Printed in Canada, India, and the United States of America
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly
agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF
ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are
subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other trademarks are the property of their respective owners.
ATTENTION
For information about the safety precautions, read "Safety messages" in this guide.
For information about the software license, read "Software license" in this guide.
Nortel Secure Router 8000 Series
Troubleshooting - VAS Contents
Contents
About this document.......................................................................................................................1
1.1.1 AAA, RADIUS, and HWTACACS...................................................................................................1-2
1.1.2 Domains and address pool.................................................................................................................1-4
1.1.3 Schemes and modes ..........................................................................................................................1-5
1.1.4 Server templates................................................................................................................................1-6
1.2 Troubleshooting local user authentication...................................................................................................1-6
2 IPSec and IKE troubleshooting ...............................................................................................2-1
2.1 IPSec and IKE overview .............................................................................................................................2-3
Issue 01.01 (30 March 2009)
Nortel Networks Inc.
i
Contents
Nortel Secure Router 8000 Series
Troubleshooting - VAS
2.2 Troubleshooting manual IPSec SA setup.....................................................................................................2-6
3.2 Troubleshooting the firewall........................................................................................................................3-2
Index ................................................................................................................................................ i-1
Issue 01.01 (30 March 2009)
Nortel Networks Inc.
iii
Nortel Secure Router 8000 Series
Troubleshooting - VAS Figures
Figure 4-6 Internal network fails to ping the external network ........................................................................4-9
vi
Nortel Networks Inc.
Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS Contents
Contents
About this document....................................................................................................................... 1
Issue 01.01 (30 March 2009)
Nortel Networks Inc.
i
Nortel Secure Router 8000 Series
Troubleshooting - VAS About this document
About this document
Overview
This section describes the organization of this document, product version, intended audience,
conventions, and update history.
Related versions
The following table lists the product versions related to this document.
Product Name Version
Nortel Secure Router 8000 Series V200R005
Intended audience
This document is intended for the following audience:
z
network operators
z
network administrators
z
network maintenance engineers
Organization
This document consists of three chapters related to Value Added Service (VAS)
troubleshooting and is organized as follows.
Chapter Description
1 AAA troubleshooting This chapter describes the troubleshooting procedure for the
Issue 01.01 (30 March 2009)
Authentication, Authorization, and Accounting (AAA)
protocol; frequently asked questions (FAQ); and diagnostic
tools.
Nortel Networks Inc.
1
About this document
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Chapter Description
2 IPSec and IKE
troubleshooting
3 Firewall
Troubleshooting
4 NAT troubleshooting This chapter describes the troubleshooting procedure for
Conventions
This section describes the symbol and text conventions used in this document
Symbol conventions
Symbol Description
This chapter describes troubleshooting procedures for IP
Security (IPSec) and Internet Key Exchange (IKE), FAQs,
and diagnostic tools.
This chapter describes the troubleshooting procedure for
Firewall, FAQs, and diagnostic tools.
Network Address Translation (NAT), FAQs, and diagnostic
tools.
Indicates a hazard with a high level of risk that, if not avoided,
can result in death or serious injury.
General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman font.
Boldface
Italic Book titles are in italics.
Courier New
Indicates a hazard with a medium or low level of risk that, if
not avoided, can result in minor or moderate injury.
Indicates a potentially hazardous situation that, if not avoided,
can cause equipment damage, data loss, and performance
degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save time.
Provides additional information to emphasize or supplement
important points of the main text.
Names of files, directories, folders, and users are in
boldface. For example, log on as the user root.
Terminal display is in Courier New font.
2
Nortel Networks Inc.
Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS About this document
Command conventions
Convention Description
Boldface
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in square brackets [ ] are
{ x | y | ... } Alternative items are grouped in braces and separated by
[ x | y | ... ] Optional alternative items are grouped in square brackets
{ x | y | ... } * Alternative items are grouped in braces and separated by
[ x | y | ... ] *
&<1-n> The parameter before the ampersand sign (&) can be
# A line starting with the number sign (#) contains comments.
The keywords of a command line are in boldface.
optional.
vertical bars. You can select one item.
and separated by vertical bars. You can select one item or
no item.
vertical bars. You can select a minimum of one item or a
maximum of all items.
Optional alternative items are grouped in square brackets
and separated by vertical bars. You can select no item or
multiple items.
repeated 1 to n times.
GUI conventions
Convention Description
Boldface
> Multilevel menus are in boldface and separated by the
Keyboard operation
Format Description
Key
Key 1+Key 2
Key 1, Key 2 Press the keys in sequence. For example, Alt, A means
Buttons, menus, parameters, tabs, windows, and dialog box
titles are in boldface. For example, click OK.
right-angled bracket sign (>). For example, choose File >
Create > Folder.
Press the key. For example, press Enter and press Tab.
Press the keys concurrently. For example, Ctrl+Alt+A
means press the three keys concurrently.
press the two keys in sequence.
Issue 01.01 (30 March 2009)
Nortel Networks Inc.
3
About this document
Mouse operation
Action Description
Click Select and release the primary mouse button without
Double-click Press the primary mouse button twice quickly without
Drag Press and hold the primary mouse button and move the
Update history
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Nortel Secure Router 8000 Series
Troubleshooting - VAS
moving the pointer.
moving the pointer.
pointer to a new position.
Updates in Issue 1.0 ( 6 June 2008 )
This is the first commercial release of this document.
4
Nortel Networks Inc.
Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS Contents
1.1.1 AAA, RADIUS, and HWTACACS......................................................................................................1-2
1.1.2 Domains and address pool ...................................................................................................................1-4
1.1.3 Schemes and modes.............................................................................................................................1-4
1.1.4 Server templates...................................................................................................................................1-5
1.2 Troubleshooting local user authentication.....................................................................................................1-6
Figure 1-2 Attribute format ................................................................................................................................1-3
Figure 1-3 Networking diagram of local authentication.....................................................................................1-6
Figure 1-4 Troubleshooting flowchart of local user authentication....................................................................1-9
Figure 1-5 Networking diagram of RADIUS authentication............................................................................1-11
Figure 1-6 Troubleshooting flowchart of RADIUS authentication ..................................................................1-14
Figure 1-7 Networking diagram of HWTACAS authentication ...................................................................... 1-15
Figure 1-8 Troubleshooting flowchart of HWTACACS authentication .......................................................... 1-16
Figure 1-9 Networking diagram of RADIUS authentication............................................................................1-17
Figure 1-10 Networking diagram of HWTACAS authentication .....................................................................1-19
Issue 01.01 (30 March 2009) Nortel Networks Inc. iii
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
1 AAA troubleshooting
About this chapter
The following table shows the contents of this chapter.
Section Description
1.1 AAA overview This section describes the concepts you need to know
before troubleshooting Authentication, Authorization, and
Accounting (AAA).
1.2 Troubleshooting local user
authentication
1.3 Troubleshooting RADIUS
authentication
1.4 Troubleshooting cases This section presents several troubleshooting cases.
1.5 FAQs This section lists frequently asked questions (FAQs) and
1.6 Diagnostic tools This section describes common diagnostic tools: display
This section contains configuration notes for local user
authentication, and provides the local user authentication
troubleshooting flowchart and procedure for a typical
local user authentication network.
This section contains configuration notes for RADIUS
authentication, and provides the RADIUS authentication
troubleshooting flowchart and procedure for a typical
RADIUS authentication network.
their answers.
commands and debugging commands.
1.1 AAA overview
This section describes the basic concepts of AAA, RADIUS, and HWTACACS.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-1
1 AAA troubleshooting
1.1.1 AAA and RADIUS
AAA
Authentication, Authorization, and Accounting (AAA) contains the following three types of
security services.
z
Authentication: specifies what type of user can access the network.
z
Authorization: specifies what type of service the user can use.
z
Accounting: records the network resource utilization of the user.
AAA adopts the client/server model, in which the client runs on the resource side and the
server stores information about the user. This model is extensible and provides an effective
way to manage users.
The two communication protocols used between the client and the server are as follows:
z
Remote Authentication Dial-In User Service (RADIUS) protocol
z
Huawei Terminal Access Controller Access Control System (HWTACACS) protocol
(HWTACACS is an enhancement of TACACS)
Nortel Secure Router 8000 Series
Troubleshooting - VAS
RADIUS
RADIUS is used for communication between the Network Access Server (NAS) and the
RADIUS server on the application layer.
RADIUS adopts the client/server model in which the client runs on the resource side and the
server stores information about the user.
To ensure reliability, RADIUS supports User Datagram Protocol (UDP) packets and a
retransmission and backup server mechanism. The authentication and accounting ports used
by RADIUS are 1645/1646 or 1812/1813.
Figure 1-1 shows the RADIUS packet format.
Figure 1-1 RADIUS message structure
01234567012345670123456701234567
1
Cod eIdenti fierLength
2
3
4
5
6
Attribute......
Authenticator
The following list describes the RADIUS message structure:
z
Code—contains 1 byte, indicating the RADIUS message type. The common code values
are as follows.
1-2 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
Value Packet type Indication Description
1 Access-request Sending an
authentication request
2 Access-accept Accepting the
authentication request
NAS sends an authentication
request to a RADIUS server.
A RADIUS server sends a
response packet to accept the
authentication request.
3 Access-request Rejecting the
authentication request
A RADIUS server sends a
response packet to reject the
authentication request.
4 Accounting-request Sending an
accounting request
5 Accounting-response Responding to the
accounting request
NAS sends an accounting
request to a RADIUS server.
A RADIUS server responds to
an accounting request packet.
The three types of accounting packets are as follows. They are distinguished by the No.40 attributes
area.
z
value of No.40 attributes area is 1: accounting start packets
z
value of No.40 attributes area is 2: hot billing packets
z
value of No.40 attributes area is 3: accounting stop packets
z
Identifier—contains 1 byte, used to match request packets or response packets.
z
Length—contains 2 bytes, indicating the total length of all fields.
z
Authenticator—contains 16 bytes. This value is used to authenticate the reply from the
RADIUS server, and is used in the password hiding algorithm.
z
Attribute—has a flexible length and consists of various attributes. Figure 1-2 shows the
attribute format.
Figure 1-2 Attribute format
01234567012345670123456701234567
TypeLengthValue
− Type—indicates the attribute type.
− Length—indicates the length of every attribute and contains 1 byte.
− Value—indicates the attribute value and is flexible.
The NAS works as the RADIUS client and supports the following:
− standard RADIUS protocol and extended attributes, including RFC2865 and
RFC2866
− Nortel extended RADIUS+1.1 protocol
− active detection on the RADIUS server state
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-3
1 AAA troubleshooting
After receiving an AAA authentication or accounting message, the NAS enables
server detection if the status of the server is Down. It then transforms the message
into a packet and sends the packet to the current server. The NAS regards the server
as normal only after receiving a response packet from the current server.
− local buffer retransmission of Accounting Stop packets
If the number of retransmission events exceeds the value configured, packets are
saved to the buffer queue. The system timer periodically scans the queue, extracts the
packets, sends them to the specific server, and enables the waiting timer. If the
transmission fails or no response packet is received from the server within the
timeout period, the packet is again put back into the buffer queue.
− autoswitch of the RADIUS server
If the waiting timer expires and the current server is Down or the number of
retransmission events exceeds the maximum, another server in the server group
assumes the role of the current server to transmit packets.
1.1.2 Domains and address pool
Domains
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Address pool
Most AAA configurations are related to domains. NAS divides users into different groups
based on the character string that follows the @ symbol in user names. For example,
user0001@isp1 belongs to the domain isp1 and user0002@isp2 belongs to isp2.
If no @ symbol appears in the user name, the user belongs to the default domain.
Users in the same domain have similar attributes. Configuration in a domain view can affect
all users in the domain, and domain resources can be used by all the users in the domain.
You can configure AAA schemes in a domain view. For the default domain, AAA uses the
default schemes for the domain. You can also configure a RADIUS or HWTACACS server
template.
Point-to-Point Protocol (PPP) users can use PPP address negotiation to obtain the IP address
of the local interface from the NAS. The methods are as follows:
z
Use the remote address command in the interface view to allocate an IP address to the
peer.
z
Configure an address pool in the AAA view and then use the remote address pool
command to allocate the address from the address pool to the peer.
Allocating the address from the address pool is the more flexible approach. In addition, the
address pool can be used together with the domain. Configure a global address pool in the
AAA view and a domain address pool in the domain view. Users in the domain can use the
domain address pool preferentially.
1.1.3 Schemes and modes
Authentication schemes and modes
AAA supports four authentication modes:
z
local authentication
1-4 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
z
non-authentication
z
RADIUS authentication
z
HWTACACS authentication
AAA also allows a random combination of the four modes.
Configure the authentication mode in the authentication scheme view. By default, local
authentication is used. Use non-authentication mode only as a last option.
The authentication-mode radius local command uses the RADIUS authentication mode first.
If that fails, it uses the local authentication mode.
Authorization schemes and modes
AAA supports four authorization modes:
z
local authorization
z
direct authorization
z
if-authenticated authorization
z
HWTACACS authorization
AAA also allows a random combination of the four modes.
The authorization-mode hwtacacs local command indicates to use the HWTACACS
authorization mode first. When that fails, it uses the local authorization mode.
In a combination containing the direct authentication mode, direct authentication should be
last, such as authorization-mode hwtacacs local none.
By default, use the local authentication mode. RADIUS performs authentication together with
authorization. RADIUS authorization does not exist.
