faq обучение настройка
Текущее время: Вт июл 22, 2025 02:15

Часовой пояс: UTC + 3 часа




Начать новую тему Ответить на тему  [ Сообщений: 4 ] 
Автор Сообщение
 Заголовок сообщения: VPN между DFL-800 и Amazon EC2
СообщениеДобавлено: Вт июл 03, 2012 15:44 
Не в сети

Зарегистрирован: Чт ноя 11, 2010 17:34
Сообщений: 28
Необходимо установить канал с облаком на амазоне EC2. У них принцип такой, что со стороны амазона автоматически создаешь себе два туннеля (балансировка между ними с помощью BGP) и скачиваешь для них настройки. Можно выбрать производителя маршрутизатора, например, циску и скачать конфиг конкретно под неё. Из конфига можно понять, что ничего необычного там нет, смущает только этот BGP (Border Gateway Protocol).
DFL-800 поддерживает его или нет? Если не поддерживает, то есть ли шансы настроить хотя бы один из туннелей? Пока не поднимается даже первый. Пишет Phase 2 Success и все.

! Amazon Web Services
! Virtual Private Cloud

! AWS utilizes unique identifiers to manipulate the configuration of
! a VPN Connection. Each VPN Connection is assigned an identifier and is
! associated with two other identifiers, namely the
! Customer Gateway Identifier and Virtual Private Gateway Identifier.
!
! Your VPN Connection ID : vpn-58db3d31
! Your Virtual Private Gateway ID : vgw-ce6385a7
! Your Customer Gateway ID : cgw-4c33d525
!
!
! This configuration consists of two tunnels. Both tunnels must be
! configured on your Customer Gateway.
!
! --------------------------------------------------------------------------------
! IPSec Tunnel #1
! --------------------------------------------------------------------------------
! #1: Internet Key Exchange (IKE) Configuration
!
! A policy is established for the supported ISAKMP encryption,
! authentication, Diffie-Hellman, lifetime, and key parameters.
!
! Note that there are a global list of ISAKMP policies, each identified by
! sequence number. This policy is defined as #200, which may conflict with
! an existing policy using the same number. If so, we recommend changing
! the sequence number to avoid conflicts.
!
crypto isakmp policy 200
encryption aes 128
authentication pre-share
group 2
lifetime 28800
hash sha
exit

! The ISAKMP keyring stores the Pre Shared Key used to authenticate the
! tunnel endpoints.
!
crypto keyring keyring-vpn-58db3d31-0
pre-shared-key address 72.21.ХХ.ХХ key 8jХХХХХХХХХХХХХХХxe
exit

! An ISAKMP profile is used to associate the keyring with the particular
! endpoint.
!
crypto isakmp profile isakmp-vpn-58db3d31-0
match identity address 72.21.ХХ.ХХ
keyring keyring-vpn-58db3d31-0
exit

! #2: IPSec Configuration
!
! The IPSec transform set defines the encryption, authentication, and IPSec
! mode parameters.
!
crypto ipsec transform-set ipsec-prop-vpn-58db3d31-0 esp-aes 128 esp-sha-hmac
mode tunnel
exit

! The IPSec profile references the IPSec transform set and further defines
! the Diffie-Hellman group and security association lifetime.
!
crypto ipsec profile ipsec-vpn-58db3d31-0
set pfs group2
set security-association lifetime seconds 3600
set transform-set ipsec-prop-vpn-58db3d31-0
exit

! Additional parameters of the IPSec configuration are set here. Note that
! these parameters are global and therefore impact other IPSec
! associations.
! This option instructs the router to clear the "Don't Fragment"
! bit from packets that carry this bit and yet must be fragmented, enabling
! them to be fragmented.
!
crypto ipsec df-bit clear

! This option enables IPSec Dead Peer Detection, which causes periodic
! messages to be sent to ensure a Security Association remains operational.
!
crypto isakmp keepalive 10 10 on-demand

! This configures the gateway's window for accepting out of order
! IPSec packets. A larger window can be helpful if too many packets
! are dropped due to reordering while in transit between gateways.
!
crypto ipsec security-association replay window-size 128

! This option instructs the router to fragment the unencrypted packets
! (prior to encryption).
!
crypto ipsec fragmentation before-encryption


! --------------------------------------------------------------------------------
! #3: Tunnel Interface Configuration
!
! A tunnel interface is configured to be the logical interface associated
! with the tunnel. All traffic routed to the tunnel interface will be
! encrypted and transmitted to the VPC. Similarly, traffic from the VPC
! will be logically received on this interface.
!
! Association with the IPSec security association is done through the
! "tunnel protection" command.
!
! The address of the interface is configured with the setup for your
! Customer Gateway. If the address changes, the Customer Gateway and VPN
! Connection must be recreated with Amazon VPC.
!
interface Tunnel1
ip address 169.254.255.2 255.255.255.252
ip virtual-reassembly
tunnel source ХХ.ХХ.79.28
tunnel destination 72.21.ХХ.ХХ
tunnel mode ipsec ipv4
tunnel protection ipsec profile ipsec-vpn-58db3d31-0
! This option causes the router to reduce the Maximum Segment Size of
! TCP packets to prevent packet fragmentation.
ip tcp adjust-mss 1387
no shutdown
exit

