<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; CHARSET=UTF-8">
<META content="MSHTML 6.00.2900.2963" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hi, im running 7 tunnels to a Sonicwall t170 
Enhanced, with no problems at all, if you send the sonicwall configuration to 
the list i think that i can help you, im sending (attached) my Ipsec.conf, 
Ipsec.secrets and a screen capture of the sonicwall config</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>---------------------------- ipsec.conf 
----------------------------------------------------------------------------------</FONT></DIV>
<DIV><FONT face=Arial size=2>version&nbsp;2.0&nbsp;# conforms to second version 
of ipsec.conf specification</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2># basic configuration</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>config 
setup<BR>&nbsp;interfaces=%defaultroute<BR>&nbsp;# Debug-logging controls:&nbsp; 
"none" for (almost) none, "all" for 
lots.<BR>&nbsp;klipsdebug=none<BR>&nbsp;plutodebug=none<BR>&nbsp;uniqueids=yes</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>conn block<BR>&nbsp;&nbsp;&nbsp; 
auto=ignore<BR>conn private<BR>&nbsp;&nbsp;&nbsp; auto=ignore<BR>conn 
private-or-clear<BR>&nbsp;&nbsp;&nbsp; auto=ignore<BR>conn 
clear-or-private<BR>&nbsp;&nbsp;&nbsp; auto=ignore<BR>conn 
clear<BR>&nbsp;&nbsp;&nbsp; auto=ignore<BR>conn 
packetdefault<BR>&nbsp;&nbsp;&nbsp; auto=ignore</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial 
size=2>conn&nbsp;ToSonic<BR>&nbsp;type=tunnel<BR>&nbsp;auth=esp<BR>&nbsp;authby=secret<BR>&nbsp;auto=start<BR>&nbsp;pfs=yes<BR>&nbsp;dpddelay=60<BR>&nbsp;dpdtimeout=120<BR>&nbsp;dpdaction=clear<BR>&nbsp;left=%defaultroute<BR>&nbsp;leftsubnet=192.168.80.0/24<BR>&nbsp;right=xxx.xxx.xxx.xxx 
( Sonicwall IP HERE 
)<BR><BR>&nbsp;rightsubnet=192.168.1.0/24<BR>&nbsp;keyexchange=ike</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial 
size=2>conn&nbsp;ToSonicwall2<BR>&nbsp;type=tunnel<BR>&nbsp;auto=route<BR>&nbsp;auth=esp<BR>&nbsp;authby=secret<BR>&nbsp;pfs=yes<BR>&nbsp;keyingtries=1<BR>&nbsp;dpddelay=60<BR>&nbsp;dpdtimeout=120<BR>&nbsp;dpdaction=clear&nbsp;<BR>&nbsp;left=%defaultroute<BR>&nbsp;leftsubnet=192.168.80.0/24<BR>&nbsp;right=xxx.xxx.xxx.xxx 
( Sonicwall IP HERE 
)<BR>&nbsp;rightsubnet=192.168.3.0/24<BR>&nbsp;keyexchange=ike</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial 
size=2>conn&nbsp;ToSonicwall3<BR>&nbsp;type=tunnel<BR>&nbsp;auto=route<BR>&nbsp;auth=esp<BR>&nbsp;authby=secret<BR>&nbsp;pfs=yes<BR>&nbsp;keyingtries=1<BR>&nbsp;dpddelay=60<BR>&nbsp;dpdtimeout=120<BR>&nbsp;dpdaction=clear<BR>&nbsp;left=%defaultroute<BR>&nbsp;leftsubnet=192.168.80.0/24<BR>&nbsp;right=xxx.xxx.xxx.xxx 
( Sonicwall IP HERE 
)<BR>&nbsp;rightsubnet=192.168.4.0/24<BR>&nbsp;keyexchange=ike</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial 
size=2>conn&nbsp;ToSonicwall4<BR>&nbsp;type=tunnel<BR>&nbsp;auto=route<BR>&nbsp;auth=esp<BR>&nbsp;authby=secret<BR>&nbsp;pfs=yes<BR>&nbsp;keyingtries=1<BR>&nbsp;dpddelay=60<BR>&nbsp;dpdtimeout=120<BR>&nbsp;dpdaction=clear&nbsp;<BR>&nbsp;left=%defaultroute<BR>&nbsp;leftsubnet=192.168.80.0/24<BR>&nbsp;right=xxx.xxx.xxx.xxx 
( Sonicwall IP HERE 
)<BR>&nbsp;rightsubnet=192.168.5.0/24<BR>&nbsp;keyexchange=ike</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial 
size=2>conn&nbsp;ToSonicwall5<BR>&nbsp;type=tunnel<BR>&nbsp;auto=route<BR>&nbsp;auth=esp<BR>&nbsp;authby=secret<BR>&nbsp;pfs=yes<BR>&nbsp;keyingtries=1<BR>&nbsp;dpddelay=60<BR>&nbsp;dpdtimeout=120<BR>&nbsp;dpdaction=clear&nbsp;<BR>&nbsp;left=%defaultroute<BR>&nbsp;leftsubnet=192.168.80.0/24<BR>&nbsp;right=216.41.108.242<BR>&nbsp;rightsubnet=192.168.6.0/24<BR>&nbsp;keyexchange=ike</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial 
size=2>conn&nbsp;ToSonicwall6<BR>&nbsp;type=tunnel<BR>&nbsp;auto=route<BR>&nbsp;auth=esp<BR>&nbsp;authby=secret<BR>&nbsp;pfs=yes<BR>&nbsp;keyingtries=1<BR>&nbsp;left=%defaultroute<BR>&nbsp;leftsubnet=192.168.80.0/24<BR>&nbsp;right=xxx.xxx.xxx.xxx 
( Sonicwall IP HERE 
)<BR>&nbsp;rightsubnet=192.168.7.0/24<BR>&nbsp;keyexchange=ike</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>conn&nbsp;ToSonicwall7</FONT></DIV>
<DIV><FONT face=Arial 
size=2>&nbsp;type=tunnel<BR>&nbsp;auto=route<BR>&nbsp;auth=esp<BR>&nbsp;authby=secret<BR>&nbsp;pfs=yes<BR>&nbsp;keyingtries=1<BR>&nbsp;dpddelay=60<BR>&nbsp;dpdtimeout=120<BR>&nbsp;dpdaction=clear&nbsp;<BR>&nbsp;left=%defaultroute<BR>&nbsp;leftsubnet=192.168.80.0/24<BR>&nbsp;right=xxx.xxx.xxx.xxx 
( Sonicwall IP HERE 
)<BR>&nbsp;rightsubnet=192.168.8.0/24<BR>&nbsp;keyexchange=ike</FONT></DIV>
<DIV><FONT face=Arial 
size=2>&nbsp;------------------------------------------------------------------------------------------------------------------------</FONT></DIV>
<DIV><FONT face=Arial size=2>ipsec.secrets</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>: PSK "xxxxxxxxxxxxxxxxx" Same as in Sonicwall 
Textbox<BR></DIV></FONT>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV>---- Original Message ----- </DIV>
<BLOCKQUOTE 
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B> 
  <A title=bas.driessen@xobas.com href="mailto:bas.driessen@xobas.com">Bas 
  Driessen</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>To:</B> <A title=paul@xelerance.com 
  href="mailto:paul@xelerance.com">Paul Wouters</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Cc:</B> <A title=users@openswan.org 
  href="mailto:users@openswan.org">users@openswan.org</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Sent:</B> Wednesday, September 27, 2006 7:28 
  PM</DIV>
  <DIV style="FONT: 10pt arial"><B>Subject:</B> Re: [Openswan Users] Openswan 
  Linux Client to SonicWallWindows Server.</DIV>
  <DIV><BR></DIV>On Wed, 2006-09-27 at 16:51 +0200, Paul Wouters wrote: 
  <BLOCKQUOTE TYPE="CITE"><PRE><FONT color=#000000>On Wed, 27 Sep 2006, Bas Driessen wrote:</FONT>

