{"id":571,"date":"2016-05-14T15:40:00","date_gmt":"2016-05-14T06:40:00","guid":{"rendered":"https:\/\/wp.zassoul.com\/?p=571"},"modified":"2016-05-14T15:40:00","modified_gmt":"2016-05-14T06:40:00","slug":"aws%e4%b8%8a%e3%81%aevyos%e3%81%a8%e5%ae%b6%e3%81%aec841%e3%81%a8%e3%81%a7ipsec%e3%82%92%e8%a9%a6%e3%81%99%ef%bd%9evti%e7%b7%a8%ef%bd%9e","status":"publish","type":"post","link":"https:\/\/wp.zassoul.com\/?p=571","title":{"rendered":"AWS\u4e0a\u306eVyos\u3068\u5bb6\u306eC841\u3068\u3067IPSec\u3092\u8a66\u3059\uff5eVTI\u7de8\uff5e"},"content":{"rendered":"<p>VTI\u3067\u3082\u8a2d\u5b9a\u3057\u305f\u306e\u3067\u30e1\u30e2\u30fb\u30fb\u30fb\u3002 <\/p>\n<p>ACL\u3044\u3089\u306a\u3044\u3057, GRE\u5206\u306e\u30aa\u30fc\u30d0\u30fc\u30d8\u30c3\u30c9(24\u30d0\u30a4\u30c8)\u3082\u6e1b\u308b\u3057\u3053\u3063\u3061\u306e\u307b\u3046\u304c\u306a\u3093\u304b\u3044\u3044\u304b\u3082\u3002<br \/># IP\u4ee5\u5916\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u306a\u3093\u3066\u3042\u3093\u307e\u4f7f\u308f\u306a\u3044\u3057\u306a\u3002 <\/p>\n<p><\/p>\n<table cellpadding=\"20\" style=\"width: 100%;\">\n<tbody>\n<tr bgcolor=\"DDDDDD\">\n<td height=\"20\"><span style=\"background-color: transparent; font-size: x-small;\"><span style=\"font-size: xx-small;\">&nbsp;\u25a0 MTU <\/span><\/span><br \/><span style=\"font-size: x-small;\">#sh int tu1<br \/>Tunnel1 is up, line protocol is up<br \/>&nbsp; Hardware is Tunnel<br \/>&nbsp; Internet address is 192.168.48.234\/29<br \/>&nbsp; MTU 17862 bytes, BW 100 Kbit\/sec, DLY 50000 usec,<br \/>&nbsp;&nbsp;&nbsp;&nbsp; reliability 255\/255, txload 1\/255, rxload 1\/255<br \/>&nbsp; Encapsulation TUNNEL, loopback not set<br \/>&nbsp; Keepalive set (5 sec), retries 3<br \/>&nbsp; Tunnel linestate evaluation up<br \/>&nbsp; Tunnel source 192.168.1.2 (Vlan100), destination 52.196.175.0<br \/>&nbsp;&nbsp; Tunnel Subblocks:<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; src-track:<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Tunnel1 source tracking subblock associated with Vlan100<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Set of tunnels with source Vlan100, 1 member (includes iterators), on interface &lt;OK&gt;<br \/>&nbsp; Tunnel protocol\/transport <span style=\"color: red;\"><b>IPSEC\/IP<\/b><\/span><br \/>&nbsp; Tunnel TTL 255<br \/>&nbsp; Tunnel transport MTU <span style=\"color: red;\"><b>1422<\/b><\/span> bytes<br \/>&nbsp; Tunnel transmit bandwidth 8000 (kbps)<br \/>&nbsp; Tunnel receive bandwidth 8000 (kbps)<br \/>&nbsp; Tunnel protection via IPSec (profile &#8220;VTI&#8221;)<br \/>&nbsp; Last input 19:27:49, output 18:54:11, output hang never<br \/>&nbsp; Last clearing of &#8220;show interface&#8221; counters 3d17h<br \/>&nbsp; Input queue: 0\/75\/0\/0 (size\/max\/drops\/flushes); Total output drops: 330<br \/>&nbsp; Queueing strategy: fifo<br \/>&nbsp; Output queue: 0\/0 (size\/max)<br \/>&nbsp; 5 minute input rate 0 bits\/sec, 0 packets\/sec<br \/>&nbsp; 5 minute output rate 0 bits\/sec, 0 packets\/sec<br \/>&nbsp;&nbsp;&nbsp;&nbsp; 12728 packets input, 1119256 bytes, 0 no buffer<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Received 0 broadcasts (0 IP multicasts)<br \/>&nbsp;&nbsp;&nbsp;&nbsp; 0 runts, 0 giants, 0 throttles<br \/>&nbsp;&nbsp;&nbsp;&nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort<br \/>&nbsp;&nbsp;&nbsp;&nbsp; 68893 packets output, 4199880 bytes, 0 underruns<br \/>&nbsp;&nbsp;&nbsp;&nbsp; 0 output errors, 0 collisions, 0 interface resets<br \/>&nbsp;&nbsp;&nbsp;&nbsp; 0 unknown protocol drops<br \/>&nbsp;&nbsp;&nbsp;&nbsp; 0 output buffer failures, 0 output buffers swapped out<\/span><span style=\"font-size: x-small;\">&nbsp;permit ip host 172.16.1.1 host 172.16.1.2<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u4ee5\u4e0b, Config\u629c\u7c8b\u3002<\/p>\n<p><\/p>\n<table cellpadding=\"20\" style=\"width: 100%;\">\n<tbody>\n<tr bgcolor=\"DDDDDD\">\n<td height=\"20\"><span style=\"background-color: transparent;\"><span style=\"font-size: x-small;\">\u25a0 Cisco \u629c\u7c8b<\/span><\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">crypto isakmp policy 5<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;encr aes 256<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;hash sha256<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;authentication pre-share<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;group 14<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;lifetime 3600<\/span><br \/><span style=\"font-size: x-small;\">crypto isakmp key aws address A.A.A.A &nbsp;255.255.255.255<\/span><br \/><span style=\"font-size: x-small;\">crypto isakmp keepalive 30 30<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">crypto ipsec transform-set IPSEC esp-aes 256 esp-sha256-hmac&nbsp;<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;mode tunnel<\/span><br \/><span style=\"font-size: x-small;\">!