Dear Sirs,<br><br>I still have some problems setting up my roadwarriors. As you could have read in my previous messages, I can make a net-to-net connection.<br>While trying to setup my roadwarrior connection I encounter this problem.
<br><br>029 "road-to-gate": cannot initiate connection without knowing peer IP address (kind=CK_TEMPLATE)<br><br>Now my question is could one of you fine gentleman help me with my problem,<br><br>sincerly,<br><br>
Tjeard<br><br>here is my ipsec.conf file<br><br>#Disable Opportunistic Encryption<br>include /etc/ipsec.d/examples/no_oe.conf<br><br>#<br>#File: /etc/ipsec.conf<br>#<br>conn road-to-gate<br> left=<a href="http://172.16.12.33">
172.16.12.33</a> # Gateway's information<br> leftid=@r119-lnx-e01 #<br> leftsubnet=<a href="http://255.255.0.0/24">255.255.0.0/24</a> #<br> leftrsasigkey=0sAQNn+<br>
#<br> rightnexthop=<a href="http://172.16.0.254">172.16.0.254</a> # Correct in many situations<br> right=%any # Wildcard: we don't know the laptop's IP
<br> rightid=@r119-lnx-e03 #<br> rightrsasigkey=0sAQPNAN<br> #<br> auto=start # authorizes but doesn't start this<br>
# connection at startup<br><br><br><br>here is my ipsec route.<br><br>R119-lnx-e01:~# ipsec auto --route road-to-gate<br>025 "road-to-gate": cannot route template policy of RSASIG+ENCRYPT+TUNNEL+PFS
<br>025 "road-to-gate": could not route<br><br>and here is the ipsec status<br><br>R119-lnx-e01:~# ipsec auto --status<br>000 interface lo/lo ::1<br>000 interface lo/lo <a href="http://127.0.0.1">127.0.0.1</a><br>
000 interface eth1/eth1 <a href="http://172.16.12.33">172.16.12.33</a><br>000 %myid = (none)<br>000 debug none<br>000<br>000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64, keysizemax=64<br>000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192, keysizemax=192
<br>000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40, keysizemax=448<br>000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0, keysizemax=0<br>000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128, keysizemax=256
<br>000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8, keysizemin=128, keysizemax=256<br>000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8, keysizemin=128, keysizemax=256<br>000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
<br>000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160<br>000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, keysizemin=256, keysizemax=256<br>000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0, keysizemax=0
<br>000<br>000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192<br>000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128<br>000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
<br>000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20<br>000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024<br>000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536<br>000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
<br>000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072<br>000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096<br>000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
<br>000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192<br>000<br>000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,0,0} trans={0,0,0} attrs={0,0,0}<br>000<br>000 "road-to-gate":
<a href="http://255.255.0.0/24===172.16.12.33[@r119-lnx-e01]...172.16.0.254---%any[@r119-lnx-e03]">255.255.0.0/24===172.16.12.33[@r119-lnx-e01]...172.16.0.254---%any[@r119-lnx-e03]</a>; unrouted; eroute owner: #0<br>000 "road-to-gate": srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
<br>000 "road-to-gate": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0<br>000 "road-to-gate": policy: RSASIG+ENCRYPT+TUNNEL+PFS; prio: 24,32; interface: eth1;
<br>000 "road-to-gate": newest ISAKMP SA: #0; newest IPsec SA: #0;<br>000<br>000<br><br><br><br>