Accounting schemes and modes
AAA supports six accounting modes:
z
local accounting
z
non-accounting
z
RADIUS accounting
z
HWTACACS accounting
z
combination of RADIUS and local accounting
z
combination of HWTACACS and local accounting
By default, the non-accounting mode is used.
Configure the hot billing interval in the accounting scheme. By default, the interval is 5
minutes.
1.1.4 Server templates
RADIUS server template
The RADIUS server template describes details of the RADIUS server. On the RADIUS server
template, you can configure authentication and accounting servers or backup authentication
and accounting servers as required.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-5
1 AAA troubleshooting
Configure the shared key on the RADIUS server template. The shared key should be the same
as that on the server side.
RADIUS supports a specified source address. You can configure the IP address of the
specified loopback interface as the source address of RADIUS packets. You can then send the
packets to a RADIUS server.
After configuring a RADIUS server template, associate the template name with a domain in
the corresponding domain view.
HWTACACS server template
The HWTACACS server template is different from the RADIUS server template as follows:
z
It contains an authorization server and a backup authorization server.
z
It supports packets with the source address configured directly instead of the address of
the loopback interface.
After configuring an HWTACACS template, associate the template name with a domain in
the corresponding domain view.
Nortel Secure Router 8000 Series
Troubleshooting - VAS
1.2 Troubleshooting local user authentication
This section covers the following topics:
z
Typical networking
z
Configuration notes
z
Troubleshooting flowchart
z
Troubleshooting procedure
1.2.1 Typical networking
Figure 1-3 shows a typical networking diagram for local authentication.
Figure 1-3 Networking diagram of local authentication
Client
PPP Serial 4/ 0/0
9.1.1.1
Host
PPP Serial 1/ 1/0
9.1.1.2
1-6 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
1.2.2 Configuration notes
Item Sub-item Description
Configuring
serial
interfaces on
the client side
Configuring
serial interfaces
Configure the IP
address
Configure PAP
user
authentication
Configure the IP
address
The IP address on the client side must be the same as
that on the host side.
The Password Authentication Protocol (PAP) user
name and password configured on the client side
must be consistent with those on the host side.
The IP address on the host side must be in the same
network segment as that on the client side.
on the host side
Configure PPP
authentication
The PAP user name and password configured on the
host side must be consistent with those on the client
side.
AAA on the
Configure the
domain
Configure the domain to which a PAP user belongs. Configuring
host side
Configure the
Configure the local user in the AAA view.
local user
The following sections cover part of the commands for configuring AAA, RADIUS, and HWTACACS .
For more information, see Nortel Secure Router 8000 Series Configuration Guide - Security
(NN46240-600).
Configuring the serial interface on the client side
Configure an IP address for the serial interface. In PPP/PAP mode, you need to configure the
user name and password.
<Nortel> system-view
[Nortel] interface Serial 4/0/0
[Nortel-Serial4/0/0] ip address 9.1.1.1 255.255.255.0
[Nortel-Serial4/0/0] ppp pap local-user user001@nortel password simple abc123
[Nortel-Serial4/0/0] quit
Configuring the serial interface on the host side
Configure an IP address for the serial interface and set the PPP authentication mode to PAP.
[Nortel] interface Serial 1/1/0
[Nortel-Serial1/1/0] ip address 9.1.1.2 255.255.255.0
[Nortel-Serial1/1/0] ppp authentication-mode pap
[Nortel-Serial1/1/0] quit
Configuring AAA on the host side
Configure local authentication mode.
[Nortel] aaa
[Nortel-aaa] display this
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-7
By default, the newly configured domain is in local authentication mode, so the PAP user
user001@nortel also uses this mode. After passing through local authentication, PPP link
authentication succeeds.
Nortel Secure Router 8000 Series
Troubleshooting - VAS
1-8 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
1.2.3 Troubleshooting flowchart
Figure 1-4 Troubleshooting flowchart of local user authentication
In PAP mode, the
local user
authentication fails
Ensure the PPP in
Normal PPP link?
No
up state when no
authentication mode
is configured
The fault
disappears?
Yes
Yes
Correct PAP
configuration?
Yes
Correct AAA
configuration?
Yes
No
Modify PAP
No
Is the user domain
configured?
No
The fault
disappears?
No
Is the local
authentication mode
configured?
Ensure the password
of the local user is
the same as that
used in PAP
End
Yes
Seek technical
support
No
The fault
disappears?
Yes
End
Troubleshooting procedure
Step 1 Check the PPP link.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-9
1 AAA troubleshooting
If PAP mode is not used, check that the PPP link is Up.
# Configure the serial interface on the client side.
[Nortel] interface Serial 4/0/0
[Nortel-Serial4/0/0] ip address 9.1.1.1 255.255.255.0
[Nortel-Serial4/0/0] quit
# Configure the serial interface on the host side.
[Nortel] interface Serial 1/1/0
[Nortel-Serial1/1/0] ip address 9.1.1.2 255.255.255.0
[Nortel-Serial1/1/0] quit
In normal situations, the host can ping through 9.1.1.1. Use the display this interface
command in the interface view to view that Link Control Protocol (LCP) and IP Control
Protocol (IPCP) are “opened.” If the PPP link is Up, continue with the following steps.
Step 2 Check PAP.
Debug PAP on each interface. The following display indicates that PAP is not configured on
the peer and LCP negotiation fails.
%Sep 16 14:01:54 2005 Nortel PPP/5/NEGOTIATEFAIL:Slot=3;Serial3/0/0:0: We want to
negotiate pap , but the peer doesn't have pap configuration. So LCP negotiate fail, PPP
session will be closed.
Nortel Secure Router 8000 Series
Troubleshooting - VAS
If the PAP link is Up, continue with the following step.
Step 3 Check AAA.
Based on the preceding two steps, you can determine that a problem may exist with AAA. In
this case, check AAA as follows:
1. Use the display this command in the AAA view to check that the domain nortel exists.
2. Check if the user type is consistent with that configured in AAA. You can use the
display local-user command in the user interface view.
3. Check if the authentication scheme of the domain nortel, the default authentication
scheme, or the user-configured authentication scheme is in local authentication mode.
4. Check if user001@nortel is configured in the AAA view and the user001 password
agrees with that of the PAP user.
If the fault persists, contact Nortel technical support.
----End
1.3 Troubleshooting RADIUS authentication
This section covers the following topics:
z
Typical networking
z
Configuration notes
z
Troubleshooting flowchart
z
Troubleshooting procedure
1-10 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
1.3.1 Typical networking
Figure 1-5 shows the networking of RADIUS authentication.
Figure 1-5 Networking diagram of RADIUS authentication
ISDN/
PSDN
Remote User
1.3.2 Configuration notes
Item Sub-item Description
Configuring the
RADIUS
server template
Configure the
authentication
server
NAS
RADIUS Server
The IP address and port of the RADIUS
authentication server are configured.
Note that the port on the template has the same
configuration as that on the RADIUS server.
Configure the
accounting
server
Configure the
shared key
Configure the
user name
format
The IP address and port for the RADIUS accounting
server are configured.
Note that the port on the template has the same
configuration as that on the RADIUS server.
The shared key of the RADIUS server template
should be the same as that on the RADIUS server.
The user name can either contain a domain name or
not contain a domain name.
In this example, the user name does not contain a
domain name.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-11
1 AAA troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configuring
AAA
Enabling FTP
server
Configuring the
RADIUS server
Configure the
authentication
scheme
Configure the
accounting
scheme
Configure the
domain nortel
Enable the FTP
server
Configure
authentication
and accounting
ports
Configure the IP
address and
shared key for
the NAS
Configure
user001
The RADIUS authentication mode is used.
The RADIUS authentication mode is used.
A domain named nortel is created and is associated
with the authentication scheme, accounting scheme,
and RADIUS server template in the domain.
None.
For example, 1812 is the authentication port number
and 1813 is the accounting port number.
Note that the shared key of the NAS should be the
same as that on the RAIDUS server template.
In this example, the domain name is not included in
the user name. You need to configure the password
for user001. In addition, you need to configure the
delivery FTP directory on the RADIUS server.
z
The following sections cover part of the commands for configuring AAA, RADIUS, and
HWTACACS. For more information, see Nortel Secure Router 8000 Series Configuration Guide - Security (NN46240-600).
z
RADIUS servers are configured differently, but they all support the preceding configurations.
Creating a RADIUS server template
Create a RAIDUS server template and configure the IP addresses and the port for the
authentication server and accounting server. Note the following:
z
IP addresses of RADIUS servers are routable.
z
The port configuration on the NAS should be the same as the port configuration on the
server.
z
The shared key on the NAS should be the same as the shared key on the servers.
z
In this example, the user name does not contain the domain name.
Enable the FTP server in the system view of the NAS.
[Nortel] ftp server enable
Info:Start FTP server
Configuring the RADIUS server
Configure the RADIUS server based on the Help files.
Configure the following items:
z
the authentication and accounting ports
z
an IP address and the shared key for the NAS
z
the user name, the password, and the authorization information
Check whether AAA takes effect on the RADIUS server by using the tool provided by the
operating system.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-13
1 AAA troubleshooting
1.3.3 Troubleshooting flowchart
Figure 1-6 Troubleshooting flowchart of RADIUS authentication
The FTP user fails to
pass the RADIUS
authentication
Login record?
Yes
No
Can NAS transmit
the authentication
information to the
RADIUS server?
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Yes
The fault disappears?
No
Failing authentication
information?
No
Can NAS
receivethe authorized
FTP directory?
Yes
Can the user
log on to the NAS
FTP server?
No
Remove the fault
No
based on the failing
authentication
information
Configure the
No
authentication mode
on the RADIUS
server correctly
Yes
Yes
The fault disappears?
No
Yes
The fault disappears?
No
End
Seek the
technical
support
1-14 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
1.3.4 Troubleshooting procedure
Step 1 Check that the RADIUS server displays logon records.
In a normal situation, you can view the logon records by checking the display on the server..
When the user logs on to a RAIDUS server, the server records the user name and successful
authentication. Otherwise, it records the faults and the possible causes.
If there is no records prompt on the server, the authentication relationship is not established
between the NAS and RADIUS server. Check the link, the NAS, and the RADIUS server.
1. Check the link.
If the link is Down, remove the faults on the link.
2. On the NAS, check the following:
− The domain nortel is configured.
− The RADIUS authentication mode is configured in the domain view.
− The RADIUS server template is configured in the domain view.
− The IP addresses and ports of the server are configured.
Then, use the debugging radius packet command to view whether RADIUS packets are sent
If debugging is enabled but no display prompts, the fault is in the NAS. You need to check
whether the domain is associated with the RADIUS server template.
If debugging information exists, you can see the sent RADIUS authentication packet.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-15
1 AAA troubleshooting
The preceding display indicates that the RADIUS authentication packet has been sent out.
You must then check whether the response packet is received. If the following display
prompts, the authentication server is not started. You then need to check the RADIUS
authentication server.
Check whether the IP address and the port of the authentication server are configured
correctly. If so, check whether the RADIUS server is running normally.
To check whether the related services are enabled on ports, use the diagnostic tool provided
by the operating system.
If the RADIUS server and the NAS can receive packets from each other, continue to check
the following.
Step 3 Check whether the RADIUS server displays failing authentication information.
Although the NAS and RADIUS server can communicate, the authentication fails. The cause
is the RADIUS server. Check the following:
Nortel Secure Router 8000 Series
Troubleshooting - VAS
z
The NAS address and the shared key are configured on the RADIUS server.
z
The shared key configured on the RADIUS server is consistent with that on the NAS.
z
The user is configured on the RADIUS server. Note that the server template configured
on the NAS can strip the domain name from the logon user name.
z
The password of the user configured on RADIUS server is consistent with that of the
logon user.
If the authentication fails, the output or the logon record is displayed. You can view the
records to determine the causes for the authentication failure. The possible causes are as
follows:
z
The user name does not exist.
z
The password including the shared key on the server is not consistent with that on the
NAS.
z
The NAS address is not configured.
After the preceding check and modifications, most authentication faults disappear.
If FTP fails after the authentication succeeds, continue to check the following.
Step 4 Check that NAS can receive the authorized FTP directory.
If the FTP logon view displays “503 Logged fail, authentication directory is incorrect or
Connection closed by remote host,” the FTP directory authorization is incorrect.
After RADIUS packet debugging is enabled, you can view that the NAS can receive the
debugging information about authentication response packets sent by the RADIUS server.
Radius Received a Packet
Server Template: 0
Server IP : 192.168.1.202
Server Port : 1812
Protocol: Standard
Code : 2
Len : 33
1-16 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
ID : 15
[Ftp-Directory ] [7 ] [hda1:]
The preceding display indicates that the RADIUS server delivers the attribute of the FTP
directory. The value of the attribute is hda1. If no such display appears, you need to configure
the list of the delivered attributes for the user.
If the fault persists, contact Nortel technical support.
----End
1.4 Troubleshooting cases
This section provides the following troubleshooting cases:
z
FTP user fails to pass through RADIUS authentication
z
Error! Reference source not found.
1.4.1 FTP user fails to pass through RADIUS authentication
Fault symptom
Figure 1-7 Networking diagram of RADIUS authentication
NAS
192.168.1.6
ISDN/
PSDN
Remote
User
RADIUS Server
192.168.1.202
The legal remote user user001@nortel tries to log on to the NAS through FTP and fails to
pass through RADIUS authentication.
