hi,
I tried to get a routed ipsec with dual stack working:
VyOSConfig:
set interfaces vti vti0 address '10.51.22.2/30' set interfaces vti vti0 address '2a00:f88:f020:1004::2/64' set interfaces vti vti0 description 'Marcant Tunnel' set interfaces vti vti0 ip adjust-mss 'clamp-mss-to-pmtu' set nat source rule 1 outbound-interface name 'eth0' set nat source rule 1 translation address 'masquerade' set policy route MARCANT_VTI interface 'eth1' set policy route MARCANT_VTI rule 1 action 'accept' set policy route MARCANT_VTI rule 1 destination address '0.0.0.0/0' set policy route MARCANT_VTI rule 1 set table '1' set policy route MARCANT_VTI rule 1 source address '192.168.14.0/24' set protocols static route 0.0.0.0/0 next-hop 172.31.84.254 set protocols static table 1 description 'VTI_MARCANT' set protocols static table 1 route 0.0.0.0/0 next-hop 10.51.22.1 set vpn ipsec authentication psk marcant id 'sophos.test.de' set vpn ipsec authentication psk marcant secret 'XXXXX' set vpn ipsec esp-group MARCANT lifetime '3600' set vpn ipsec esp-group MARCANT mode 'tunnel' set vpn ipsec esp-group MARCANT pfs 'dh-group31' set vpn ipsec esp-group MARCANT proposal 1 encryption 'aes256gcm128' set vpn ipsec esp-group MARCANT proposal 1 hash 'sha256' set vpn ipsec ike-group MARCANT close-action 'start' set vpn ipsec ike-group MARCANT dead-peer-detection action 'restart' set vpn ipsec ike-group MARCANT key-exchange 'ikev2' set vpn ipsec ike-group MARCANT lifetime '28800' set vpn ipsec ike-group MARCANT proposal 1 dh-group '31' set vpn ipsec ike-group MARCANT proposal 1 encryption 'aes256' set vpn ipsec ike-group MARCANT proposal 1 hash 'sha256' set vpn ipsec interface 'eth0' set vpn ipsec options disable-route-autoinstall set vpn ipsec site-to-site peer marcant authentication local-id 'office.test.de' set vpn ipsec site-to-site peer marcant authentication mode 'pre-shared-secret' set vpn ipsec site-to-site peer marcant authentication remote-id 'sophos.test.de' set vpn ipsec site-to-site peer marcant connection-type 'initiate' set vpn ipsec site-to-site peer marcant description 'Marcant Tunnel' set vpn ipsec site-to-site peer marcant ike-group 'MARCANT' set vpn ipsec site-to-site peer marcant ikev2-reauth 'inherit' set vpn ipsec site-to-site peer marcant local-address '172.31.84.253' set vpn ipsec site-to-site peer marcant remote-address '217.14.171.1XX' set vpn ipsec site-to-site peer marcant vti bind 'vti0' set vpn ipsec site-to-site peer marcant vti esp-group 'MARCANT'
IPv4 runs fine but It I try to ping the IPv6 on the other side I get no answer and don't see any UDP packets leaving my system on the outside interface.
After digging aroung I found this:
src 0.0.0.0/0 dst 0.0.0.0/0 dir out priority 399999 ptype main tmpl src 172.31.84.253 dst 217.14.171.XX proto esp spi 0xccdf0067 reqid 1 mode tunnel if_id 0x1 src 0.0.0.0/0 dst 0.0.0.0/0 dir fwd priority 399999 ptype main tmpl src 217.14.171.XX dst 172.31.84.253 proto esp reqid 1 mode tunnel if_id 0x1 src 0.0.0.0/0 dst 0.0.0.0/0 dir in priority 399999 ptype main tmpl src 217.14.171.XX dst 172.31.84.253 proto esp reqid 1 mode tunnel if_id 0x1 src 0.0.0.0/0 dst 0.0.0.0/0 socket in priority 0 ptype main src 0.0.0.0/0 dst 0.0.0.0/0 socket out priority 0 ptype main src 0.0.0.0/0 dst 0.0.0.0/0 socket in priority 0 ptype main src 0.0.0.0/0 dst 0.0.0.0/0 socket out priority 0 ptype main src ::/0 dst ::/0 socket in priority 0 ptype main src ::/0 dst ::/0 socket out priority 0 ptype main src ::/0 dst ::/0 socket in priority 0 ptype main src ::/0 dst ::/0 socket out priority 0 ptype main
After I add:
vbash-4.1# ip xfrm policy src ::/0 dst ::/0 dir in priority 399999 ptype main tmpl src 217.14.171.196 dst 172.31.84.253 proto esp reqid 1 mode tunnel if_id 0x1 src ::/0 dst ::/0 dir fwd priority 399999 ptype main tmpl src 217.14.171.196 dst 172.31.84.253 proto esp reqid 1 mode tunnel if_id 0x1 src ::/0 dst ::/0 dir out priority 399999 ptype main tmpl src 172.31.84.253 dst 217.14.171.196 proto esp spi 0xccdf0067 reqid 1 mode tunnel if_id 0x1
I see traffic leaving my system and the other side received my traffic.
Seemst that something with xfrm policy creation is wrong.