Got it

[Dr.WoW]Q&A: Why are services unavailable after the IPSec tunnel is established?

Latest reply: May 9, 2018 17:19:54 924 1 1 0 0

A: Service unavailability is often caused because the routes between the branch offices and the headquarters are not configured or incorrect.

Symptom

In Figure 1-1, after IPSec is deployed between FWs, PCs cannot communicate with each other.

Figure 1-1 IPSec networking

20180509115223404001.png

 

1.         Run the display ike sa command on FW1, finding that an IPSec tunnel has been established.

<FW1> display ike sa
IKE SA information :  
   Conn-ID    Peer             VPN              Flag(s)     Phase     
  ---------------------------------------------------------------
   151003222  2.1.1.1:500                       RD|ST|A     v1:2 
   151003215  2.1.1.1:500                       RD|ST|A     v1:1
                                        
  Number of IKE SA : 2                     
  ---------------------------------------------------------------
                                                   
  Flag Description:            
  RD--READY   ST--STAYALIVE   RL--REPLACED   FD--FADING   TO--TIMEOUT     
  HRT--HEARTBEAT   LKG--LAST KNOWN GOOD SEQ NO.   BCK--BACKED UP        
  M--ACTIVE   S--STANDBY   A--ALONE  NEG--NEGOTIATING

2.         Run the ping command on FW1, finding that the private network route to the remote end is unreachable.

<FW1> ping 10.1.1.2
  PING 10.1.1.2: 56  data bytes, press CTRL_C to break                          
    Reply from 10.1.1.2: bytes=56 Sequence=1 ttl=255 time=1 ms                  
    Reply from 10.1.1.2: bytes=56 Sequence=2 ttl=255 time=1 ms                  
    Reply from 10.1.1.2: bytes=56 Sequence=3 ttl=255 time=1 ms                  
    Reply from 10.1.1.2: bytes=56 Sequence=4 ttl=255 time=1 ms                  
    Reply from 10.1.1.2: bytes=56 Sequence=5 ttl=255 time=1 ms                  
                                                                                 
  --- 10.1.1.2 ping statistics ---                                              
    5 packet(s) transmitted                                                     
    5 packet(s) received                                                         
    0.00% packet loss                                                           
    round-trip min/avg/max = 1/1/1 ms  

<FW1> ping 10.1.2.2
  PING 10.1.2.2: 56  data bytes, press CTRL_C to break                          
    Request time out                                                            
    Request time out                                                            
    Request time out                                                            
    Request time out                                                            
    Request time out                                                            
                                                                                
  --- 10.1.2.2 ping statistics ---                                              
    5 packet(s) transmitted                                                     
    0 packet(s) received                                                        
    100.00% packet loss   

Possible Causes

The private network route from FW1 to FW2 is unreachable.

Procedure

Run the display ip routing-table command to check the IP routing table of FW1.

<FW1> display ip routing-table
Route Flags: R - relay, D - download to fib                                      
------------------------------------------------------------------------------  
Routing Tables: Public                                                          
         Destinations : 15       Routes : 15                                    
                                                                                 
Destination/Mask    Proto   Pre  Cost      Flags NextHop         Interface      
                                                                                
        0.0.0.0/0   Unr     70   0           D   192.168.1.1     GigabitEthernet1/0/7
        1.1.1.0/24  Direct  0    0           D   1.1.1.1         GigabitEthernet1/0/1
        1.1.1.1/32  Direct  0    0           D   127.0.0.1       GigabitEthernet1/0/1 
        2.1.1.0/24  Static  60   0          RD   1.1.1.2         GigabitEthernet1/0/1
     10.128.0.0/10  Static  60   0          RD   192.168.50.1    GigabitEthernet1/0/5
      127.0.0.0/8   Direct  0    0           D   127.0.0.1       InLoopBack0    
      127.0.0.1/32  Direct  0    0           D   127.0.0.1       InLoopBack0    
    192.168.1.0/24  Direct  0    0           D   192.168.1.2     GigabitEthernet1/0/7
    192.168.1.2/32  Direct  0    0           D   127.0.0.1       GigabitEthernet1/0/7
......

The preceding command output shows that FW1 does not have a private network route to FW2.

On FW1, configure a private network route to FW2.

ip route-static 10.1.2.0 255.255.255.0 1.1.1.2

After the configuration, PCs can communicate with each other.

----End

Suggestion and Summary

If an IPSec tunnel has been established between services are interrupted, check whether a routing failure occurs. If the local device does not have any route to the private network segment of the remote device, the local device discards packets.

For details, see the HUAWEI USG6000&USG9500 & NGFW Module V500R005C00 Product Documentation(hdx).

                               Step 1      Log in to the enterprise technical support website at http://support.huawei.com/enterprise.

                               Step 2      Click Security.

                               20180427133136520001.png

                               Step 3      Click the name of the product to be queried, for example, Secospace USG6600.

20180427133327677001.png

                               Step 4      Choose DocumentationProduct Documentation, and then select the corresponding product document  library .

20180509112124547.png

                               Step 5      Select the hedex document, and then find the IPSec node in the administrator's Guide. .

                             20180509113029586.png

                             ----End

 

HUAWEI USG6000&USG9500 & NGFW Module V500R005C00 Product Documentation(hdx)

:)
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.