Ho fatto qualche passo avanti e mi sono un attimo chiarito le idee, ma continuo ad avere problemi nel realizzare un tunnel ipsec da e verso la nostra filiale.
La situazione:
- router in sede Cisco SR520 (192.168.0.3)
- adsl in sede Business Telecom con 6 indirizzi ip (classe 255.255.255.248)
- router in filiale Zyxel 661H (172.24.1.113)
- adsl in filiale uguale a quella in sede
- lo Zyxel è configurato con il primo ip statico disponibile nella sottorete, l'ip punto-punto non viene utilizzato
- il Cisco invece (come vedrete) utilizza il punto-punto fornito da telecom sulla ATM0.1, mentre natta la rete locale con il primo ip statico disponibile
Il massimo che sono riuscito a fare, per ora, è tirare su il tunnel e far pingare (ma solo dal cisco) la sottorete della filiale.
Quindi il tunnel ipsec presumo sia corretto.
Riesco ad accedere (ma solo dal cisco) a tutti gli apparati in filiale, se provo da un pc che ha come default gateway il cisco, non funziona.
Immagino che sia un problema o di NAT oppure di "tunnel source" che è impostato come ip pubblico del router, però anche se provo a mettere "tunnel source VLAN1" si comporta esattamente nello stesso modo.
(si capisce che non ne so una mazza di ios?

La configurazione:
Codice: Seleziona tutto
Current configuration : 7857 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SR520
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
no logging buffered
enable secret 5
!
no aaa new-model
clock timezone PCTime 1
clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00
!
crypto pki trustpoint TP-self-signed-3423622799
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3423622799
revocation-check none
rsakeypair TP-self-signed-3423622799
!
!
crypto pki certificate chain TP-self-signed-3423622799
certificate self-signed 01
3082023D 308201A6 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33343233 36323237 3939301E 170D3032 30353133 30383032
34395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34323336
32323739 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100E9A6 E76B8424 7445BF4E 358DAC91 F08A89CF 66D9CADE C1C019C3 B2676666
0B27CE1D B1A09F7B 619402F1 96DD1810 93792CC3 CD36B7CE 6E138A7C EA25EEC0
B187F065 CA415F1B 02A975BA A300B55D 90B4929E A86D8A9B E3DDF25F 3FC814AC
90138831 6D538BCB 318AD86D 28EBD90C F04E12F7 7846E48B 94FA72E6 E7DC55DA
9DED0203 010001A3 65306330 0F060355 1D130101 FF040530 030101FF 30100603
551D1104 09300782 05535235 3230301F 0603551D 23041830 168014D7 7060E2C0
69923857 BDCBD22A CB5D6716 812EEA30 1D060355 1D0E0416 0414D770 60E2C069
923857BD CBD22ACB 5D671681 2EEA300D 06092A86 4886F70D 01010405 00038181
000845E7 674FF470 B9D275E2 C41C79AA A84C6A1B 215F768C 6D7C1483 767DCEB8
53DDAAC1 710CDABF 6ABF61AF 88BC2610 7AC54F24 1B46E0D4 9271E13E 0A5CC155
B1869E1C 1203947C 470DBB1A 1F52C724 5C10B7EE 9997A946 AD268AD5 11019988
2D54188F 8857D80F 5D0B8DA7 962CC1BB CE5AD275 EED771EF 414720EC 82694C8A 89
quit
dot11 syslog
ip source-route
!
!
!
!
ip cef
ip name-server 151.99.125.3
ip name-server 8.8.8.8
!
no ipv6 cef
multilink bundle-name authenticated
!
!
username admin privilege 15 secret 5
!
!
crypto isakmp policy 1
hash md5
authentication pre-share
!
crypto isakmp policy 3
encr 3des
authentication pre-share
group 2
crypto isakmp key <presharedkey> address fil.fil.fil.fil no-xauth
crypto isakmp aggressive-mode disable
!