Fault analysis
z
Check whether the RADIUS server has records about the logon user. If not, the NAS and
RADIUS sever cannot communicate. Then, check the NAS.
z
Use the debugging radius packets command in the user view of NAS to view output
prompts.
z
If you check AAA, you may find that the domain nortel contains no RADIUS server
template. After configuring a template, view the debugging information on the NAS to
check whether any response packet is received.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-17
1 AAA troubleshooting
z
Check that the authentication port number is the same as that configured on the NAS and
the RADIUS server template.
z
Check that the password configured on the RADIUS server is consistent with the shared
key configured on the NAS.
z
Check that the attributes of the FTP directory are delivered. Then, check that user001
adds the delivered attributes.
z
After attributes of the FTP directory are delivered, the user can log on to the FTP server.
The fault disappears.
Troubleshooting procedure
Step 1 Check whether the RADIUS server has records about the logon user.
Step 2 If there are no logon records, use the debugging radius packet command on the NAS to
check whether NAS has sent out authentication request packets.
Step 3 If the NAS fails to send out authentication request packets, check AAA and the RADIUS
server template on the NAS. Note that the user can view the sent RADIUS authentication
request packets when logging on.
Step 4 If the RADIUS server still has no logon user records, check the IP address and the port
configuration. Note the following:
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Step 5 If the faulty authentication persists when the NAS and RADIUS server can communicate, the
Step 6 If the authentication succeeds but the authorization fails after the NAS and RADIUS server
Summary
z
The server and the NAS can ping through each other.
z
Port configuration on the RADIUS server must be the same as that on the RADIUS
server template.
possible causes are as follows:
z
The NAS address is not added.
z
The shared key on the NAS is incorrect.
z
The user name and password are incorrect.
can communicate, check whether the user is authorized by the RADIUS server.
----End
If RADIUS authentication fails, ensure the following:
z
successful communication between the NAS and the RADIUS server
z
successful authentication
z
successful authorization
You can locate the fault through the debugging information on the NAS and RADIUS server.
1-18 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
1.5 FAQs
Q: Nortel devices and non-Nortel devices use the same TACACS server but the
authentication fails. Why?
A: The user class range set by the third party is different from that set by Nortel. The user
class range set by Nortel is from 0 to 3 and any value that exceeds 3 is incorrect, so the
authentication fails. To remove this fault, configure users for the products of the third party
and Nortel accordingly.
Q: A Telnet user who passes RADIUS authentication cannot enter the system
view? Why?
A: The user is not authorized by the RADIUS server.
z
If shiva (RADIUS software) is used as the RADIUS server, configure exec-privilege for
it; if another type of server is used, configure the extended exec-privilege for it. That is,
add the extended attribute (29) contained in the standard attribute (26) to the related
attribute dictionary.
z
For FTP users, if shiva is used as the RADIUS server, configure ftp-directory for it; if
another type of server is used, configure the extended ftp-directory. That is, add the
extended attribute (29) contained in the standard attribute (26) to the related attribute
dictionary.
Q: How does AAA allocate addresses to PPP users?
A: The address allocation rules are as follows:
z
To the unauthenticated user: If the interface is configured with an IP address, the NAS
allocates the address to the peer directly; if the interface is configured with an IP address
pool, the NAS allocates the address in the address pool to the peer.
z
To the authenticated default domain user: If the RADIUS server delivered the IP address,
the NAS allocates this address to the peer directly; if the RADIUS server delivered the IP
address pool ID, the NAS allocates the address in the global or domain address pool to
the peer. If the RAIDUS server has not delivered the address pool ID but the interface is
configured with an IP address pool, the NAS allocates the address in this global address
pool to the peer.
z
To the authenticated common domain user: If the RADIUS server delivered the IP
address, the NAS allocates the address to the peer directly. If the RADIUS server
delivered the IP address pool ID, the NAS allocates the address in the specified domain
address pool to the peer. If the RAIDUS server has not delivered the address pool ID but
the interface is configured with an IP address, the NAS allocates this address to the peer.
If the interface is configured with an IP address pool, the NAS allocates the address in
the domain address pool to the peer.
In the preceding three cases:
z
If all the addresses in the specified global address pool have been used, the NAS
traverses the entire address pool, starting from the first address pool configured.
z
If all the addresses in the specified domain address pool have been used, the NAS
traverses from the first domain address pool configured. Users in a domain prefer
addresses in the address pool of the domain in which they reside.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-19
1 AAA troubleshooting
z
If all the domain address pools have no address to allocate, the NAS traverses from the
global address pool.
Q: What are the common RADIUS attributes?
A: The following table describes the common RADIUS attributes.
Value Attributes Field format Usage
Nortel Secure Router 8000 Series
Troubleshooting - VAS
1 User-name String (1 to
32)
Configure the user name by using
commands. A user name can either
contain a domain name or not contain a
domain name, for example,
user0001@isp or user0001.
2 Password String (16 to
128)
The encrypted password is valid in
PAP.
3 Challenge-Password String (17) The password (MD5 encrypted
authenticator) is valid in CHAP
authentication.
4 NAS-IP-Address IP address If a RADIUS server is bound with a
specific interface address, use this
address as the IP address of the NAS.
You can also use the address of the
interface from which the packets are
sent.
5 NAS-Port Integer The user access port is in the format of
6 Service-Type Integer Types of users are as follows:
2 indicates the access user.
6 indicates the administrative user.
7 Framed-Protocol Integer The value is fixed to be 1, indicating
PPP type.
8 Framed-IP-Address Address The IP address allocated to the user by
a RADIUS server. If the value is
0xFFFFFFFE, the IP address of the
user should be allocated by a NAS.
9 Framed-Netmask Address The IP address masks allocated to the
user by a RADIUS server.
11 Filter-ID String (1) Indicates the User Control List (UCL)
group and interworking group, which
are in the format
UCL-Group@Inter-Group.
14 Login-IP-Host Address The IP address of the logon user.
1-20 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 1 AAA troubleshooting
Value Attributes Field format Usage
15 Login-Service Integer Indicates the logon user type, such as
Telnet, Rlogin, TCP Cear, PortMaster
(proprietary), and LAT.
18 Reply-Message String (1 to
128)
z
In the authentication acceptance
packet, this indicates successful
authentication.
z
In the authentication rejection
packet, this indicates the failed
authentication.
25 Class String A RADIUS server sends the
authentication acceptance packet
together with the class attributes to a
NAS. The NAS then sends back the
class attributes together with
accounting request packets. On the
standard RADIUS server, the class
attributes also contain the Committed
Access Rate (CAR).
27 Session-TimeOut Integer The timeout period of the user, in
seconds. In the Extensible
Authentication Protocol (EAP)
challenge packets, this indicates the
reauthenticated time for the user.
28 Idle-TimeOut Integer The idle timeout period, in seconds.
31 Calling-Station-Id String Indicates the MAC address.
32 NAS-Identifier String If the NAS ID is configured, the NAS
identifier should be the NAS ID.
Otherwise, the NAS identifier can be
the host name.
40 Acct-Status-Type Integer Indicates the type of accounting
request packets.
z
1 indicates the accounting start
packet.
z
2 indicates the accounting stop
packet.
z
3 indicates the hot billing packet.
z
4 indicates the accounting packet
resetting.
41 Acct-Delay-Time Integer Indicates the time taken to send
accounting packets, in seconds. The
network transmission time is excluded.
42 Acct-Input-Octets Integer Indicates the number of received bytes,
in bytes, Kbytes, Mbytes, or Gbytes.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-21
1 AAA troubleshooting
Value Attributes Field format Usage
43 Acct-Output-Octets Integer Indicates the number of sent bytes, in
44 Acct-Session-Id String The accounting access ID.
45 Acct-Authentic Integer The user authentication mode.
46 Acct-Session-Time Integer The online time of the user, in seconds.
47 Acct-Input-Packets Integer The number of received packets.
48 Acct-Output-Packets Integer The number of packets sent by users.
49 Terminate-Cause Integer The cause for session interruption.
Nortel Secure Router 8000 Series
Troubleshooting - VAS
bytes, Kbytes, Mbytes, or Gbytes.
z
1 indicates RADIUS authentication.
z
2 indicates local authentication.
52 Acct-Input-Gigawords Integer Indicates the number of received bytes
53 Acct-Output-Gigawor
ds
55 Event-Timestamp Integer Indicates the generating time of
60 CHAP-Challenge String (16) Indicates the CHAP challenge field.
61 NAS-Port-Type Integer Indicates the type of the NAS port.
87 NAS-Port-Id String Indicates the port ID of the access user
1.6 Diagnostic tools
32
is a multiple of 4 G (2
Integer Indicates the number of sent bytes is a
multiple of 4 G (2
).
32
).
accounting request packets, in seconds.
This is the absolute second since
00:00:00, January 1
st
, 1970.
in the format slot=XX; subslot=XX;
port=XXX; VLANID=XXXX; or
slot=XX; subslot=XX; port=XXX;
VPI=XXX; VCI=XXXX.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 1-25
Nortel Secure Router 8000 Series
Troubleshooting - VAS Contents
Contents
2 IPSec and IKE troubleshooting ...............................................................................................2-1
2.1 IPSec and IKE overview ...............................................................................................................................2-3
2.2 Troubleshooting manual IPSec SA setup ......................................................................................................2-6
Issue 01.01 (30 March 2009) Nortel Networks Inc. i
Nortel Secure Router 8000 Series
Troubleshooting - VAS Figures
Figures
Figure 2-1 Format of the transport mode packets...............................................................................................2-4
Figure 2-2 Format of the tunnel mode packets...................................................................................................2-4
Figure 2-3 Networking diagram of the manual IPSec SA setup.........................................................................2-6
Figure 2-4 Troubleshooting flowchart of IPSec SA manual setup ...................................................................2-11
Figure 2-5 Networking diagram of setting up ISAKMP IPSec........................................................................2-15
Figure 2-6 Troubleshooting flowchart of SA setup in Phase 1.........................................................................2-20
Figure 2-7 Troubleshooting flowchart of SA setup in Phase 2.........................................................................2-21
Figure 2-8 Networking diagram of setting up SA using an IPSec policy template ..........................................2-25
Figure 2-9 Troubleshooting flowchart of setting up IPSec SA using an IPSec policy template....................... 2-30
Figure 2-10 Networking diagram of IPSec NAT..............................................................................................2-33
Figure 2-11 Troubleshooting flowchart of NAT traversal in IPSec..................................................................2-40
Figure 2-12 Networking diagram of configuring IPSec...................................................................................2-43
Figure 2-13 Troubleshooting flowchart of GRE over IPSec ............................................................................2-46
Figure 2-14 Networking diagram of IPSec setup .............................................................................................2-48
Issue 01.01 (30 March 2009) Nortel Networks Inc. iii
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
2 IPSec and IKE troubleshooting
About this chapter
The following table shows the contents of this chapter.
Section Description
2.1 IPSec and IKE overview This section describes the concepts you need to know
before troubleshooting IP Security (IPSec) and Internet
Key Exchange (IKE).
2.2 Troubleshooting manual
IPSec SA setup
2.3 Troubleshooting ISAKMP
SA
2.4 Troubleshooting SA setup
using an IPSec policy template
2.5 Troubleshooting NAT
traversal in the IPSec tunnel
This section contains configuration notes for manually
setting up IPSec Security Association (SA) and provides
the troubleshooting flowchart and procedure for a typical
IPSec SA network.
This section contains configuration notes for Internet
Security Association and Key Management Protocol
(ISAKMP) and provides the troubleshooting flowchart
and procedure for a typical ISAKMP network.
This section contains notes about configuring SA setup
using an IPSec policy template and provides the
troubleshooting flowchart and procedure for a typical
network. environment
This section contains notes about configuring Network
Address Translation (NAT) traversal in the IPSec tunnel
and provides the troubleshooting flowchart and procedure
for a typical network environment.
2.6 Troubleshooting GRE over
IPSec or L2TP over IPSec
2.7 Troubleshooting cases This section presents several troubleshooting cases.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-1
This section contains configuration notes for Generic
Routing Encapsulation (GRE) over IPSec or Layer Two
Tunneling Protocol (L2TP) over IPSec. It provides the
troubleshooting flowchart and procedure for a typical
network of GRE over IPSec or L2TP over IPSec.
2 IPSec and IKE troubleshooting
Section Description
2.8 FAQs This section lists frequently asked questions (FAQs) and
2.9 Diagnostic tools This section describes common diagnostic tools: display
Nortel Secure Router 8000 Series
Troubleshooting - VAS
their answers.
commands and debugging commands.
2-2 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
2.1 IPSec and IKE overview
The IP Security (IPSec) protocol suite is a series of protocols defined by the Internet
Engineering Task Force (IETF). It provides high-quality, interoperable, and cryptology-based
security for IP packets.
IPSec consists of two protocols:
z
Authentication Header (AH) protocol
z
Encapsulating Security Payload (ESP) protocol
Internet Key Exchange (IKE) supports autonegotiation of keys. It sets up and maintains the
Security Association (SA) to simplify IPSec application and management.
The IKE protocol is based on the Internet Security Association and Key Management Protocol
(ISAKMP). It provides automatic protection, through which the following tasks can be
performed in an unsafe network:
z
distributing shared keys
z
authenticating the user
z
setting up an IPSec SA
Security Association
IPSec provides secure communication between two ends, called IPSec peers. It allows users
or administrators to control the granularity of security services between peers.
An SA is standard for some elements of communication peers and is the basis of IPSec. It
determines the following:
z
which protocol to apply (AH, ESP or both)
z
which encapsulation mode to apply (transport mode or tunnel mode)
z
which cryptographic algorithm to apply (DES or 3DES)
z
the shared key in the specified protected data flow and its duration
An SA is unidirectional, so you need at least two SAs to protect data flow in bidirectional
communication.
