GRE over IPsec

脚本:建立一个IPsec tunnel之后运行这个shell,可以建立GRE tunnels over IPsec
-----------------------------------------------------------------------------------------------
#!/bin/sh

# left is "18", right is "20"

#

# diff DEVnames are not needed, but make things more clear

DEV_LEFT=tun18

DEV_RIGHT=tun20

LEFT_IP=192.168.2.18

LEFT_NET=10.1.18.1/32

RIGHT_IP=192.168.2.20

RIGHT_NET=10.1.20.1/32

 

setup_left() {

        DEV=$DEV_LEFT

        local_ip=$LEFT_IP

        local_net=$LEFT_NET

        remote_ip=$RIGHT_IP

        remote_net=$RIGHT_NET

}

setup_right() {

        DEV=$DEV_RIGHT

        local_ip=$RIGHT_IP

        local_net=$RIGHT_NET

        remote_ip=$LEFT_IP

        remote_net=$LEFT_NET

}

 

case "`/sbin/ip -4 -o addr show dev eth0`" in

*192.168.2.18*) setup_left

                ;;

*192.168.2.20*) setup_right

                ;;

*)     

        echo "ERROR";;

esac

 

case "$1" in

start) 

        modprobe ip_gre

        (set -x

        ip tunnel add $DEV mode gre remote $remote_ip local  $local_ip ttl 255

        ip link set $DEV  up multicast on  ### DOESNT SEEMS to work for zebra :(

        ip addr add $local_net peer $remote_net dev $DEV

        #ip route add $remote_net dev $DEV # Needed if you run BGP instead of OSPF

        )

        ;;

stop)  

        (set -x

        ip tunnel del  $DEV

        )

        modprobe -r ip_gre

        ;;

esac

 

-----------------------------------------------------------------------------------------
Well, start with your normal PSK ipsec.conf file, with only a single
tunnel defined (host to host) between your two gateways.  Or use X.509, or
rsasig - it doesn't matter.  Just get a tunnel between your two sites up,
host to host.

Get your SA established, and the eroute happy.  In other words, *make sure
FreeS/WAN is working* before going any further.  Otherwise, it's a pain to
debug.

Next up, it's GRE time:

$remote_ip = remote side of tunnel (what ipsec# IP is on remote GW is)
$local_ip = local IP address (what ipsec# IP is on is)

ip tunnel add site1tosite2 mode gre remote $remote_ip local  $local_ip ttl 255
ip link set site1tosite2  up
ip addr add 192.168.0.1 dev site1tosite2
ip route add 192.168.0.2/32 dev site1tosite2

Remember to reverse this on the other side... eg:

ip tunnel add site1tosite2 mode gre remote $local_ip local  $remote_ip ttl  255
ip link set site1tosite2  up
ip addr add 192.168.0.2 dev site1tosite2
ip route add 192.168.0.1/32 dev site1tosite2

Note: I'm using only 2 IP addresses... so it's a point to point style
link.  Handy if you have lots of these and don't wanna waste /24's each
time.

Make sure it works - ping the other end of the GRE tunnel.  Check iptables
rules so traffic won't be dropped.  You've probably done this already if
you're adding this to a working FreeS/WAN setup :)

Then, route whatever you want over the tunnel - eg:

ip route add 172.16.0.0/16 via 192.168.0.2 dev site1tosite2

Or, do something completely insane (like me) and run zebra/bgpd on both
ends, and let them exchange routes dynamically.  Never issue an "ip route
[add|delete]" command again!

And that's about it.  The exercise of putting all of this into custom
_updown scripts is left to the reader :)
-------------------------------------------------------------------------------------------
I must be missing something.

Why would you want to establish an IPSec tunnel from site to site and then
run a GRE tunnel?

TIA.
--------------------------------------------------------------------------------------------
Several reasons.  The ones that come to mind are:

1) Simplified config.  If you have gateway A and gateway B, and behind A
there are N networks and behind B there are M networks, then you will need
to define N*M connections with straight ipsec.  If you use a gre tunnel,
then you will only need to define one connection, build one tunnel, and then
add M routes on A and N routes on B.  With reasonably large networks, a
linear increase in complexity with network size is *significantly* easier to
manage than an exponential increase in complexity with network size.  Once N
and M get to be above 10 or so, it can start to get painful.

2) Non-IP protocols.  Say, for instance, you've got a nice IPX network at
two sites with internet connections.  You *could* buy a leased line between
the two for all IPX traffic, but that would be expensive.  You *could*
tunnel it all in the clear, but that would be insecure.  You *could* write
your own IPX-over-IP-with-spiffy-encryption protocol, but that would be
difficult.  Or, you could use an ipsec encrypted gre tunnel, and everything
would (theoretically) work.