!
crypto ipsec transform-set Zyxel esp-des esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Brescia
set peer fil.fil.fil.fil
set transform-set Zyxel
match address 101
!
archive
log config
logging enable
logging size 600
hidekeys
!
!
!
class-map type inspect match-any SDM-Voice-permit
match protocol h323
match protocol skinny
match protocol sip
class-map type inspect match-any sdm-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-any sdm-cls-insp-traffic
match protocol cuseeme
match protocol dns
match protocol ftp
match protocol h323
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp extended
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all sdm-invalid-src
match access-group 100
class-map type inspect match-all sdm-protocol-http
match protocol http
!
!
policy-map type inspect sdm-permit-icmpreply
class type inspect sdm-cls-icmp-access
inspect
class class-default
pass
policy-map type inspect sdm-inspect
class type inspect sdm-invalid-src
drop log
class type inspect sdm-cls-insp-traffic
inspect
class type inspect sdm-protocol-http
inspect
class type inspect SDM-Voice-permit
pass
class class-default
pass
policy-map type inspect sdm-inspect-voip-in
class type inspect SDM-Voice-permit
pass
class class-default
drop
policy-map type inspect sdm-permit
class class-default
drop
!
zone security out-zone
zone security in-zone
zone-pair security sdm-zp-self-out source self destination out-zone
service-policy type inspect sdm-permit-icmpreply
zone-pair security sdm-zp-out-self source out-zone destination self
service-policy type inspect sdm-permit
zone-pair security sdm-zp-in-out source in-zone destination out-zone
service-policy type inspect sdm-inspect
zone-pair security sdm-zp-out-in source out-zone destination in-zone
service-policy type inspect sdm-inspect-voip-in
!
!
!
interface Tunnel0
ip unnumbered Vlan1
ip virtual-reassembly
tunnel source sed.sed.sed.sed
tunnel destination fil.fil.fil.fil
tunnel mode ipip
crypto map SDM_CMAP_1
!
interface ATM0
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
ip address pp.pp.pp.pp 255.255.255.252
ip verify unicast reverse-path
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside
ip virtual-reassembly
no ip mroute-cache
snmp trap ip verify drop-rate
pvc 8/35
oam-pvc manage
oam retry 5 5 1
encapsulation aal5snap
!
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Vlan1
description LAN 192.168.0.0/24
ip address 192.168.0.3 255.255.255.0
ip address sed.sed.sed.sed 255.255.255.248 secondary
ip accounting output-packets
ip flow ingress
ip nat inside
ip virtual-reassembly
no ip mroute-cache
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 ATM0.1
ip route 172.24.1.64 255.255.255.192 Tunnel0
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat pool NAT-1 sed.sed.sed.sed sed.sed.sed.sed netmask 255.255.255.248
ip nat inside source route-map SDM_RMAP_1 pool NAT-1 overload
!
access-list 100 deny ip 192.168.0.0 0.0.0.255 172.24.1.64 0.0.0.63
access-list 100 permit ip 192.168.0.0 0.0.0.255 any
access-list 101 permit ip 192.168.0.0 0.0.0.255 172.24.1.64 0.0.0.63
!
!
!
!
route-map SDM_RMAP_1 permit 1
!
!
control-plane
!
banner login ^C^C
!
line con 0
login local
no modem enable
line aux 0
line vty 0 4
privilege level 15
login local
transport input telnet ssh
!
scheduler max-task-time 5000
end
Codice: Seleziona tutto
Crypto session current status
Interface: Tunnel0
Session status: UP-ACTIVE
Peer: fil.fil.fil.fil port 500
IKE SA: local sed.sed.sed.sed/500 remote fil.fil.fil.fil/500 Active
IPSEC FLOW: permit ip 192.168.0.0/255.255.255.0 172.24.1.64/255.255.255.192
Active SAs: 2, origin: crypto map