An SA is uniquely identified by the following three parameters:
z
Security Parameter Index (SPI)
The SPI is a 32-bit number generated to uniquely identify an SA. It is contained in the
AH/ESP header during transmission.
z
destination IP address
z
security protocol ID (AH or ESP)
The SA duration is calculated as follows:
z
Time-based duration: updates the SA at a specific interval.
z
Traffic-based duration: updates the SA after transmission of certain data (bytes).
Regardless of the type of duration, when it expires, the SA becomes invalid. Before this
occurs, IKE negotiates to set up a new SA for IPSec. The new SA is available when the old
SA becomes invalid.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-3
2 IPSec and IKE troubleshooting
IPSec encapsulation modes
The SA specifies the protocol encapsulation modes. IPSec has two encapsulation modes:
z
Transport mode: AH/ESP is inserted following the IP header but before all transport
layer protocols or all other IPSec protocols.
mode packets.
z
Tunnel mode: AH/ESP is inserted before the original IP header but after the new IP
header.
Figure 2-1 Format of the transport mode packets
Figure 2-2 shows the format of tunnel mode packets.
new IP Header ESPdataTCP Headerraw IP HeaderESP Tail ESP Auth data
Tunnel
raw IP Header
ESPdata ESP Tail ESP Auth datanew IP HeaderTCP HeaderAH
raw IP Header
Transport mode is suitable for communication between two hosts or between a host and a
security gateway. In this mode, the two devices that encrypt or decrypt packets must be the
original packet sender and the final receiver respectively.
Tunnel mode is suitable for communication between two security gateways.
Authentication algorithms and encryption algorithms
z
Authentication algorithms
AH and ESP can authenticate the integrity of an IP packet to determine whether the
packet is modified during transmission. Authentication is implemented based on the hash
function. IPSec peers calculate the message summary. If they get the same summaries, it
indicates the packet is integrated and unmodified. The two types of IPSec authentication
algorithms are as follows:
2-4 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
− Message Digest 5 (MD5) enters a message of any length and generates a 128-bit
message summary.
− Secure Hash Algorithm (SHA-1) enters a message less than 2
64
bits and generates a
160-bit message summary.
The SHA-1 summary is longer than that of MD5; therefore, using SHA-1 is safer than
using MD5.
z
Encryption algorithms
ESP can encrypt an IP packet to prevent disclosure of the packet contents during
transmission. The encryption algorithm is implemented through a symmetric key system.
Data is encrypted or decrypted with the same key. IPSec uses two types of encryption
algorithms:
− DES encrypts 64-bit clear text by using a 56-bit key.
− 3DES encrypts clear text by using three 56-bit DES keys (168-bit key).
The 3DES encryption algorithm is safer than DES; however, 3DES data encryption
speed is slower.
Negotiation modes
There are two negotiation modes for setting up an SA:
z
Manual mode (manual): All information about the SA must be configured manually.
This mode does not support some advanced IPSec features, such as updating shared keys
at specific intervals. Manual mode can, however, implement IPSec independent of IKE.
z
IKE autonegotiation mode (isakmp): This mode is easier because the SA can be set up
and maintained through the IKE security policies.
IKE security mechanism
The IKE security mechanisms are as follows:
z
Diffie-Hellman (DH) exchange and shared key distribution: DH is a public shared key
algorithm. The two parties can exchange some data and then calculate the shared key
instead of exchanging shared keys directly.
z
Perfect Forward Secrecy (PFS): Indicates that one breached password does not affect
other keys because they have no derivation relationship. This feature is implemented by
adding shared key exchange to Phase 2 IKE negotiation.
z
Authentication: Identifies two communication parties.
z
Protection: Protects authentication data by encrypting them with shared keys.
IKE exchange phases
IKE implements IPSec shared key negotiation and sets up an SA in two phases:
z
Phase 1: Create a security tunnel that passes the authentication between two
communication parties. In addition, set up an ISAKMP SA, also called an IKE SA.
z
Phase 2: Set up IPSec SA setup negotiation on the created security tunnel to ensure
secure IP data transmission.
IKE negotiation modes
In Phase 1, IKE has two negotiation modes:
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-5
Nortel Secure Router 8000 Series
2 IPSec and IKE troubleshooting
z
Main mode: Isolates the shared key exchange from the authentication information to
ensure the user’s identity.
z
Aggressive mode: Allows transmitting payloads related to the SA, shared key, and
authentication.
2.2 Troubleshooting manual IPSec SA setup
This section covers the following topics:
z
Typical networking
z
Configuration notes
z
Troubleshooting flowchart
z
Troubleshooting procedure
2.2.1 Typical networking
Based on Figure 2-3, you can set up an IPSec SA manually.
Troubleshooting - VAS
Figure 2-3Networking diagram of the manual IPSec SA setup
Router A
10.1.1.
1
10.1.1.
2
Pos1/0/1
202.38.163.1
The networking environment is as follows:
z
Set up the IPSec SA manually.
z
Create a security tunnel between Router A and Router B.
z
Provide security protection to the data flow between the two network segments 10.1.1 x
and 10.1.2.x.
z
Specify the security protocol, the encryption algorithm, and the authentication algorithm.
2.2.2 Configuration notes
Internet
Pos2/0/1
Router B
202.38.162.1
10.1.2.
1
10.1.2.
2
Item Sub-item Description
Configuring the
ACL
Configure the ACL
number
Configure the source
and destination address
specified in ACL rules
Use the advanced Access Control List
(ACL), ranging from 3000 to 3999.
Specify the source and destination IP
address of the data flow to protect. Nortel
recommends that you avoid using the
keyword any.
2-6 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Item Sub-item Description
Configuring the
IPSec proposal
Configuring the
IPSec policy
Configure the source
and destination port
specified in ACL rules
Configure the other
items in ACL rules
Configure the number of
ACL rules
Configure the name of
the IPSec proposal
Configure the
encapsulation mode
Configure the security
protocol
Configure the
authentication algorithm
Configure the
encryption algorithm
Configure the name of
the IPSec policy
Optional.
Not required.
Configure only one rule.
The name is a string of 1 to 15 characters.
Transport mode or tunnel mode.
AH, ESP, or AH-ESP.
MD5 or SHA-1.
DES or 3DES.
The name is a string of 1 to 15 characters.
Policies with the same name are in a policy
group. The name and sequence number
define one policy; each policy group has a
maximum of 10000 policies.
Configure the sequence
number of the IPSec
policy
Configure the
The sequence number ranges from 1 to
10000. The lower the value, the higher the
priority.
Set up SAs manually.
negotiation mode
Configure the ACL Each security policy can use only one ACL
rule. If there are several ACL rules, the last
configured ACL takes effect.
Configure the IPSec
protocol used
In IPSec SA manual setup, each policy can
use only one proposal.
Remove the previously configured proposal
before you establish a new one.
The security protocol, the algorithm, and
the encapsulation type must be the same on
the two ends of the tunnel.
Configure the IP address
The IP address for the peer.
of the peer
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-7
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configure the SPIs of
SAs
Configure the
authentication shared
keys for SAs
Configure SAs on inbound and outbound
directions.
Note the following:
z
SA parameters on both ends should
match.
z
The SPI on the local inbound direction
should be the same as that on the
outbound direction of the peer.
z
The SPI on the local outbound direction
should be the same as that on the inbound
direction of the peer.
Configure the authentication shared keys
both on inbound and outbound directions.
Note the following:
z
SA parameters on the two ends should
match.
z
The authentication shared key on the local
inbound should be the same as that on the
outbound of the peer.
z
The authentication shared key on the local
outbound direction should be the same as
that on the inbound direction of the peer.
The shared key has two formats:
z
hexadecimal numerals
z
character string
Use the sa string-key command to enter a
character string or use the
sa authentication-hex command to enter
hexadecimal numerals.
If both formats are used, the format used
last takes effect.
Note: Use the same shared key format on
the two ends. For example, if the shared key
is a character string on one end but is in
hexadecimal numeral format on the other,
the IPSec tunnel cannot be set up.
Configure the
encryption shared keys
If the ESP protocol is used, configure the
encryption shared key.
for SAs
2-8 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Item Sub-item Description
Configuring the
IPSec policy
Configure the interface
type and ID
group
application
Configure the name of
the IPSec policy group
The Secure Router 8000 Series implements
IPSec not only on physical interfaces, such
as the serial interface and the Ethernet
interface, but also on virtual interfaces, such
as the tunnel interface and the virtual
template interface. That is, IPSec is also
applicable on the GRE or L2TP tunnel.
Applying an IPSec group means using all
IPSec policies so that different data flow
can be protected by different IPSec policies.
Note that an interface can be configured
with only one IPSec policy group. If
another policy group is required, remove the
previous group. One policy group can be
applied to several interfaces.
Sent packets search IPSec policies and
select the one with the lowest sequence
number. If the packets match an ACL rule,
the policy using this ACL is applied. If they
do not match an ACL rule, they continue to
search the following policies. Finally, if no
matching ACL rules are configured, packets
are sent directly without security protection.
Router A serves as an example for the configuration notes for setting up SAs manually. Router
B and Router A are mutually mirroring.
The following sections cover part of the commands for configuring IPSec SA. For more information, see
Nortel Secure Router 8000 SeriesConfiguration Guide - Security (NN46240-600).
Configuring an ACL
# Configure an ACL, permitting the data flow from 10.1.1.x to 10.1.2.x.
[RouterA] acl number 3101
[RouterA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0
0.0.0.255
Configuring an IPSec proposal
# Configure the name of the IPSec proposal to tran 1, the encapsulation mode to tunnel mode,
the protocol to ESP, the authentication algorithm to SHA-1, and the encryption algorithm to
DES.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-9
2 IPSec and IKE troubleshooting
Configuring an IPSec policy
# Configure the name of the IPSec policy to map1. In this policy, set the sequence number to
10 and the negotiation mode to manual; use the ACL and the IPSec proposal; and configure an
IP address, SPI, and the shared key for the remote tunnel end.
2-10 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
2.2.3 Troubleshooting flowchart
Figure 2-4 Troubleshooting flowchart of IPSec SA manual setup
IPSec tunnel
fails
Can two ends of the
tunnel with no IPSec policy ping
through each other ?
Yes
Are adopted
ACLs on two ends
mutual-mirroring?
Yes
Are adopted
IPSec proposals on two
ends consistent?
Yes
The start and
the end points defined on two ends
are the same
Yes
Are the manually
configured SPIs on two ends
inretroactive agreement?
Check the route
No
and the physical
No
No
adopted IPSec
No
Modify the start
and the end
No
link between
them
Modify ACLs
Modify the
proposals
points
Modify SPIs
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
Yes
Yes
Yes
Yes
Yes
Yes
Are manually
configured authentication
and encryptionshared keys
in retroactive
agreement?
Yes
The fault disappears?
Yes
No
No
Modify the
authentication
and encryption
shared keys
Seek
technical
support
No
The fault
disappears?
No
End
Yes
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-11
2 IPSec and IKE troubleshooting
2.2.4 Troubleshooting procedure
Step 1 Check whether two ends of the tunnel are reachable with no IPSec policy applied.
Use the undo ipsec policy command on interfaces at the IPSec tunnel ends.
On PC A, ping PC B.
A failed ping indicates a faulty route or link between PC A and PC B. For information about
removing the fault, see Nortel Secure Router 8000 Series Troubleshooting - IP Routing
(NN46240-706).
If the ping succeeds, the fault may be related to IPSec. Continue with the following steps.
Step 2 Check that ACLs used in IPSec policies at two ends are mutually mirroring.
Use the display acl 3101 command on Router A and Router B to check that the source and
destination addresses defined in the ACL rules are mutually mirroring.
# View the ACL on Router A.
<RouterA> display acl 3101
Advanced ACL 3101, 1 rule
Acl's step is 5
rule 5 permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255 (0 ti
mes matched)
Nortel Secure Router 8000 Series
Troubleshooting - VAS
# View the ACL on Router B.
<RouterB> display acl 3101
Advanced ACL 3101, 1 rule
Acl's step is 5
rule 5 permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255 (0 ti
mes matched)
If the source and destination addresses are not mutually mirroring, modify the ACL rules. If
they are mutually mirroring, continue with the following steps.
Step 3 Check that IPSec proposals applied on the tunnel ends are consistent.
Use the display ipsec proposal name command on Router A and Router B to view whether
The preceding display indicates that the IPSec policy is applied to the interfaces. If it is not,
the following two items are null.
Using interface: { }
tunnel local address: 0.0.0.0
Note the following:
z
The IPSec tunnel is bidirectional. For one data flow, you must configure SAs on the
inbound direction and the outbound direction. Therefore, SPIs, authentication shared
keys, and encryption shared keys on the outbound of Router A should be the same as
those on the inbound of Router B, while SPIs, authentication shared keys, and encryption
shared keys on the inbound of Router A should be the same as those on the outbound of
Router B.
z
The local and remote addresses of the two tunnel ends on Router A and Router B should
be in retroactive agreement. That is, the tunnel local address of Router A is in agreement
with the tunnel remote address on Router B, and the tunnel remote address on Router A
is in agreement with tunnel local address on Router B.
If the configuration on the two ends is consistent, continue with the following steps.
Step 5 Check whether SAs are generated.