<br \/>crypto ipsec profile VTI<br \/>&nbsp;set transform-set IPSEC<br \/>&nbsp;set pfs group14<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">interface Tunnel1<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;ip address 192.168.254.1 255.255.255.0<\/span><br \/><span style=\"font-size: x-small;\"><strike>&nbsp;ip mtu 1422&nbsp;<\/strike>&nbsp; ! \u2190 \u3044\u3089\u306a\u3044\u304b\u3082\u3002 \u4e0d\u8981\u3067\u3057\u305f\u3002 \u203b<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;ip ospf network broadcast<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;ip ospf hello-interval 5<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;keepalive 5 3<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;tunnel source Vlan100<br \/>&nbsp;tunnel mode ipsec ipv4<br \/>&nbsp;tunnel destination A.A.A.A<br \/>&nbsp;tunnel protection ipsec profile VTI<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">interface Vlan100<\/span><br \/><span style=\"background-color: transparent;\"><span style=\"font-size: x-small;\">&nbsp;ip address 192.168.1.2 255.255.255.0<\/span><\/span><br \/><span style=\"background-color: transparent;\"><span style=\"font-size: x-small;\">&nbsp;ip virtual-reassembly in<\/span><\/span><br \/><span style=\"background-color: transparent;\"><span style=\"font-size: x-small;\">!<\/span><\/span><br \/><span style=\"background-color: transparent;\"><span style=\"font-size: x-small;\">!<\/span><\/span><br \/><span style=\"background-color: transparent;\"><span style=\"font-size: x-small;\">!<\/span><\/span><br \/><span style=\"font-size: x-small;\">router ospf 1<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;network 192.168.10.0 0.0.0.255 area 0<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;network 192.168.254.0 0.0.0.255 area 0<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">ip access-list extended AWS_GRE<\/span><br \/><span style=\"font-size: x-small;\">!<\/span><br \/><span style=\"font-size: x-small;\">&nbsp;permit ip host 172.16.1.1 host 172.16.1.2<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: x-small;\">\u203b&nbsp;VTI\u306fMTU\u3092\u81ea\u52d5\u8a08\u7b97\u3059\u308b\u304b\u3089\u8a2d\u5b9a\u306f\u4e0d\u8981\uff08<a href=\"http:\/\/www.cisco.com\/cisco\/web\/support\/JP\/docs\/SW\/LANSWT-Core\/CAT6500SWT\/MDICG\/003\/76cfvpnb.html?bid=0900e4b1825ae87e#pgfId-2055463\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco\u306e\u30da\u30fc\u30b8\u53c2\u7167<\/a>\uff09<\/span><\/p>\n<table cellpadding=\"20\" style=\"width: 100%;\">\n<tbody>\n<tr bgcolor=\"DDDDDD\">\n<td height=\"20\"><span style=\"font-size: x-small;\">\u25a0 Vyos \u629c\u7c8b<\/span><br \/><span style=\"font-size: x-small;\">set interfaces loopback lo address &#8216;172.16.1.2\/32&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set interfaces vti vti1 address &#8216;192.168.48.233\/29&#8217;<br \/>set interfaces vti vti1 ip ospf dead-interval &#8217;20&#8217;<br \/>set interfaces vti vti1 ip ospf hello-interval &#8216;5&#8217;<br \/>set interfaces vti vti1 ip ospf network &#8216;broadcast&#8217;<br \/>set interfaces vti vti1 ip ospf priority &#8216;1&#8217;<br \/>set interfaces vti vti1 ip ospf retransmit-interval &#8216;5&#8217;<br \/>set interfaces vti vti1 ip ospf transmit-delay &#8216;1&#8217;<br \/>set interfaces vti vti1 mtu &#8216;1422&#8217;<\/span><span style=\"font-size: x-small;\"> <\/span><br \/><span style=\"font-size: x-small;\">set protocols ospf area 0 network &#8216;192.168.254.0\/24&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set protocols ospf area 0 network &#8216;10.1<span style=\"background-color: transparent;\">0.20.0\/24&#8242;<\/span><\/span><br \/><span style=\"font-size: x-small;\">set protocols