Имеется головной офис и два филиала. Соответственно 3 DI-804HV с внешними ip.
1 соединение: гл. офис 192.168.100.0/24 <-----> 1 филиал 192.168.101.0/24
2 соединение: гл. офис 192.168.100.0/24 <-----> 2 филиал 192.168.102.0/24
IKE Pr - Group2/DES/MD5/172800
IPSec Pr - Group2/ESP/DES/MD5/172800
Между гл.офисом и 1 фиалом VPN-туннель устанавливается и пинги проходят нормально в обе стороны.
Между гл. офисом и вторым филиалом VPN-туннель, но даже пинги не проходят не в одну и не вдругую сторону.
Цитата:
Thursday January 26, 2006 02:07:13 Receive IKE M1(INIT) : 85.249.80.189 --> 85.249.94.9
Thursday January 26, 2006 02:07:13 Try to match with ENC:DES AUTH:PSK HASH:MD5 Group:Group2
Thursday January 26, 2006 02:07:13 Send IKE M2(RESP) : 85.249.94.9 --> 85.249.80.189
Thursday January 26, 2006 02:07:13 Receive IKE M3(KEYINIT) : 85.249.80.189 --> 85.249.94.9
Thursday January 26, 2006 02:07:13 Send IKE M4(KEYRESP) : 85.249.94.9 --> 85.249.80.189
Thursday January 26, 2006 02:07:13 Receive IKE M5(IDINIT) : 85.249.80.189 --> 85.249.94.9
Thursday January 26, 2006 02:07:13 Send IKE M6(IDRESP) : 85.249.94.9 --> 85.249.80.189
Thursday January 26, 2006 02:07:13 IKE Phase1 (ISAKMP SA) established : 85.249.94.9 <-> 85.249.80.189
Thursday January 26, 2006 02:07:13 Receive IKE Q1(QINIT) : [85.249.80.189]-->[85.249.94.9]
Thursday January 26, 2006 02:07:13 Requested routing is [192.168.100.0|85.249.80.189]<->[85.249.94.9|192.168.102.0]
Thursday January 26, 2006 02:07:13 Try to match ESP with MODE:Tunnel PROTOCAL:ESP-DES AUTH:MD5 HASH:Others PFS(Group):Group2
Thursday January 26, 2006 02:07:14 Send IKE Q2(QRESP) : 192.168.102.0 --> 192.168.100.0
Thursday January 26, 2006 02:07:14 Receive IKE Q3(QHASH) : [192.168.100.0|85.249.80.189]-->[85.249.94.9|192.168.102.0]
Thursday January 26, 2006 02:07:14 IKE Phase2 (IPSEC SA) established : [192.168.100.0|85.249.80.189]<->[85.249.94.9|192.168.102.0]
Thursday January 26, 2006 02:07:14 inbound SPI = 0x19000010, outbound SPI = 0x14010010
Thursday January 26, 2006 02:07:30 IPSec tunnel keep alive : peer IP 192.168.100.1
Thursday January 26, 2006 02:07:30 [192.168.102.0|85.249.94.9]-->[85.249.80.189|192.168.100.0]
Thursday January 26, 2006 02:07:46 IPSec tunnel keep alive : peer IP 192.168.100.1
Thursday January 26, 2006 02:07:46 [192.168.102.0|85.249.94.9]-->[85.249.80.189|192.168.100.0]
Thursday January 26, 2006 02:08:02 IPSec tunnel keep alive : peer IP 192.168.100.1
Thursday January 26, 2006 02:08:02 [192.168.102.0|85.249.94.9]-->[85.249.80.189|192.168.100.0]
Thursday January 26, 2006 02:08:18 IPSec tunnel keep alive : peer IP 192.168.100.1
Thursday January 26, 2006 02:08:18 [192.168.102.0|85.249.94.9]-->[85.249.80.189|192.168.100.0]
Thursday January 26, 2006 02:08:34 IPSec tunnel keep alive : peer IP 192.168.100.1
Thursday January 26, 2006 02:08:34 [192.168.102.0|85.249.94.9]-->[85.249.80.189|192.168.100.0]
Thursday January 26, 2006 02:08:45 Warming : delete IPSec tunnel because remote subnet no response
Thursday January 26, 2006 02:08:45 Send IKE (INFO) : delete [192.168.102.0|85.249.94.9]-->[85.249.80.189|192.168.100.0] phase 2
Thursday January 26, 2006 02:08:45 IKE phase2 (IPSec SA) remove : 192.168.102.0 <-> 192.168.100.0
Thursday January 26, 2006 02:08:45 inbound SPI = 0x19000010, outbound SPI = 0x14010010
Thursday January 26, 2006 02:08:45 Send IKE (INFO) : delete 85.249.94.9 -> 85.249.80.189 phase 1
Thursday January 26, 2006 02:08:45 IKE phase1 (ISAKMP SA) remove : 85.249.94.9 <-> 85.249.80.189