SAs are generated when some matched data passes the interface after IPSec policies are
applied. Use the display ipsec sa policy command to view the SA setup.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-13
Compare the SA setup on Router A and Router B. If the SAs are not in retroactive agreement,
modify the incorrect SA configuration.
If the fault persists, contact Nortel technical support.
----End
2.3 Troubleshooting ISAKMP SA
This section covers the following topics:
z
Typical networking
z
Configuration notes
z
Troubleshooting flowchart
z
Troubleshooting procedure
2.3.1 Typical networking
Figure 2-5 shows the IPSec SA setup in ISAKMP mode.
2-14 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Figure 2-5Networking diagram of setting up ISAKMP IPSec
Router A
10.1.1.
1
10.1.1.
2
Pos1/0/1
202.38.163.1
The networking environment is as follows:
z
Set up IPSec SA in IKE negotiation mode.
z
Create a security tunnel between Router A and Router B.
z
Provide security protection to the data flow between the two network segments 10.1.1.x
and 10.1.2.x.
z
Specify the security protocol, the encryption algorithm, and the authentication algorithm.
2.3.2 Configuration notes
Item Sub-item Description
Internet
Pos2/0/1
Router B
202.38.162.1
10.1.2.
1
10.1.2.
2
Configuring the
ACL
Configuring the
IPSec proposal
Configuring the
local ID for IKE
Configuring IKE
proposals
Configure the ACL
number
Configure the source
and destination
addresses specified in
ACL rules
Configure the source
and destination ports
specified in ACL rules
Configure the other
items in ACL rules
Configure the number
of ACL rules
Configure the name of
an IPSec proposal
Configure the
encapsulation mode
Configure the security
protocol
Use the advanced ACL, ranging from 3000
to 3999.
Specify the source and destination IP
address of the data flow to protect. Nortel
recommends that you avoid using the
keyword any.
Optional.
Not required.
Configure only one ACL rule.
The name of an IPSec proposal has 1 to 15
characters.
Transport mode or tunnel mode.
AH, ESP, or AH-ESP.
Configure the
MD5 or SHA-1.
authentication algorithm
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-15
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configure the
encryption algorithm
Configure the local ID
for IKE
Configure the priority of
the IKE proposal
Configure the
authentication mode
Configure the
authentication algorithm
Configure the
encryption algorithm
DES or 3DES.
In the aggressive negotiation mode, if name
is used as the local authentication type,
configure the local ID.
In the main mode, the local ID is not
necessary.
This is an integer from 1 to 100, indicating
the priority of a specified IKE proposal.
The lower the value, the higher the priority.
Specify pre-shared key as the IKE proposal
authentication mode. You need to configure
the authenticator for pre-shared key.
By default, the authentication mode is
pre-shared key.
MD5 or SHA-1.
By default, the authentication algorithm is
SHA-1.
DES or 3DES.
By default, the encryption algorithm is DES.
IKE peer
Configure the
Diffie-Hellman group
flag
Configure the ISAKMP
SA duration
Configure the name of
the IKE peer
Configure the IKE
negotiation mode
The Diffie-Hellman group flag can be
group1 (768 bits) or group2 (1024 bits).
By default, use group1 (768 bits) as the
Diffie-Hellman group.
Specify the ISAKMP SA duration, ranging
from 60 to 604800 seconds. The default is
86400 seconds per day.
Before the duration expires, a new SA
negotiation is set up to replace the old SA.
Use the old SA until the new SA negotiation
is complete. When the new SA is set up, the
old one is removed.
In IKE negotiation, the DH algorithm is
required. To ensure secure communication
in ISAKMP SA updates, configure the
duration to more than 10 minutes.
The name is a string of 1 to 15 characters. Configuring the
Main mode or aggressive mode.
By default, main mode is used.
2-16 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Item Sub-item Description
Configure the IKE
proposal ID
Configure the local ID
type
Configure the
authenticator
Configure the IP
addresses or address
segments of the peer
In main mode, use the configured IKE
proposal.
In aggressive mode, use the default IKE
proposal.
Specify the IKE ID. This can be an IP
address or the name of the IKE peer.
In main mode, only the IP address can be
the local ID. By default, the IP address is
the IKE ID.
Currently, only the pre-shared key
authentication type is applicable.
You need to configure shared keys on the
peer. The shared keys at two ends must be
the same.
Configure the IP addresses or address
segments for the IKE peer. If
high-ip-address is not specified, configure
only one IP address for the IKE peer.
Here, the peer should be configured as an IP
address, but not an IP address segment
Configuring
IPSec policies
Configure the peer
name
The name is a string of 1 to 15 characters.
If “name” is used as the local authentication
mode, specify the peer name.
Enable NAT By default, NAT is disabled.
Before configuring the IKE peer, disable
NAT
Configure the name of
the IPSec policy
The name is a string of 1 to 15 characters.
Policies with the same name are in a policy
group. The name and sequence number
define one policy; each policy group has a
maximum of 100 policies.
Configure the sequence
number of the IPSec
policy
Configure the
The sequence number ranges from 1 to
10000. The lower the value, the higher the
priority.
Set up SAs in ISAKMP mode.
negotiation mode
Configure the ACL Each IPSec policy can use only one ACL.
Configure the IPSec
protocol
The security protocol, algorithm, and
encapsulation type must be the same on the
two ends of the tunnel.
Configure the IKE peer The IPSec policy uses the IKE peer.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-17
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configure PFS PFS is enabled in IPSec negotiation.
By default, PFS is disabled.
Perform a PFS exchange in the IPSec
negotiation. If you are specifying PFS on
the local end, you need to enable PFS
exchange when the peer initiates the
negotiation; that is, in Phase 2, add an
additional shared key exchange to ensure
high security. The Diffie-Hellman group
specified on the two ends must be the same
or the negotiation fails.
Configuring the
IPSec policy
Configure the interface
type and ID
group
application
Configure the name of
IPSec policy group
Router A serves as an example of the configuration notes for setting up ISAKMP SAs. The
configurations on Router B are the same as the configurations on Router A.
The following sections cover part of the commands for configuring ISAKMP SA. For more information,
see Nortel Secure Router 8000 Series Configuration Guide - Security (NN46240-600).
Configuring the local ID for IKE
# Configure the host local ID in aggressive IKE negotiation mode.
<RouterA> system-view
[RouterA] ike local-name routera
Indicates the interface on which the IPSec
policy is applied..
For configuration notes, see the notes for
Troubleshooting manual IPSec SA setup .”
“
Apply only one IPSec policy group on one
interface.
For configuration notes, see the notes for
Troubleshooting manual IPSec SA setup .”
“
Configuring an IKE proposal
Use the default IKE proposal between the IKE peers.
Configuring the IKE peer
# Configure the name of the IKE peer to routerb, use aggressive negotiation mode, use
“name” as the ID authentication type, preset the shared key to nortel, and set the remote IP
address to 202.38.162.1. Note that shared keys configured on the peers must be consistent.
[RouterA] ike peer routerb
[RouterA-ike-peer-routerb] exchange-mode aggressive
[RouterA-ike-peer-routerb] local-id-type name
[RouterA-ike-peer-routerb] pre-shared-key nortel
[RouterA-ike-peer-routerb] remote-name routerb
2-18 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
# Configure an ACL, specifying the data flow from 10.1.1.x to 10.1.2.x.
[RouterA] acl number 3101
[RouterA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0
0.0.0.255
2. Configure an IPSec proposal.
# Specify the name of the IPSec proposal as tran1. In this proposal, set the protocol
encapsulation mode to tunnel mode, the security protocol to ESP, the authentication
algorithm to SHA1, and the encryption algorithm to DES.
# Specify an IPSec policy named map1. The sequence number is 10 and the negotiation
mode is ISAKMP. In this policy, use the configured ACL and the security proposal and
specify the IKE peer.
Figure 2-6 and Figure 2-7 show the troubleshooting flows both in Phase 1 and in Phase 2.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-19
2 IPSec and IKE troubleshooting
Figure 2-6 Troubleshooting flowchart of SA setup in Phase 1
Fail to set
up SAs in
Phase 1
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Are IKE
proposals on two
ends the
same?
Yes
The two
ends have the
same shared
key
Yes
Correct
peer addresses
specified on each
end?
Yes
Is the
negotiation mode
in aggressive
mode?
No
Modify IKE proposal
configurations.
No
Modify the shared
keys
No
Modify the IKE peers
No
Seek technical
support
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
Yes
End
Yes
End
Yes
End
Yes
Configure
name to be local
authentication
Yes
correct IKE local
ID?
Yes
Seek technical
support
ID
No
No
Seek technical
support
Modify local ID
configuration
The fault
disappears?
No
Yes
End
2-20 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Figure 2-7 Troubleshooting flowchart of SA setup in Phase 2
Fail to set
up SAs in
Phase 2
Succeed
to set up SAs in
Phase 1
Yes
Are proposals
on two ends
consistent?
Yes
Are adopted
ACLs on two ends
mutual-mirroring?
Yes
The fault
disappears?
No
No
No
Remove faults
based on the Phase
1 SA troubleshooting
flow
Modify IKE
proposal
configurations
Modify ACLs
No
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
Seek technical
support
Yes
End
Yes
End
Yes
End
Yes
End
2.3.4 Troubleshooting procedure
Step 1 Check whether two ends of the tunnel are reachable with no IPSec policy applied.
Use the undo ipsec policy command on two ends of the IPSec tunnel.
On PC A, ping PC B.
A failed ping indicates a faulty route or link between PC A and PC B. For information about
removing the fault, see Nortel Secure Router 8000 Series Troubleshooting - IP Routing
(NN46240-706).
If the ping succeeds, continue with the following steps.
Step 2 Check whether the SA is set up in Phase 1.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-21
2 IPSec and IKE troubleshooting
Use the display ike sa command to view SAs in Phase 1.
<RouterA> display ike sa
connection-id peer VPN flag phase doi
The display indicates that in Phase 1, the SA on the peer 202.38.162.1 has been set up. If no
SA is displayed or the flag is not RD, it indicates that SA setup in Phase 1 fails.
You then need to check the IKE proposals and the IKE peer on the two ends.
1. Check the IKE proposals configured on the tunnel ends.
Users can apply the default IKE proposal or specify flexible proposals. Use the display ike proposal command to check whether configurations on both ends are the same.
<RouterA> display ike proposal
priority authentication authentication encryption Diffie-Hellman duration
method algorithm algorithm group (seconds)
Use the display ike peer name command to view the IKE peer.
<RouterA> display ike peer name routerb
-------------------------- IKE Peer: routerb
exchange mode: aggressive on phase 1
pre-shared-key: nortel
proposal:
local id type: name
peer ip address: 202.38.162.1
peer name: routerb
nat traversal: disable
---------------------------
If the SA is set up successfully in Phase 1, continue with the following steps.
Step 3 Check whether the SA is set up in Phase 2
Use the display ike sa command to view SAs in Phase 2.
<RouterA> display ike sa
connection-id peer flag VPN phase doi
The preceding display indicates that in Phase 1 and Phase 2, SAs on the peer 202.38.162.1
have both been set up. If no SA is displayed or the flag is not RD, it indicates that SA setup in
Phase 2 fails.
After IKE SA setup in Phase 2 is complete, an IPSec SA is generated based on the Phase 2
IKE SA and then delivered to IPSec.
An IPSec SA has an inbound and an outbound. You can use the display ipsec sa policy
command to view IPSec SAs specified with IPSec policies.
2-22 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
---------------------------- connection id: 37
encapsulation mode: transport
tunnel local : 202.38.163.1 tunnel remote: 202.38.162.1
[inbound ESP SAs]
spi: 2940433602 (0xaf4374c2)
proposal: ESP-ENCRYPT-DES ESP-AUTH-SHA1
sa remaining key duration (bytes/sec): 1887436496/708
max received sequence-number: 4
udp encapsulation used for nat traversal: N
[outbound ESP SAs]
spi: 3424984209 (0xcc251c91)
proposal: ESP-ENCRYPT-DES ESP-AUTH-SHA1
sa remaining key duration (bytes/sec): 1887436448/708
max sent sequence-number: 5
udp encapsulation used for nat traversal: N
You can also use the display ipsec sa brief command to display brief information about
If SA setup in Phase 2 fails, the reasons are as follows:
z
IPSec proposals or IPSec policies configured on the peer are mismatched.
z
ACLs at two ends are not mutually mirroring.
You can use the display ipsec proposal name command and the display ipsec policy name
command on two ends to view IPSec proposals and policies and check whether ALCs are
mutually mirroring.
For more information, see “
Troubleshooting manual IPSec SA setup .”
If the SA is set up successfully in Phase 2, continue with the following steps.
Step 4 Check whether IPSec can encapsulate or decapsulate packets based on the SA.
Use the debugging ipsec packet command to view IPSec packet encapsulation and
decapsulation. You can also use the display ipsec statistics command to view IPSec statistics.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-23
2 IPSec and IKE troubleshooting
dropped security packet detail:
no enough memory: 0
can't find SA: 2
queue is full: 0
authentication is failed: 0
wrong length: 0
replay packet: 0
too long packet: 0
wrong SA: 0
with secp,process packets failure statistics:
m2cqueue full: 0 m2csend: 0 m2ctimer: 0
c2mid: 0 c2msequence: 0 secpprocess: 0
Yon can view the sent and received IPSec packets. Routers can classify lost packets based on
packet loss causes.
If the fault persists, contact Nortel technical support.