<FONT color=#000000>&gt; Going through the lists, I found out that DES is not supported by</FONT>
<FONT color=#000000>&gt; default in OpenSwan, so I have re-compiled the package by setting the</FONT>
<FONT color=#000000>&gt; USE_WEAKSTUFF?=true flag in the Makefile.inc and also corrected the line</FONT>
<FONT color=#000000>&gt; to WEAK_DEFS=-DUSE_VERYWEAK_DH1=1 -DUSE_1DES in the Makefile of Pluto.</FONT>
<FONT color=#000000>&gt; All compiles OK. I know that 3DES is better etc, but this is out of my</FONT>
<FONT color=#000000>&gt; control. I have to get it to work with the current setup.</FONT>

<FONT color=#000000>You might also need to set USE_BROKEN=yes</FONT>

<FONT color=#000000>3DES is not "better". 1DES is trivially brute forced. You have no VPN. You</FONT>
<FONT color=#000000>better make sure your boss knows that, and gets it in writing, so that</FONT>
<FONT color=#000000>you can blame management for this unwise decision.</FONT>

<FONT color=#000000>&gt;     left=%defaultroute</FONT>
<FONT color=#000000>&gt;     leftsubnet=192.168.1.0/24</FONT>
<FONT color=#000000>&gt;     leftid=192.168.1.13</FONT>

<FONT color=#000000>&gt; sonicwall.secrets</FONT>
<FONT color=#000000>&gt;</FONT>
<FONT color=#000000>&gt; 192.168.1.13 66.nnn.nnn.nnn : PSK "abcdef"</FONT>

<FONT color=#000000>If your ip is actually 192.168.1.13 you cannot tunnel 192.168.1.0/24.</FONT>
<FONT color=#000000>you cannot be at two places at once.</FONT>

</PRE></BLOCKQUOTE><BR>Thanks Paul, I have changed my leftsubnet as 
  follows:<BR><BR>leftsubnet=192.168.1.13/32<BR><BR>Still same failing results. 
  All I need is to connect from a Linux PC as a client to a VPN 
  tunnel.<BR><BR>Will try the USE_BROKEN switch 
  now.<BR><BR>Thanks,<BR>Bas.<BR><BR><BR><BR>
  <P>
  <HR>

  <P></P>_______________________________________________<BR>Users@openswan.org<BR>http://lists.openswan.org/mailman/listinfo/users<BR>Building 
  and Integrating Virtual Private Networks with Openswan: 
  <BR>http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155<BR></BLOCKQUOTE></BODY></HTML>