp1024
esp=aes256-sha1,aes256-md5,aes128-sha1,aes128-md5
ikelifetime=1h
keylife=8h
dpddelay=30
dpdtimeout=120
dpdaction=hold
authby=rsasig
auto=start
ipsec.conf IPCOP2
config setup
interfaces=%defaultroute
klipsdebug=none
plutodebug=none
plutoload=%search
plutostart=%search
uniqueids=yes
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!10.0.2.0/255.255.255.0,%v4:!10.0.4.0/255.255
.255.0,%v4:!10.0.3.0/255.255.255.0
conn %default
keyingtries=0
disablearrivalcheck=no
conn fontenay
right=10.1.1.2
rightsubnet=10.0.2.0/255.255.255.0
rightnexthop=%defaultroute
rightcert=/var/ipcop/certs/hostcert.pem
left=X.X.X.X
leftsubnet=10.0.4.0/255.255.255.0
leftnexthop=%defaultroute
leftcert=/var/ipcop/certs/fontenaycert.pem
ike=aes256-sha-modp1536,aes256-sha-modp1024,aes256-md5-modp1536,aes256-md5-modp1024,aes128-sha-modp1536,aes128-sha-mo
dp1024,aes128-md5-modp1536,aes128-md5-modp1024
esp=aes256-sha1,aes256-md5,aes128-sha1,aes128-md5
ikelifetime=1h
keylife=8h
dpddelay=30
dpdtimeout=120
dpdaction=hold
authby=rsasig
auto=start
L'architecture est la suivante:
LAN1--IPCOP1--ROUTEUR1 -----------ROUTEUR2--IPCOP2--LAN2
LAN1:10.0.2.0/24
WAN IPCOP1:10.1.1.2
WAN IPCOP2:192.168.0.2
LAN2:10.0.4.0/24
Les routeurs ont des adresses IP fixes et j'ai ouvert tous les ports sur chaque routeurs et nater l'ensemble des ports sur l'adresse WAN des Ipcops
J'esperes avoir été clair
Merci d'avance
CEN