----End
Nortel Secure Router 8000 Series
Troubleshooting - VAS
2.4 Troubleshooting SA setup using an IPSec policy
template
This section covers the following topics:
z
Typical networking
z
Configuration notes
z
Troubleshooting flowchart
z
Troubleshooting procedure
2.4.1 Typical networking
Some uncertain factors exist in the network, such as the IP addresses of mobile users. IP
addresses assigned to mobile users differ each time they dial in. In this way, the IP addresses
of IPSec tunnel ends and the protected data flow are not specified and problems occur with
IPSec deployment. In this case, configure an IPSec policy template on the receiver.
Figure 2-8 shows the networking diagram for setting up SAs using an IPSec policy template.
Based on this diagram, you can also remove faults occurring in SA setup.
2-24 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Figure 2-8 Networking diagram of setting up SA using an IPSec policy template
PC C
The networking environment is as follows:
z
Set up an IPSec tunnel between Router A and PC C. The IP address of PC C is uncertain.
z
Set up an SA using an IPSec policy template on Router A.
z
Provide security protection to the data flow between PC A (at 10.1.1.x) and PC C.
z
Specify the security protocol, the encryption algorithm, and the authentication algorithm.
2.4.2 Configuration notes
Item Sub-item Description
Internet
202.38.163.1
GE1/0/1
Router A
10.1.1.X
Ethernet
PC A
10.1.1.2
Configuring the
ACL
Configuring the
IPSec proposal
Configuring the
local ID for IKE
Configuring the
IPSec proposal
Configure the ACL Not required.
Configure the name of
The name is a string of 1 to 15 characters.
the IPSec proposal
Configure the
Transport mode or tunnel mode.
encapsulation mode
Configure the security
AH, ESP, or AH-ESP.
protocols
Configure the
MD5 or SHA-1.
authentication
algorithm
Configure the
DES or 3DES.
encryption algorithm
Configure the local ID
for IKE
Configure the priority
of the IKE proposal
Configuration required only in aggressive
negotiation mode.
This is an integer from 1 to 100, indicating
the priority of a specified IKE proposal.
The lower the value, the higher the
priority.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-25
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configure the
authentication mode
Configure the
authentication
algorithm
Configure the
encryption algorithm
Configure the
Diffie-Hellman group
flag
Configure the
ISAKMP SA duration
Specify pre-shared key for the IKE
proposal authentication mode. You need to
configure the authenticator for pre-shared
key.
By default, the authentication mode is
pre-shared key.
MD5 or SHA-1.
By default, the authentication algorithm is
SHA-1.
DES or 3DES.
By default, the encryption algorithm is
DES.
The Diffie-Hellman group flag can be
group1 (768 bits) or group2 (1024 bits).
By default, use group1 (768 bits) as the
Diffie-Hellman group.
Specify an ISAKMP SA duration.
For configuration notes, see the notes for
“Troubleshooting ISAKMP SA.”
Configuring the IKE
peer
Configure the name of
the IKE peer
Configure the IKE
negotiation mode
Configure the IKE
proposal number
Configure the local ID
type
Configure the
authenticator
Configure the IP
addresses or address
segments of peers
The name is a string of 1 to 15 characters.
Main mode or aggressive mode. By
default, main mode is used.
In main mode, use the configured IKE
proposals.
In aggressive mode, use the default IKE
proposals.
Specify an IKE ID. This can be the IP
address or the name of the IKE peer. In
main mode, the IP address is configured as
the local ID.
By default, the IP address is used.
Currently, only the pre-shared key
authentication type is applicable.
You must configure shared keys on all
peers. The shared key of two ends in the
same SA must be the same.
Configure the IP addresses or address
segments for an IKE peer.
Nortel recommends that you configure an
IP address range for the remote end rather
than specify the IP address.
2-26 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Item Sub-item Description
Configuring the
IPSec policy
template
Configure the peer
name
The name is a string of 1 to 15 characters.
If the local authentication mode is name,
you need to specify the peer name.
Enable NAT By default, NAT is disabled.
Configure the name of
the IPSec policy
template
The name is a string of 1 to 15 characters.
Policies with the same name are in a
policy group. The name and sequence
number define one policy; each policy
group has a maximum of 100 policies.
Parameters of the IPSec policy template
must be the same as those of IPSec
ISAKMP.
Note that parameters such as proposal and
ike-peer are mandatory while other
parameters are optional.
In IKE negotiation, if the IPSec policy
template is used, all configured parameters
on the two ends must match. If no
parameters are configured for an IPSec
policy template, the parameters of the
IPSec policy are the same as those of the
initiator.
Configuring the
IPSec policies and
using the IPSec
policy template
Configure the
sequence number of
the IPSec policy
template
Configure the
negotiation mode
The sequence number of the IPSec policy
template ranges from 1 to 10000.
The lower the sequence number, the
higher the priority.
This is null because you can only use
ISAKMP mode.
Configure the ACL This can be unspecified.
Configure the IPSec
protocol
The security protocol, algorithm, and
encapsulation type must be the same on
two ends of the tunnel.
Configure the IKE
Configure the IKE peer to the policy.
peer
Configure PFS For configuration precautions, see the
configuration notes for “
Troubleshooting
ISAKMP SA.”
Configure the name of
the IPSec policy
The name is a string of 1 to 15 characters.
Policies with the same name are in a
policy group. The name and sequence
number define one policy; each policy
group has a maximum of 100 policies.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-27
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Applying the IPSec
policy group
Configure the
sequence number of
the IPSec policy
Configure the
negotiation mode
Use the IPSec policy
template
Configure the
interface type and ID
Configure the name of
the IPSec policy
group
The sequence number ranges from 1 to
10000. The lower the value, the higher the
priority.
Set up SAs in ISAKMP mode.
Use the previously configured IPSec
policy template. The SA set up by a
referential policy template can be the
responder, but not the negotiation initiator.
Enable the IPSec policy group on the
specified group.
For configuration notes, see the notes for
Troubleshooting manual IPSec SA
“
setup .”
Apply one IPSec policy group on one
interface.
For configuration notes, see the notes for
Troubleshooting manual IPSec SA
“
setup .”
The peer PC C with an uncertain IP address must have IPSec capability and must have related
software installed. If the peer is a router, ISAKMP SA should be configured. For details, see
the configuration notes for “
The following sections cover part of the commands for setting up SA using the IPSec policy template.
For more information, see Nortel Secure Router 8000 Series Configuration Guide - Security
(NN46240-600).
Configuring an IKE proposal
Use the default IKE proposal.
Configuring an IKE peer
# Configure the name of the IKE peer to routerb, the negotiation mode to main mode, and the
shared key to nortel. Note that shared keys on two ends must be consistent.
<RouterA> system-view
[RouterA] ike peer routerb
[RouterA-ike-peer-routerb] exchange-mode main
[RouterA-ike-peer-routerb] pre-shared-key nortel
The peer can be without ACL rules. The data to protect is specified in ACL rules on the
negotiation initiator.
Troubleshooting ISAKMP SA.”
2-28 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Configuring an IPSec proposal
# Configure the name of the IPSec proposal to tran1 and the encapsulation type to transport
mode to save bandwidth. Configure the proposal to use the security protocol ESP, the
algorithm SHA-1, and the encryption algorithm DES.
[RouterA] ipsec proposal tran1
[RouterA-ipsec-proposal-tran1] encapsulation-mode transport
[RouterA-ipsec-proposal-tran1] transform esp
[RouterA-ipsec-proposal-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-proposal-tran1] esp encryption-algorithm des
Configuring an IPSec policy template
# Configure the name of the IPSec policy template to maptemp and the sequence number to
10. The ACL is not required. Apply the configured IPSec proposal to the policy and specify
the IKE peer.
# Configure the name of IPSec policy to map1, the sequence number to 100, and the
negotiation mode to ISAKMP, and use the IPSec policy template maptemp.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-29
2 IPSec and IKE troubleshooting
2.4.3 Troubleshooting flowchart
Figure 2-9 Troubleshooting flowchart of setting up IPSec SA using an IPSec policy template
IPSec tunnel fails
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Can two
ends of the tunnel with no IPSec
policy applied ping through
each other ?
Yes
Does the configured
parameters in the policy module
match with those
on the peer?
Yes
Does the
end adopting IPSec policy
module initiate the
negotiation?
Yes
Is the ACL
referred by the peer IPSec
policy of single
rule?
Yes
No
No
No
No
Check the route
检查之间的
and the physical
路
GRE相关配
link
置
Ignore or modify
configured
parameters
Configure the
peer to initiate
the SA
negotiation
Modify the ACL
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
Yes
Yes
Yes
Yes
Is the policy
adopting the IPSec policy
module of a
lowest priority?
Yes
The fault disappears?
Yes
No
No
Modify the
policy's priority.
Seek
technical
support
End
2-30 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
2.4.4 Troubleshooting procedure
Step 1 Check whether two ends of the tunnel are reachable with no IPSec policy applied.
Use the undo ipsec policy command on the IPSec tunnel ends.
Close the IPSec client on PC C. Ping PC A from PC C.
A failed ping indicates a faulty route or link between PC A and PC C. For information about
removing the fault, see Nortel Secure Router 8000 Series Troubleshooting - IP Routing
(NN46240-706).
If the ping succeeds, the fault may be related to IPSec. Continue with the following steps.
Step 2 Check that IPSec tunnel setup is not triggered by the communication party applying the IPSec
policy template.
Ping PC A from PC C.
The IP address of PC C is uncertain, so on Router A, the IPSec template specifies no policy
rules. Router A should operate as the negotiation responsor.
Step 3 Check that SAs are set up in Phase 1 and Phase 2.
Refer to the troubleshooting procedure in “
After SA setup succeeds in Phase 1 and Phase 2, continue with the following steps.
Step 4 Check IPSec policies:
z
Check whether the ACL used by the IPSec policy on the negotiation responder contains a
single rule.
If the peer is a PC with an uncertain IP address, the PC should have IPSec capability and
should have the related software installed. The details vary based on the applied software
and are not described here.
If the peer is a router with an uncertain IP address, ensure that the ACL contains a single
rule.
z
The ACL can be unspecified on the end using the IPSec policy template.
On the end using the IPSec policy template, if the peer has an unspecified IP address,
you need not configure the ACL used in the IPSec policy template.
z
The IP address can be unspecified on the end using the IPSec policy template.
On the end that uses the IPSec policy template, if the peer has an unspecified IP address,
you need not configure the IP address or address segment used in the IPSec policy
template.
z
Check whether the priority of the policy that uses the IPSec policy template is the lowest.
Within the same IPSec policy group, check whether the priority of the policy is the
lowest.
You can use the display ipsec policy name command to view details about IPSec policy
groups or the display ipsec policy brief command to view brief information.
<RouterA> display ipsec policy name map1
===========================================
IPsec Policy Group: "map1"
Using local-address: {}
Using interface: {GigabitEthernet1/0/1}
===========================================
Troubleshooting ISAKMP SA.”
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-31
Based on the preceding display, view the priorities of the policies; that is, check whether the
sequence number of the policy that uses the IPSec policy template is the highest.
For information about checking other items, see the troubleshooting procedure for
Troubleshooting ISAKMP SA.”
“
If IPSec policies are correct, continue with the following steps.
Step 5 Check whether IPSec can encapsulate or decapsulate packets based on SAs.
Use the debugging ipsec packet command to view IPSec packet encapsulation and
decapsulation.
You can also use the display ipsec statistics command. For details, see the troubleshooting
procedure for “
Troubleshooting ISAKMP SA.”
If the fault remains, contact Nortel technical support.
----End
2.5 Troubleshooting NAT traversal in the IPSec tunnel
This section covers the following topics:
z
Typical networking
z
Configuration notes
z
Troubleshooting flowchart
z
Troubleshooting procedure
2-32 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
2.5.1 Typical networking
Figure 2-10 shows the networking diagram of NAT traversal in the IPSec tunnel.
Figure 2-10Networking diagram of IPSec NAT
Router A
10.1.1.1
PC A
Eth1/0/1
202.38.163.1
Firewall C
Eth0/ 0/1
202.38.162. 10
Internet
Eth2/0/1
202.38.162.1
Router B
10.1.2.1
10.1.2.210.1.1.2
PC B
The networking environment is as follows:
z
A firewall (Firewall C) exists between Router A and Router B.
z
Create a security tunnel between Router A and Router B.
z
Set up SAs using an IPSec policy template.
z
Provide security protection to the data flow between the subnetwork segments 10.1.1.x
and 10.1.2.x.
z
Specify the security protocol, the encryption algorithm, and the authentication algorithm.
2.5.2 Configuration notes
The internal NAT network uses the normal ISAKMP SA configurations. The following table
lists the notes and constraints.
Item Sub-item Description
Configuring the
ACL
IPSec proposal
Configure the
ACL number
Configure other
items
Configure the
IPSec proposal
name
Configure the
encapsulation
mode
Use the advanced ACL, ranging from 3000 to
3999.
For configuring the internal NAT network, see
Troubleshooting ISAKMP SA.” You must
“
configure the ACL.
See the configuration notes for “
Troubleshooting
ISAKMP SA.”
The name is a string of 1 to 15 characters. Configuring the
This must be tunnel mode.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-33
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configuring the
local ID for IKE
Configuring the
IPSec proposal
Configuring the
IKE peer
Configure other
items
Configure the
local ID for IKE
See the configuration notes for “Troubleshooting
ISAKMP SA.”
You must configure a local ID for IKE because
NAT traversal uses aggressive IKE negotiation
and the local name is configured as the local
authentication type.