ospf log-adjacency-changes &#8216;detail&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set protocols static route 0.0.0.0\/0 next-hop 10.10.10.1 distance &#8216;1&#8217;<\/span><br \/><span style=\"font-size: x-small;\">&#8212;-<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec esp-group ESP_AWS compression &#8216;disable&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec esp-group ESP_AWS lifetime &#8216;3600&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec esp-group ESP_AWS mode &#8216;tunnel&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec esp-group ESP_AWS pfs &#8216;enable&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec esp-group ESP_AWS proposal 1 encryption &#8216;aes256&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec esp-group ESP_AWS proposal 1 hash &#8216;sha256&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ike-group IKE_AWS dead-peer-detection action &#8216;hold&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ike-group IKE_AWS dead-peer-detection interval &#8217;30&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ike-group IKE_AWS dead-peer-detection timeout &#8216;120&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ike-group IKE_AWS lifetime &#8216;3600&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ike-group IKE_AWS proposal 1 dh-group &#8217;14&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ike-group IKE_AWS proposal 1 encryption &#8216;aes256&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ike-group IKE_AWS proposal 1 hash &#8216;sha256&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec ipsec-interfaces interface &#8216;eth0&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec logging log-modes &#8216;all&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec nat-traversal &#8216;enable&#8217;<\/span><br \/><span style=\"font-size: x-small;\">set vpn ipsec site-to-site peer Global IP authentication mode &#8216;pre-shared-secret&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;authentication pre-shared-secret &#8216;aws&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;authentication remote-id &#8216;192.168.1.2&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;connection-type &#8216;respond&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;ike-group &#8216;IKE_BB&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;ikev2-reauth &#8216;inherit&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;local-address &#8216;10.200.10.50&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;vti bind &#8216;vti1&#8217;<br \/>set vpn ipsec site-to-site peer Global IP&nbsp;vti esp-group &#8216;ESP_BB&#8217;<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u30c8\u30f3\u30cd\u30eb\u5f35\u3063\u305f\u5f8c\u306b, \u300cOSPF\u3067\u30cd\u30a4\u30d0\u30fc\u304c\u30fc\u30fc\u30fc\u300d\u3063\u3066\u306a\u3063\u305f\u3051\u3069MTU\u30b5\u30a4\u30ba\u304c\u3042\u3063\u3066\u3044\u306a\u304b\u3063\u305f\u304b\u3089\u3002\u5408\u308f\u305b\u308c\u3070State Full\u306b\u306a\u308b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VTI\u3067\u3082\u8a2d\u5b9a\u3057\u305f\u306e\u3067\u30e1\u30e2\u30fb\u30fb\u30fb\u3002 ACL\u3044\u3089\u306a\u3044\u3057, GRE\u5206\u306e\u30aa\u30fc\u30d0\u30fc\u30d8\u30c3\u30c9(24\u30d0\u30a4\u30c8)\u3082\u6e1b\u308b\u3057\u3053\u3063\u3061\u306e\u307b\u3046\u304c\u306a\u3093\u304b\u3044\u3044\u304b\u3082\u3002# IP\u4ee5\u5916\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u306a\u3093\u3066\u3042\u3093\u307e\u4f7f\u308f\u306a\u3044\u3057\u306a\u3002 &nbsp;\u25a0 MTU #sh in\u2026 <span class=\"read-more\"><a href=\"https:\/\/wp.zassoul.com\/?p=571\">\u7d9a\u304d\u3092\u8aad\u3080 &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54,11,15,8],"tags":[],"class_list":["post-571","post","type-post","status-publish","format-standard","hentry","category-aws","category-cisco","category-network","category-8"],"_links":{"self":[{"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=\/wp\/v2\/posts\/571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=571"}],"version-history":[{"count":0,"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=\/wp\/v2\/posts\/571\/revisions"}],"wp:attachment":[{"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.zassoul.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}