3) fault-tolerant routing.  There's very little built in to the ipsec
protocols to either detect when a remote peer is no longer responding, or to
find a better way to get to the networks that were previously reachable
through that dead peer.  gre tunnels, when combined with standard routing
protocols, make it easier to do this.

On that note, I have done the above (ipsec+gre+ospf/eigrp) extensively on
cisco boxes.  However, as much as I have been saying that it's a cool thing
to do, I have just today finished setting up my first combination of
freeswan/ipsec+gre+zebra/ospf.  I know that Ken has done the same thing with
zebra/bgp, and there have been some questions about how this sort of thing
is done, so I wanted to share some of my experiences/gotchas.

First, my biggest moment of "d'oh!", make sure your firewall rules allow
ospf traffic on your gre interfaces.  :)
Second, zebra looks a lot like cisco, but acts somewhat differently.  There
are three things that need to be done in ospfd.conf to make this work:
1) for each tunnel interface, do:
 interface {tunnel-name}
  ip ospf network non-broadcast
because zebra doesn't seem to like listening for multicast messages on
virtual interfaces (which sucks).  A tunnel interface *should* be a
point-to-point.  but it doesn't seem to work that way.
2) because of 1, you need to define neighbors with statements like:
 router ospf
  neighbor {tunnel ip address of remote peer}
3) for some incredibly wierd reason, normal network statements like one
would use for other interfaces don't work.  network statements for gre (or
actually any point-to-point) interfaces have to be the ip address of the
local tunnel interface and have to be /32, like:
 router ospf
  network 192.168.1.1/32 area 0
even if the tunnel is 192.168.1.1/30 and you would expect a statement like
"network 192.168.1.0/30 area 0" or even "network 192.168.0.0/16 area 0" to
work, it won't work, zebra will not activate ospf on the interface, and
nothing will happen.  Which is *really* frustrating.

-Joe
------------------------------------------------------------------------------
On Tue, 15 Oct 2002, Joe Patterson wrote:

> Several reasons.  The ones that come to mind are:
>
> 1) Simplified config.  If you have gateway A and gateway B, and behind A
> there are N networks and behind B there are M networks, then you will need
> to define N*M connections with straight ipsec.  If you use a gre tunnel,
> then you will only need to define one connection, build one tunnel, and then
> add M routes on A and N routes on B.  With reasonably large networks, a
> linear increase in complexity with network size is *significantly* easier to
> manage than an exponential increase in complexity with network size.  Once N
> and M get to be above 10 or so, it can start to get painful.

That was my primary reason for doing this.  I run what I term an
Enterprise Class VPN between two datacenters.  I have 2 GW's @ each side,
running Heartbeat for IP Address takeover, ospfd for internal routing, and
now BGP between 4 ISPs and between my own sites.  My config is nessecarily
complex, so I welcome simplicity.  I also have several business partner
VPN's, run off various devices.  I static-route thier remote networks on
my GW's, and ospf/bgp redistribute them to my other sides, so all traffic
to the business partner goes through 1 link.  Much simpler than giving a
partner connections to all of your sites, and much simpler to secure.

> 3) fault-tolerant routing.  There's very little built in to the ipsec
> protocols to either detect when a remote peer is no longer responding, or to
> find a better way to get to the networks that were previously reachable
> through that dead peer.  gre tunnels, when combined with standard routing
> protocols, make it easier to do this.

Yup.  My Heartbeat+FreeS/WAN combo needs dynamic routing to work
effectivly.

> On that note, I have done the above (ipsec+gre+ospf/eigrp) extensively on
> cisco boxes.  However, as much as I have been saying that it's a cool thing
> to do, I have just today finished setting up my first combination of
> freeswan/ipsec+gre+zebra/ospf.  I know that Ken has done the same thing with
> zebra/bgp, and there have been some questions about how this sort of thing
> is done, so I wanted to share some of my experiences/gotchas.
>
> First, my biggest moment of "d'oh!", make sure your firewall rules allow
> ospf traffic on your gre interfaces.  :)
> Second, zebra looks a lot like cisco, but acts somewhat differently.  There
> are three things that need to be done in ospfd.conf to make this work:
> 1) for each tunnel interface, do:
>  interface {tunnel-name}
>   ip ospf network non-broadcast
> because zebra doesn't seem to like listening for multicast messages on
> virtual interfaces (which sucks).  A tunnel interface *should* be a
> point-to-point.  but it doesn't seem to work that way.
> 2) because of 1, you need to define neighbors with statements like:
>  router ospf
>   neighbor {tunnel ip address of remote peer}
> 3) for some incredibly wierd reason, normal network statements like one
> would use for other interfaces don't work.  network statements for gre (or
> actually any point-to-point) interfaces have to be the ip address of the
> local tunnel interface and have to be /32, like:
>  router ospf
>   network 192.168.1.1/32 area 0
> even if the tunnel is 192.168.1.1/30 and you would expect a statement like
> "network 192.168.1.0/30 area 0" or even "network 192.168.0.0/16 area 0" to
> work, it won't work, zebra will not activate ospf on the interface, and
> nothing will happen.  Which is *really* frustrating.
>
> -Joe
>