— See the configuration notes for “Troubleshooting
ISAKMP SA.”
Configure the
The name is a string of 1 to 15 characters.
IKE peer name
Configure the
Use aggressive negotiation mode.
IKE negotiation
mode
Configure the
Use the default IKE proposal in aggressive mode.
sequence number
of IKE proposals
Configure the
Specify the local name as the local ID.
local ID type
Configure the
authenticator
Currently, only the pre-shared key authentication
type is applicable.
You must configure shared keys on the peer. The
shared keys of two ends in the same SA must be
the same.
Configuring the
IPSec policy
Configure the IP
address or address
segments of the
peer
Configure the IP addresses or address segments
for the IKE peer. If high-ip-address is not
specified, configure only one IP address for the
IKE peer.
Here, the IP address of the peer must be a unique
address because the IPSec policy template does
not use the IKE peer.
To configure IP addresses or address segments for
peers, run the remote-address [ vpn-instance
vpn-instance-name ] low-ip-address
[ high-ip-address ] command in the IKE proposal
view.
Configure the
peer name
The name is a string of 1 to 15 characters.
If the local authentication mode is “name,” you
must specify the peer name.
Enable NAT Enable NAT.
— See the configuration notes for “Troubleshooting
ISAKMP SA.”
2-34 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Item Sub-item Description
Applying the
IPSec policy
— See the configuration notes for “Troubleshooting
ISAKMP SA.”
group
For configuring the external NAT network, see “
Troubleshooting SA setup using an IPSec
policy template.” The following table lists the notes and constraints.
Item Sub-item Description
Configuring the
ACL
Configuring the
IPSec proposal
— Configure the external NAT network using the
template. ACL configuration is not required.
Configure the
The name is a string of 1 to 15 characters.
IPSec proposal
name
Configure the
This must be tunnel mode.
encapsulation
mode
Configuring the
local ID for IKE
Configure other
items
Configure the
local ID for IKE
See the configuration notes for “
ISAKMP SA.”
You must configure the local ID because NAT
traversal uses aggressive IKE negotiation and the
local name is configured as the local
authentication type.
Troubleshooting
Configuring the
IPSec proposal
Configuring the
IKE peer
— See the configuration notes for “Troubleshooting
ISAKMP SA.”
Configure the
The name is a string of 1 to 15 characters.
IKE peer name
Configure the
Use aggressive negotiation mode.
IKE negotiation
mode
Configure the
Use the default IKE proposal in aggressive mode.
sequence number
of IKE proposals
Configure the
Specify the local name as the local ID.
local ID type
Configure the
authenticator
Currently, only the pre-shared key authentication
type is applicable.
You must configure shared keys on the peer. The
shared keys of two ends in the same SA must be
the same.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-35
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configuring the
IPSec policy
template
Configuring the
IPSec policies
and applying the
IPSec policy
template
Configure the IP
addresses or
address segments
of the peer
Configure the IP addresses or address segments for
an IKE peer. If high-ip-address is not specified,
configure only one IP address for an IKE peer.
Here, the IP address of the peer must be a unique
address because the IPSec policy template does
not use the IKE peer.
To configure IP addresses or address segments for
peers, run the remote-address [ vpn-instance
vpn-instance-name ] low-ip-address
[ high-ip-address ] command in the IKE proposal
view.
Configure the
peer name
The name is a string of 1 to 15 characters.
If the local authentication mode is “name,” you
must specify the peer name.
Enable NAT Enable NAT.
— See the configuration notes for “Troubleshooting
SA setup using an IPSec policy template.”
— See the configuration notes for “
Troubleshooting
SA setup using an IPSec policy template.”
Firewall C
Router A
Applying the
IPSec policy
— See the configuration notes for “Troubleshooting
SA setup using an IPSec policy template.”
group
Configure Router A, Firewall C, and Router B.
The commands listed in the following sections cover part of IPSec configuration. For more information,
see Nortel Secure Router 8000 Series Configuration Guide - Security (NN46240-600).
Configure routes and an address pool with addresses from 202.38.162.11 to 202.38.162.20 on
Firewall C. Enable NAT on the egress Ethernet 0/0/1.
For information about firewall configuration, see the related firewall configuration documentation.
For detailed configuration information and precautions, see the configuration notes for
“
Troubleshooting ISAKMP SA.”
1. Configure the IKE local ID.
2-36 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
# Configure the host local ID in aggressive IKE negotiation mode.
<RouterA > system-view
[RouterA] ike local-name routera
2. Configure IKE proposals.
By default, use the default IKE proposals.
3. Configure the IKE peer.
# Configure the name of the IKE peer to routerb. Configure aggressive negotiation mode
and set “name” as the local ID authentication type. Preset the shared key to nortel.
Configure an IP address 202.38.162.1 for the peer and enable NAT on it.
Note the following:
z
The shared keys configured on the connected peer must be consistent.
z
“Name” is used as the ID authentication type. The remote name must be the same as the
local IKE ID configured on the peer through the ike local-name command.
# Configure the name of IPSec policy to map1, the sequence number to 10, and the
negotiation mode to ISAKMP. Apply the configured IPSec proposal tran1 to the policy,
and configure the IKE peer to routerb.
# Apply the IPSec policy map1 on the serial interface.
[RouterA] interface Ethernet 1/2/0
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-37
2 IPSec and IKE troubleshooting
[RouterA-Ethernet1/2/0] ipsec policy map1
Router B
For information about configuring Router B, see the configuration notes for “Troubleshooting
SA setup using an IPSec policy template.”
1. Configure the local ID for IKE.
# Configure the local ID of the host in aggressive IKE negotiation mode.
<RouterB> system-view
[RouterB] ike local-name routerb
2. Configure IKE proposals.
If no proposal is configured, the remote IKE ends use the default IKE proposals.
3. Configure the IKE peer.
# Configure the name of the IKE peer to routera, use aggressive negotiation mode, set
“name” as the local ID authentication type, and preset the shared key to nortel. Enable
NAT on it.
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Note the following:
z
The shared keys configured on the connected peer must be consistent.
z
“Name” is used as the ID authentication type. The remote name must be the same as the
local IKE ID configured on the peer through the ike local-name command.
z
You need not configure the remote IP address.
[RouterB] ike peer routera
[RouterB-ike-peer-routera] exchange-mode aggressive
[RouterB-ike-peer-routera] local-id-type name
[RouterB-ike-peer-routera] pre-shared-key nortel
[RouterB-ike-peer-routera] remote-name routera
[RouterB-ike-peer-routera] nat traversal
4. Configure an ACL.
No ACL is configured; that is, the data to protect is unspecified but defined in the ACL
rules of the negotiation initiator.
5. Configure an IPSec proposal.
# Configure the name of IPSec proposal to tran1. The proposal uses the tunnel mode,
SHA-1 authentication algorithm, and DES encryption algorithm.
# Configure the name of the IPSec policy template to maptemp and the sequence number
to 10. The ACL is not required. Use the configured IPSec proposal tran1 and configure
the IKE peer to routerb.
# Configure the name of the IPSec policy to map1, the sequence number to 100, and the
negotiation mode to ISAKMP. Use the IPSec policy template maptemp.
On Router B, there should be a route to 10.1.1.0/24 with the egress as Ethernet 2/0/1.
After IPSec packets are decapsulated, the original IP packets are displayed. NAT fails because
the original IP packets are encrypted through the ESP protocol. Packets still use the IP address
that has not been translated by the firewall. When the response packets reach Router B and
find no routes to the destination, they cannot be forwarded through the IPSec tunnel.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-39
2 IPSec and IKE troubleshooting
2.5.3 Troubleshooting flowchart
Figure 2-11 Troubleshooting flowchart of NAT traversal in IPSec
IPSec tunnel
fails
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Can tunnel ends
with no IPSec policy ping
through each other ?
Yes
Is IKE
negotiation in Phase 1 in
aggressive mode?
Yes
Is name
configured as the peer ID
authentication type
Yes
Is NAT enabled on IKE peers?
Yes
Is ESP adopted
in IPSec proposals?
Yes
No
?
No
Check the route
and the physical
link between them
Modify the
No
negotiation mode
in Phase 1
Modify the ID
No
authentication
type
No
Enable NAT
No
Modify the
adopted protocol
type
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
Yes
End
End
Yes
Yes
End
Yes
End
Yes
End
Is the
tunnel mode adopted in IPSec
proposals?
Yes
The fault disappears?
Yes
End
No
No
Modify the
adopted
encapsulation type
The fault
disappears?
No
Seek
technical
support
Yes
End
2-40 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
2.5.4 Troubleshooting procedure
Step 1 Check whether two ends of the tunnel are reachable with no IPSec policy applied.
Use the undo ipsec policy command on both the ends of the IPSec tunnel.
On PC A, ping PC B.
A failed ping indicates a faulty link or route between PC A and PC B. For information about
removing the fault, see Nortel Secure Router 8000 Series Troubleshooting - IP Routing
(NN46240-706).
If the ping succeeds, the fault may be related to IPSec. Continue with the following steps.
Step 2 Ensure that IPSec tunnel setup is not triggered by the communication party applying the
IPSec policy template.
Ping PC B from PC A. The IPSec template used by Router B specifies no policy rules, so
Router B can operate only as the negotiation responsor.
Continue with the following steps.
Step 3 Check that SAs are set up in Phase 1 and Phase 2.
See the troubleshooting procedure for “
Troubleshooting ISAKMP SA.”
Continue with the following steps.
Step 4 Check that IKE peer configurations agree with the constraint conditions.
Check the following:
z
whether the negotiation in Phase 1 is in aggressive mode
z
whether the peer name is used as the local ID type
z
whether NAT is enabled on the IKE peer
Use the display ike peer name command.
<RouterA> display ike peer name routerb
-------------------------- IKE Peer: routerb
exchange mode: aggressive on phase 1
pre-shared-key: nortel
proposal:
local id type: name
peer ip address: 202.38.162.1
peer name: routerb
nat traversal: enable
---------------------------
Use the preceding command on Router A and Router B to view the constraint conditions. If
the IKE peer configurations are correct, continue with the following steps.
Step 5 Check that IPSec proposals agree with the constraint conditions.
Check the following:
z
whether ESP is used in IPSec proposals
z
whether the encapsulation type is transport mode
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-41
2 IPSec and IKE troubleshooting
Use the display ipsec proposal name command to view if the specified IPSec proposals on
Use the preceding command on Router A and Router B to view the constraint conditions. If
the IPSec proposals are correct, continue with the following steps.
Step 6 Check that IPSec can encapsulate or decapsulate inbound and outbound packets.
Use the debugging ipsec packet command to view if IPSec can encapsulate or decapsulate
packets.
You can also use the display ipsec statistics command to view IPSec statistics. See the
troubleshooting procedure for “
Step 7 Check that IPSec tunnel ends in the external and internal NAT network are routable.
If Router B has no route to 10.1.1.0/24, use the debugging ipsec packet and the display ipsec statistics commands to determine the following:
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Troubleshooting ISAKMP SA.”
z
Router A can send the encapsulated IPSec packets but cannot decapsulate packets.
z
Router B can receive and decapsulate IPSec packets but cannot encapsulate packets.
In this case, you need to specify a route to 10.1.1.0/24 on Router B.
In the internal NAT network, Router A uses the private IP address. It is not advisable to configure a
private route from Router B to Router A. In an actual application, PC A and PC B are configured with
loopback addresses.
If the fault persists, contact Nortel technical support.
----End
2.6 Troubleshooting GRE over IPSec or L2TP over IPSec
This section covers the following topics:
z
Typical networking
z
Configuration notes
z
Troubleshooting flowchart
z
Troubleshooting procedure
2.6.1 Typical networking
The basic concepts of GRE over IPSec and L2TP over IPSec are the same. That is, the tunnel
is first encapsulated with GRE or L2TP and then with IPSec. The processing of IPSec packets
and common IP packets is almost the same. In practice, IPSec packets are the data transmitted
on two IPSec tunnel ends.
Figure 2-12 shows GRE over IPSec. The troubleshooting procedure is based on this diagram.
2-42 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Figure 2-12Networking diagram of configuring IPSec
Router
10.1.1.1
10.1.1.2
A
PC
A
Pos1/0/1
202.38.163.1
Internet
IPSe
c
Pos2/0/1
202.38.162.1
GREIPSec
Router
B
10.1.2.1
10.1.2.2
PC
B
The networking environment is as follows:
z
Create a GRE tunnel between Router A and Router B.
z
Create an IPSec tunnel between Router A and Router B to protect packets forwarded
through the GRE tunnel.
z
Specify the data flow between subnetwork segments 10.1.1.x and 10.1.2.x to pass the
GRE tunnel.
z
Set up IPSec SAs in ISAKMP mode.
2.6.2 Configuration notes
Item Sub-item Description
Configuring the
GRE tunnel
Configuring the
ACL
Configure the tunnel type Configure a GRE tunnel.
Configure the source IP
address of the tunnel
Configure the destination
IP address of the tunnel
Configure the ACL numberUse the advanced ACL, ranging from
Configure the protocol ID
specified in the ACL
Configure the source and
destination addresses
specified in ACL rules
For configuration notes, see the section
about GRE troubleshooting in Nortel
Secure Router 8000 Series
Troubleshooting - VPN (NN46240-710).
For configuration notes, see the section
about GRE troubleshooting in Nortel
Secure Router 8000 Series
Troubleshooting - VPN (NN46240-710).
3000 to 3999.
The protocol ID of GRE.
The source and destination IP addresses of
the GRE tunnel.