! --------------------------------------------------------------------------------
! #4: Border Gateway Protocol (BGP) Configuration
!
! BGP is used within the tunnel to exchange prefixes between the
! Virtual Private Gateway and your Customer Gateway. The Virtual Private Gateway
! will announce the prefix corresponding to your VPC.
!
! Your Customer Gateway may announce a default route (0.0.0.0/0),
! which can be done with the 'network' and 'default-originate' statements.
!
! The BGP timers are adjusted to provide more rapid detection of outages.
!
! The local BGP Autonomous System Number (ASN) (65000) is configured
! as part of your Customer Gateway. If the ASN must be changed, the
! Customer Gateway and VPN Connection will need to be recreated with AWS.
!
router bgp 65000
neighbor 169.254.255.1 remote-as 7224
neighbor 169.254.255.1 activate
neighbor 169.254.255.1 timers 10 30 30
address-family ipv4 unicast
neighbor 169.254.255.1 remote-as 7224
neighbor 169.254.255.1 timers 10 30 30
neighbor 169.254.255.1 default-originate
neighbor 169.254.255.1 activate
neighbor 169.254.255.1 soft-reconfiguration inbound
! To advertise additional prefixes to Amazon VPC, copy the 'network' statement
! and identify the prefix you wish to advertise. Make sure the prefix is present
! in the routing table of the device with a valid next-hop.
network 0.0.0.0
exit
exit
!
! --------------------------------------------------------------------------------
! IPSec Tunnel #2
! --------------------------------------------------------------------------------
! #1: Internet Key Exchange (IKE) Configuration
!
! A policy is established for the supported ISAKMP encryption,
! authentication, Diffie-Hellman, lifetime, and key parameters.
!
! Note that there are a global list of ISAKMP policies, each identified by
! sequence number. This policy is defined as #201, which may conflict with
! an existing policy using the same number. If so, we recommend changing
! the sequence number to avoid conflicts.
!
crypto isakmp policy 201
encryption aes 128
authentication pre-share
group 2
lifetime 28800
hash sha
exit

! The ISAKMP keyring stores the Pre Shared Key used to authenticate the
! tunnel endpoints.
!
crypto keyring keyring-vpn-58db3d31-1
pre-shared-key address 72.21.УУ.УУ key z9УУУУУУУУУУУУУУУУ
exit

! An ISAKMP profile is used to associate the keyring with the particular
! endpoint.
!
crypto isakmp profile isakmp-vpn-58db3d31-1
match identity address 72.21.УУ.УУ
keyring keyring-vpn-58db3d31-1
exit

! #2: IPSec Configuration
!
! The IPSec transform set defines the encryption, authentication, and IPSec
! mode parameters.
!
crypto ipsec transform-set ipsec-prop-vpn-58db3d31-1 esp-aes 128 esp-sha-hmac
mode tunnel
exit

! The IPSec profile references the IPSec transform set and further defines
! the Diffie-Hellman group and security association lifetime.
!
crypto ipsec profile ipsec-vpn-58db3d31-1
set pfs group2
set security-association lifetime seconds 3600
set transform-set ipsec-prop-vpn-58db3d31-1
exit

! Additional parameters of the IPSec configuration are set here. Note that
! these parameters are global and therefore impact other IPSec
! associations.
! This option instructs the router to clear the "Don't Fragment"
! bit from packets that carry this bit and yet must be fragmented, enabling
! them to be fragmented.
!
crypto ipsec df-bit clear

! This option enables IPSec Dead Peer Detection, which causes periodic
! messages to be sent to ensure a Security Association remains operational.
!
crypto isakmp keepalive 10 10 on-demand

! This configures the gateway's window for accepting out of order
! IPSec packets. A larger window can be helpful if too many packets
! are dropped due to reordering while in transit between gateways.
!
crypto ipsec security-association replay window-size 128

! This option instructs the router to fragment the unencrypted packets
! (prior to encryption).
!
crypto ipsec fragmentation before-encryption


! --------------------------------------------------------------------------------
! #3: Tunnel Interface Configuration
!
! A tunnel interface is configured to be the logical interface associated
! with the tunnel. All traffic routed to the tunnel interface will be
! encrypted and transmitted to the VPC. Similarly, traffic from the VPC
! will be logically received on this interface.
!
! Association with the IPSec security association is done through the
! "tunnel protection" command.
!
! The address of the interface is configured with the setup for your
! Customer Gateway. If the address changes, the Customer Gateway and VPN
! Connection must be recreated with Amazon VPC.
!
interface Tunnel2
ip address 169.254.255.6 255.255.255.252
ip virtual-reassembly
tunnel source 84.52.УУ.УУ
tunnel destination 72.21.УУ.УУ
tunnel mode ipsec ipv4
tunnel protection ipsec profile ipsec-vpn-58db3d31-1
! This option causes the router to reduce the Maximum Segment Size of
! TCP packets to prevent packet fragmentation.
ip tcp adjust-mss 1387
no shutdown
exit