Thanks for doing this and sharing the knowledge.  Pat Felt (see messages
from the past few days) has also attempted this, and got it working today. 
His experience matches yours 100%, down the network 192.168.1.1/32 area 0
config lines.  I will be including both your's and his information in my
FreeS/WAN + Dynamic Routing doc (forthcoming)
------------------------------------------------------------------------------------
> I must be missing something.
>
> Why would you want to establish an IPSec tunnel from site to site and then
> run a GRE tunnel?
>
> TIA.
>


Many reasons.  Quickly:

* GRE supports Broadcast + Multicast.  IPSec does not.
* Use dynamic routing protocols to add/remove routes over the ipsec
interface
* Tunnel over multiple IPSec "hops" in a fully encrypted mutli-hop network
* Because you can :)
-------------------------------------------------------------------------------------

在使用Python来安装geopandas包时,由于geopandas依赖于几个其他的Python库(如GDAL, Fiona, Pyproj, Shapely等),因此安装过程可能需要一些额外的步骤。以下是一个基本的安装指南,适用于大多数用户: 使用pip安装 确保Python和pip已安装: 首先,确保你的计算机上已安装了Python和pip。pip是Python的包管理工具,用于安装和管理Python包。 安装依赖库: 由于geopandas依赖于GDAL, Fiona, Pyproj, Shapely等库,你可能需要先安装这些库。通常,你可以通过pip直接安装这些库,但有时候可能需要从其他源下载预编译的二进制包(wheel文件),特别是GDAL和Fiona,因为它们可能包含一些系统级的依赖。 bash pip install GDAL Fiona Pyproj Shapely 注意:在某些系统上,直接使用pip安装GDAL和Fiona可能会遇到问题,因为它们需要编译一些C/C++代码。如果遇到问题,你可以考虑使用conda(一个Python包、依赖和环境管理器)来安装这些库,或者从Unofficial Windows Binaries for Python Extension Packages这样的网站下载预编译的wheel文件。 安装geopandas: 在安装了所有依赖库之后,你可以使用pip来安装geopandas。 bash pip install geopandas 使用conda安装 如果你正在使用conda作为你的Python包管理器,那么安装geopandas和它的依赖可能会更简单一些。 创建一个新的conda环境(可选,但推荐): bash conda create -n geoenv python=3.x anaconda conda activate geoenv 其中3.x是你希望使用的Python版本。 安装geopandas: 使用conda-forge频道来安装geopandas,因为它提供了许多地理空间相关的包。 bash conda install -c conda-forge geopandas 这条命令会自动安装geopandas及其所有依赖。 注意事项 如果你在安装过程中遇到任何问题,比如编译错误或依赖问题,请检查你的Python版本和pip/conda的版本是否是最新的,或者尝试在不同的环境中安装。 某些库(如GDAL)可能需要额外的系统级依赖,如地理空间库(如PROJ和GEOS)。这些依赖可能需要单独安装,具体取决于你的操作系统。 如果你在Windows上遇到问题,并且pip安装失败,尝试从Unofficial Windows Binaries for Python Extension Packages网站下载相应的wheel文件,并使用pip进行安装。 脚本示例 虽然你的问题主要是关于如何安装geopandas,但如果你想要一个Python脚本来重命名文件夹下的文件,在原始名字前面加上字符串"geopandas",以下是一个简单的示例: python import os # 指定文件夹路径 folder_path = 'path/to/your/folder' # 遍历文件夹中的文件 for filename in os.listdir(folder_path): # 构造原始文件路径 old_file_path = os.path.join(folder_path, filename) # 构造新文件名 new_filename = 'geopandas_' + filename # 构造新文件路径 new_file_path = os.path.join(folder_path, new_filename) # 重命名文件 os.rename(old_file_path, new_file_path) print(f'Renamed "{filename}" to "{new_filename}"') 请确保将'path/to/your/folder'替换为你想要重命名文件的实际文件夹路径。
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值