Hello,
This post is in relation to a previous post
Brocade vRouter 5410 6.7 R11S3 AWS VPN with Public IP Encryption Domain
Unfortunately, I had been assigned to another project so this issue was parked until now.
A little recap on what I am trying to achieve.
2 VPN tunnels between a single vRouter hosted in AWS to a customer site.
There is an EC2 instance on the AWS side, in a private subnet, which can communicate to the vRouter.
This EC2 instance private IP has been nat'ed to an encryption domain on the AWS side and needs to speak with the customers encryption domain over the IPSEC tunnel. Logically it looks like this:
Customer AWS
Enc Domain Peer Peer Enc Domain Web Server
1.1.1.1 2.2.2.1 3.3.3.1 4.4.4.1 5.5.5.200
1.1.1.2 2.2.2.2
The vRouter for this environment has been upgraded 5600 17.1.1 with some config changes to support the new CLI.
I am now at the same stage as before:
IPSEC tunnels are up but I am not seeing any traffic traversing.
Peer ID / IP Local ID / IP
------------ -------------
2.2.2.2 5.5.5.12
Description: UAT
Tunnel Id State Bytes Out/In Encrypt Hash DH A-Time L-Time
------ ---------- ----- ------------- ------------ -------- -- ------ ------
1 246 up 0.0/0.0 3des md5 2 959 3600
Peer ID / IP Local ID / IP
------------ -------------
2.2.2.1 10.168.65.12
Description: UAT
Tunnel Id State Bytes Out/In Encrypt Hash DH A-Time L-Time
------ ---------- ----- ------------- ------------ -------- -- ------ ------
1 245 up 0.0/0.0 3des md5 2 2246 3600
I can see the EC2 instance hitting the vRouter and NATing to the correct encryption domain on the AWS side. But nothing appears to be traversing the VPN.
Pre-NAT Post-NAT Prot Timeout
5.5.5.200:59861 4.4.4.1:59861 tcp 18
5.5.5.200:35915 4.4.4.1:35915 tcp 28
If anyone can assist with debugging this issue that would appreciated. On addresses have been anonymised.
set interfaces dataplane dp0s0 address 'dhcp'
set interfaces loopback 'lo'
set protocols static route 1.1.1.1/32 next-hop '2.2.2.1'
set protocols static route 1.1.1.2/32 next-hop '2.2.2.2'
set security vpn ipsec auto-update '30'
set security vpn ipsec esp-group espExt compression 'disable'
set security vpn ipsec esp-group espExt lifetime '3600'
set security vpn ipsec esp-group espExt mode 'tunnel'
set security vpn ipsec esp-group espExt pfs 'disable'
set security vpn ipsec esp-group espExt proposal 1 encryption '3des'
set security vpn ipsec esp-group espExt proposal 1 hash 'md5'
set security vpn ipsec ike-group ikeExt dead-peer-detection action 'restart'
set security vpn ipsec ike-group ikeExt dead-peer-detection interval '15'
set security vpn ipsec ike-group ikeExt dead-peer-detection timeout '30'
set security vpn ipsec ike-group ikeExt lifetime 86400
set security vpn ipsec ike-group ikeExt proposal 1 dh-group '2'
set security vpn ipsec ike-group ikeExt proposal 1 encryption '3des'
set security vpn ipsec ike-group ikeExt proposal 1 hash 'md5'
set security vpn ipsec nat-networks allowed-network '0.0.0.0/0'
set security vpn ipsec nat-traversal 'enable'
set security vpn ipsec site-to-site peer 2.2.2.2 authentication id '3.3.3.1'
set security vpn ipsec site-to-site peer 2.2.2.2 authentication mode 'pre-shared-secret'
set security vpn ipsec site-to-site peer 2.2.2.2 authentication pre-shared-secret ‘sharedkey1’
set security vpn ipsec site-to-site peer 2.2.2.2 connection-type 'initiate'
set security vpn ipsec site-to-site peer 2.2.2.2 default-esp-group 'espExt'
set security vpn ipsec site-to-site peer 2.2.2.2 description 'UAT'
set security vpn ipsec site-to-site peer 2.2.2.2 ike-group 'ikeExt'
set security vpn ipsec site-to-site peer 2.2.2.2 local-address '5.5.5.12'
set security vpn ipsec site-to-site peer 2.2.2.2 tunnel 1 local prefix '4.4.4.1/32'
set security vpn ipsec site-to-site peer 2.2.2.2 tunnel 1 remote prefix '1.1.1.2/32'
set security vpn ipsec site-to-site peer 2.2.2.1 authentication id '3.3.3.1'
set security vpn ipsec site-to-site peer 2.2.2.1 authentication mode 'pre-shared-secret'
set security vpn ipsec site-to-site peer 2.2.2.1 authentication pre-shared-secret ‘sharedkey2!’
set security vpn ipsec site-to-site peer 2.2.2.1 connection-type 'initiate'
set security vpn ipsec site-to-site peer 2.2.2.1 default-esp-group 'espExt'
set security vpn ipsec site-to-site peer 2.2.2.1 description 'UAT'
set security vpn ipsec site-to-site peer 2.2.2.1 ike-group 'ikeExt'
set security vpn ipsec site-to-site peer 2.2.2.1 local-address '5.5.5.12'
set security vpn ipsec site-to-site peer 2.2.2.1 tunnel 1 local prefix '4.4.4.1/32'
set security vpn ipsec site-to-site peer 2.2.2.1 tunnel 1 remote prefix '1.1.1.1/32'
set service https http-redirect 'disable'
set service nat source rule 10 description '5.5.5.200 > 1.1.1.1'
set service nat source rule 10 destination address '1.1.1.1'
set service nat source rule 10 outbound-interface 'dp0s0'
set service nat source rule 10 'source'
set service nat source rule 10 translation address '4.4.4.1'
set service nat source rule 20 description '5.5.5.200 > 1.1.1.2'
set service nat source rule 20 destination address '1.1.1.2'
set service nat source rule 20 outbound-interface 'dp0s0'
set service nat source rule 20 'source'
set service nat source rule 20 translation address '4.4.4.1'
set system host-name ‘ec2instance’
set system name-server ‘5.5.5.2’
set system ntp server '0.vyatta.pool.ntp.org'
set system ntp server '1.vyatta.pool.ntp.org'
set system ntp server '2.vyatta.pool.ntp.org'
Than you,
Scott