! --------------------------------------------------------------------------------
! #4: Border Gateway Protocol (BGP) Configuration
!
! BGP is used within the tunnel to exchange prefixes between the
! Virtual Private Gateway and your Customer Gateway. The Virtual Private Gateway
! will announce the prefix corresponding to your VPC.
!
! Your Customer Gateway may announce a default route (0.0.0.0/0),
! which can be done with the 'network' and 'default-originate' statements.
!
! The BGP timers are adjusted to provide more rapid detection of outages.
!
! The local BGP Autonomous System Number (ASN) (65000) is configured
! as part of your Customer Gateway. If the ASN must be changed, the
! Customer Gateway and VPN Connection will need to be recreated with AWS.
!
router bgp 65000
neighbor 169.254.255.5 remote-as 7224
neighbor 169.254.255.5 activate
neighbor 169.254.255.5 timers 10 30 30
address-family ipv4 unicast
neighbor 169.254.255.5 remote-as 7224
neighbor 169.254.255.5 timers 10 30 30
neighbor 169.254.255.5 default-originate
neighbor 169.254.255.5 activate
neighbor 169.254.255.5 soft-reconfiguration inbound
! To advertise additional prefixes to Amazon VPC, copy the 'network' statement
! and identify the prefix you wish to advertise. Make sure the prefix is present
! in the routing table of the device with a valid next-hop.
network 0.0.0.0
exit
exit
!


! Additional Notes and Questions
! - Amazon Virtual Private Cloud Getting Started Guide:
! http://docs.amazonwebservices.com/Amazo ... artedGuide
! - Amazon Virtual Private Cloud Network Administrator Guide:
! http://docs.amazonwebservices.com/Amazo ... AdminGuide
! - XSL Version: 2009-07-15-767361


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: VPN между DFL-800 и Amazon EC2
СообщениеДобавлено: Вт июл 03, 2012 21:55 
Не в сети

Зарегистрирован: Чт дек 07, 2006 15:42
Сообщений: 8502
Откуда: RareSoftware.ru
DFL поддерживает только OSPF, BGP к сожалению нет

А варинатов на ЕС2 без BGP совсем нет?

_________________
Хотите хороший девайс? D-Link DFL!

Хотите считать с него трафик?
http://www.raresoftware.ru/products/lan/dfltc

Изображение


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: VPN между DFL-800 и Amazon EC2
СообщениеДобавлено: Ср июл 04, 2012 00:45 
Не в сети

Зарегистрирован: Чт ноя 11, 2010 17:34
Сообщений: 28
danilovav писал(а):
А варинатов на ЕС2 без BGP совсем нет?

Строго говоря есть. У них там есть такое понятие как elastic ip. Это, фактически, реальный, белый ip который можно мгновенно на ходу соотнести к любой из машин, запущенных в EC2. С сеткой из нескольких машин сложнее, в зависимости от задач, или используется внутренний балансировщик нагрузки, или, в их терминах - VPC.
Для объединения машин EC2 в одну локальную подсеть, есть понятие VPC - они выделяют тебе любую подсеть, шлюзом из которой может быть или их "Internet Gateway", или "Virtual Private Gateway", как понятно из названия или в инет выпустят, или в VPN все завернут, вернее, сам завернешь, там все очень гибко настраивается, все маршруты прописываются.
Соответственно, можно попробовать поднять софтовый VPN роутер на отдельной машине EC2 (аренда доп. машины), но если использовать их аппаратное решение, то без BGP никак.

http://aws.amazon.com/vpc/faqs/#C5
Q. Which customer gateway devices can I use to connect to Amazon VPC?
You can use any device, however, it MUST be able to:

Establish IKE Security Association using Pre-Shared Keys
Establish IPsec Security Associations in Tunnel mode
Utilize the AES 128-bit encryption function
Utilize the SHA-1 hashing function
Utilize Diffie-Hellman Perfect Forward Secrecy in "Group 2" mode
Establish Border Gateway Protocol (BGP) peerings
Bind tunnels to logical interfaces (route-based VPN)
Utilize IPsec Dead Peer Detection
Perform packet fragmentation prior to encryption

Тогда, возможно, посоветуете какая модель после DFL-800 подойдет?


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: VPN между DFL-800 и Amazon EC2
СообщениеДобавлено: Ср июл 04, 2012 06:05 
Не в сети

Зарегистрирован: Чт дек 07, 2006 15:42
Сообщений: 8502
Откуда: RareSoftware.ru
Увы, но у D-Link нет таких девайсов
Личный опыт я вам в личку скинул

_________________
Хотите хороший девайс? D-Link DFL!

Хотите считать с него трафик?
http://www.raresoftware.ru/products/lan/dfltc

Изображение


Вернуться наверх
 Профиль  
 
Показать сообщения за:  Сортировать по:  
Начать новую тему Ответить на тему  [ Сообщений: 4 ] 

Часовой пояс: UTC + 3 часа


Кто сейчас на форуме

Сейчас этот форум просматривают: нет зарегистрированных пользователей и гости: 291


Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете добавлять вложения

Найти:
Перейти:  
Создано на основе phpBB® Forum Software © phpBB Group
Русская поддержка phpBB