Configure other items in
Not required.
ACL rules
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-43
2 IPSec and IKE troubleshooting
Item Sub-item Description
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Configuring the
IPSec proposal
Configuring the
local ID for
IKE
Configuring the
IKE proposals
Configuring the
IKE peer
Configuring the
IPSec policy
Applying the
IPSec policy
Configure the number of
Configure only one ACL rule.
ACL rules
Configure the name of
The name is a string of 1 to 15 characters.
the IPSec proposal
Configure the
encapsulation mode
Transport mode or tunnel mode.
To save bandwidth, transport mode is
preferred.
Configure other items See “
Troubleshooting ISAKMP SA.”
— See “Troubleshooting ISAKMP SA”.
— See “Troubleshooting ISAKMP SA.”
— See “Troubleshooting ISAKMP SA.”
— See “Troubleshooting ISAKMP SA.”
Configure the type and
number of interfaces
Enable IPSec on the physical interfaces on
a GRE tunnel. The source and the
destination IP addresses of the tunnel must
not be loopback addresses.
IPSec over GRE supports applying a
policy group to GRE virtual interfaces.
Router A serves as an example of the configuration notes for GRE over IPSec. Router B and
Router A are mutually mirroring.
The following sections cover part of the commands used to configure IPSec. For more information, see
Nortel Secure Router 8000 SeriesConfiguration Guide - Security (NN46240-600).
Configuring a GRE tunnel
# Encapsulate the tunnel with GRE. Configure the IP addresses for the source and destination
tunnel ends. Note that the two addresses cannot be loopback addresses.
Apply only one IPSec policy group on one
interface.
For configuration notes, see
Troubleshooting ISAKMP SA.”
“
2-44 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
[RouterA-Tunnel1/0/1] destination 202.38.162.1
Configuring IKE proposals
If no IKE proposal is configured, the remote end uses default IKE proposals.
Configuring the IKE peer
# Configure the name of the IKE peer to routerb and use aggressive negotiation mode. Preset
the shared key to nortel. Note that the shared keys configured on two ends must be consistent.
Configure an IP address 202.38.162.1 for the remote end.
# Configure an ACL, defining the protected GRE packets.
[RouterA] acl number 3101
[RouterA-acl-adv-3101] rule permit gre source 202.38.163.1 0 destination 202.38.162.1 0
Configuring an IPSec proposal
# Configure the name of the IPSec proposal to tran1 and use transport mode to save
bandwidth. The policy uses the ESP security protocol, the SHA-1 authentication algorithm,
and the DES encryption algorithm.
[RouterA] ipsec proposal tran1
[RouterA-ipsec-proposal-tran1] encapsulation-mode transport
[RouterA-ipsec-proposal-tran1] transform esp
[RouterA-ipsec-proposal-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-proposal-tran1] esp encryption-algorithm des
Configuring an IPSec policy
# Configure the name of IPSec policy to map1, the sequence number to 10, and the
negotiation mode to ISAKMP. Apply the configured ACL and IPSec proposal tran1 to the
policy. Configure the IKE peer to routerb.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-45
2 IPSec and IKE troubleshooting
2.6.3 Troubleshooting flowchart
Figure 2-13 Troubleshooting flowchart of GRE over IPSec
GRE over
IPSec fails
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Can tunnel
endsapplying no IPSec
policy ping through each
other ?
Yes
Are the source
and the destination IP
addresses specified in
the ACL just addresses of
GRE tunnel ends?
Yes
Are GRE tunnel
ends loopback interfaces
No
or with loopback
addresses?
No
Is the IPSec
policy group applied on
GRE tunnel ends?
Check routes,
No
physical links and
GRE configurations
Modify the source
No
and the destination
IP addresses in the
ACL.
Modify the ports
No
because GRE over
IPSec does not
support loopback
interfaces
Apply IPSec policy
No
to the specified
interface
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
No
The fault
disappears?
Yes
End
Yes
End
Yes
End
Yes
End
Yes
Are SAs set up manually?
Yes
Are SAs set up
in ISAKMP mode?
Yes
The fault disappears?
Yes
End
No
No
Refer to manual
troubleshooting
Refer to ISAKMP
troubleshooting.
No
IPSec SA
IPSec SA
No
The fault
disappears?
No
The fault
disappears?
No
Seek technical
support
Yes
End
Yes
End
2-46 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
2.6.4 Troubleshooting procedure
Step 1 Check whether the tunnel is reachable with no IPSec policy applied.
As shown in
Figure 2-12, use the undo ipsec policy command to disable the IPSec policy on
Router A and Router B. The packets are forwarded through the GRE tunnel.
On PC A, ping PC B.
If the ping succeeds, the route, the link, and the GRE tunnel between PC A and PC B are
normal. The fault may be caused by the IPSec configuration. Proceed to Step 2.
If the ping fails, modify the configuration so the packets from PC A to PC B do not pass the
GRE tunnel.
z
If the ping still fails after the modification, it indicates that a fault occurs on the route or
the link between PC A and PC B is incorrect.
z
If the ping succeeds and the GRE tunnel is unused after the modification, the fault is
caused by an incorrectly configured GRE tunnel. For information about removing the
fault, see the section about GRE troubleshooting in Nortel Secure Router 8000 Series Troubleshooting - VPN (NN46240-710).
Step 2 Check whether SAs are set up in Phase 1 and Phase 2.
See the troubleshooting procedure for “
Troubleshooting ISAKMP SA.”
If SAs are configured in Phase 1 and Phase 2, continue with the following steps.
Step 3 Check IPSec policies.
Check the following:
z
whether GRE tunnel ends are loopback interfaces or whether they are configured with
loopback addresses (GRE over IPSec does not support loopback interfaces)
z
whether the source and destination IP addresses specified in the ACL agree with the
addresses of GRE tunnel ends
z
whether the IPSec policy group is applied on interfaces where GRE tunnel ends are
located
For details, see the troubleshooting procedure for “
Troubleshooting ISAKMP SA.”
If the IPSec policies are correct, continue with the following steps.
Step 4 Check whether IPSec can encapsulate or decapsulate packets.
Use the debugging ipsec packet command to view whether IPSec can encapsulate and
decapsulate packets based on SAs.
You can also use the display ipsec statistics command to view IPSec statistics. For details,
see the troubleshooting procedure “
Troubleshooting ISAKMP SA.”
If the fault persists, contact Nortel technical support.
----End
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-47
2 IPSec and IKE troubleshooting
2.7 Troubleshooting cases
Fault symptom
Figure 2-14 shows a diagram of IPSec SA setup in ISAKMP mode.
Figure 2-14 Networking diagram of IPSec setup
Nortel Secure Router 8000 Series
Troubleshooting - VAS
Fault analysis
Router A
10.1.1.1
Pos1/0/1
202.38.163.1
Internet
Pos2/0/1
202.38.162.1
Router B
10.1.2.1
10.1.2.210.1.1.2
After Router A is restarted, the IPSec tunnel fails.
z
Use the debugging ipsec packet command on Router B. IPSec packets sent from Router
B to Router A can be encapsulated.
z
Use the debugging ipsec packet command on Router A. Packet decapsulation on Router
A fails.
z
Use the display ipsec sa command on Router A and Router B. You cannot find the SA on
Router A.
The cause for this fault may be that the default timeout period for the ISAKMP SA to wait for
Keep Alive packets is not configured. After Router A is restarted, Router B is not notified to
remove the corresponding SA. Router B continues to use the previous SA.
Enable the keep-alive function of ISAKMP SA to remove this fault. If the SA duration
exceeds the keep-alive value, remove SAs on both ends and reinitiate a negotiation.
Troubleshooting procedure
Step 1 Use the reset ipsec sa command or the reset ike sa command in the system view to remove
the corresponding SA from Router B.
Step 2 Use the ikesakeepalive-timerintervalsecond command in the system views of Router A
and Router B to specify the interval at which Keep Alive packets are sent.
Step 3 Use the ikesakeepalive-timertimeoutseconds command in the system views of Router A
and Router B to specify the timeout period for waiting for Keep Alive packets sent from the
peer of ISAKMP SA.
Step 4 Save the configuration.
After completing the previous steps, the IPSec tunnel can operate normally.
----End
2-48 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Summary
If the keep-alive function of ISAKMP SA is disabled, you must remove the related SA
manually after the device is restarted.
2.8 FAQs
Q: In an unstable network, SAs cannot be set up or SAs are set up but the
communication between peers fails although the ACLs have matching security
proposals. Why?
A: The possible cause is that the router on one end restarts after SAs are set up.
z
Use the display ike sa command to check whether IKE SAs in Phase 1 are set up on
peers.
z
Use the display ipsec sa policy command to check whether IPSec SAs are set up on the
interfaces.
z
If the output shows that only one end is configured with an SA, use the reset ike sa
command to remove the SA and initiate a new negotiation.
Q. During IPSec debugging, the message "Got NOTIFY of type
NO_PROPOSAL_CHOSEN or drop message from A.B.C.D due to notification
type NO_PROPOSAL_CHOSEN" is displayed. What does this indicate?
A: The possible cause is that the negotiation ends have no matched proposal.
z
Check whether the IKE proposals on two ends are matched in Phase 1 negotiation.
z
Check whether the IPSec policy parameters, the IPSec proposals, the encryption
algorithm, and the authentication algorithm applied on two ends are matched in Phase 2
negotiation.
Q. How do I validate modified IPSec or IKE configurations?
A: If you modify IPSec or IKE parameters, such as parameters of IKE proposals, IKE peers,
or IPSec proposals, reapply the IPSec policy to the interface and then use the reset ike sa
command in the user view to validate the configuration.
Q: Is the IPSec tunnel the same as the SA?
A: The IPSec tunnel and SA are different. The IPSec tunnel is bidirectional while an SA is
unidirectional. An IPsec tunnel consists of two SAs with reverse directions.
Q: What are guidelines for ACL used in IPSec?
A: The guidelines are as follows:
z
Only the data flows matching ACL rules are protected.
z
Configure an ACL as required to permit data flows.
z
Avoid setting the keyword any randomly.
Issue 01.01 (30 March 2009) Nortel Networks Inc. 2-49
Nortel Secure Router 8000 Series
2 IPSec and IKE troubleshooting
z
The local and remote ACLs must be mutually mirrored. (When the IPSec policy template
is used, this item can be ignored.)
Troubleshooting - VAS
Q: Can AH and ESP be used at the same time?
A: They can be used either separately or together. If they are used together, the user is
authenticated twice. Nortel recommends that you do not use them at the same time.
Q: Can ESP perform only packet encryption but not authentication?
A: Nortel recommends that you do not send unauthenticated packets.
Q: Can transport mode be used when the communication port and IPSec tunnel
port are different?
A: In transport mode, if the protected data flow is not on the IPSec tunnel port (that is, the
protected flow is not on any end of the tunnel), it cannot be securely protected.
Q: What are the constraints on configuring encryption and authentication shared
keys manually?
A: The constraints are as follows:
z
The shared key on the local inbound should be the same as that on the outbound of the
peer.
z
The shared key on the local outbound should be the same as that on the inbound of the
peer.
z
The shared keys on the two ends should be in the same format. For example, if on one
end, the shared key is a character string, it cannot be a hexadecimal numeral on the
remote end. If they are not in the same format, the IPSec tunnel setup fails.
Q: Can an SA that is set up using an IPSec policy template initiate an SA
negotiation?
A: The SA cannot be the negotiation initiator but it can be the responder.
Q: Why do I not need to specify the local IP address in the IPSec tunnel?
A: You can use the interface address as the local IP address after applying the IPSec policy on
an interface.
2.9 Diagnostic tools
2.9.1 Display commands
Command Description
display ipsec proposal name
display ipsec policy name
2-50 Nortel Networks Inc. Issue 01.01 (30 March 2009)
Displays the IPSec protocol.
Displays the IPSec policy.
Nortel Secure Router 8000 Series
Troubleshooting - VAS 2 IPSec and IKE troubleshooting
Command Description
display ipsec sa policy
display ipsec sa brief
display ike proposal
display ike peer name
display ike sa
display ipsec statistics
The display indicates the authentication algorithms and encryption algorithms in ESP. The
authentication algorithms are SHA-1 and MD5 and the encryption algorithms are DES and
3DES.
You can use the esp authentication-algorithm { md5 | sha1 } command and the esp encryption-algorithm { 3des | des } command to modify the configuration.
The display indicates the SPI and the AH shared keys both in character strings and in
hexadecimal numerals on the inbound of the manually set up SA .
You can use the sa spi inbound ah command, the sa string-key inbound ah command, or the
saauthentication-hexinboundah command to modify the configuration.
The display indicates the SPI and the ESP shared key in character strings and the ESP
authentication and encryption shared keys in hexadecimal numerals on the inbound of the
manually set up SA.
You can use the sa spi inbound esp command, the sa string-key inbound esp command, the
saencryption-hexinboundesp command, or the saauthentication-hexinboundesp
The display indicates the SPI and AH authentication shared keys both in character strings and
in hexadecimal numerals on the outbound of the manually set up SA.
You can use the sa spi outbound ah command, the sa string-key outbound ah command and
the saauthentication-hexoutboundah command to modify the configuration.
The display indicates the SPI and the ESP shared key in character strings and the ESP
authentication and encryption shared keys in hexadecimal numerals on the outbound of the
manually set up SA.
You can use the sa spi outbound esp command, the sa string-key outbound esp command,
the saencryption-hexoutboundesp command, or the saauthentication-hexoutboundesp