<p>Hi All,</p>
<p>I want to create tunnel between two PCs. One PC is running Openswan-2.4.10 on Linux platform(Suse 10.1) and the other PC is on Windows XP (with Service Pack 2). I have Greenbow Client Software which could be run on my Windows PC. I have two GPRS modems which are connected to these two PCs. Now I want to create VPN tunnel between these two PCs using IPSec that is using Openswan. Is it possible to make this setup work successfully ?</p>
<p>I have tried using PSK (Pre Shared Key) as authentication and as well as using X.509 Certificates. But I could not create the tunnel in both ways. </p>
<p>Can you please suggest or tell your comments about the feasibility this configuration ?</p>
<p>Using PSK, Greenbow client software shows the following error.</p>
<p>20080131 131444 Default udp_create: no default transport<br>20080131 131444 Default exchange_establish: transport "udp" for peer "Gateway1-P1" could not be created<br>20080131 131500 Default IKE daemon is removing SAs...<br>
20080131 131505 Default Reinitializing IKE daemon<br>20080131 131505 Default Another IPSEC service is allready in service: WSA(10013)<br>20080131 131505 Default TGB::IKE arrêté<br>20080131 131505 Default udp_make: WSA:10013 bind (20944, <a href="http://117.97.150.166">117.97.150.166</a>, 4): WSA(0)<br>
20080131 131505 Default udp_bind_if: failed to create a socket on <a href="http://117.97.150.166:500">117.97.150.166:500</a><br>20080131 131505 Default IKE daemon reinitialized <br>20080131 131510 Default IKE daemon is removing SAs...<br>
20080131 131515 Default Reinitializing IKE daemon<br>20080131 131515 Default Another IPSEC service is allready in service: WSA(10013)<br>20080131 131515 Default TGB::IKE arrêté<br>20080131 131515 Default udp_make: WSA:10013 bind (20984, <a href="http://117.97.150.166">117.97.150.166</a>, 4): WSA(0)<br>
20080131 131515 Default udp_bind_if: failed to create a socket on <a href="http://117.97.150.166:500">117.97.150.166:500</a><br>20080131 131515 Default IKE daemon reinitialized <br>20080131 131520 Default udp_create: no default transport<br>
20080131 131520 Default exchange_establish: transport "udp" for peer "Gateway1-P1" could not be created</p>
<p><br>My ipsec.conf as follows:<br>version 2.0</p>
<p>config setup<br> plutowait=yes<br> interfaces=%defaultroute</p>
<p>conn %default<br> leftrsasigkey=%cert<br> rightrsasigkey=%cert<br> authby=secret<br>include /etc/ipsec.d/examples/no_oe.conf</p>
<p>conn west-east<br> left=<a href="http://117.97.141.229">117.97.141.229</a><br> right=<a href="http://117.97.150.166">117.97.150.166</a><br> type=tunnel<br> keyexchange=ike<br> ike=3des-md5-modp1024<br> auth=esp<br> pfs=yes<br>
esp=3des-md5<br> auto=start<br> dpddelay=30 <br> dpdtimeout=120<br> dpdaction=hold</p>
<p>My ipsec.secrets as follows:</p>
<p><a href="http://117.97.141.129">117.97.141.129</a> <a href="http://117.97.150.166">117.97.150.166</a> : PSK "temporary"</p>
<p>The IP Addresses (<a href="http://117.97.141.129">117.97.141.129</a> & <a href="http://117.97.150.166">117.97.150.166</a>) for these two machines are got from the Internet Service Provider once I get connection through GPRS.</p>
<div>Based on the ipsec.conf file, I am setting changes in the Greenbow VPN Client Software in Phase 1 and Phase 2.</div>
<div> </div>
<div>I am getting fatigue if i try using X.509 certificate for the above configuration. Kindly which method either using PSK or X.509 is okay for this configuration to make it up successively.</div>
<p>Kindly give your suggestions...</p>
<p>Regards,</p>
<p>Mohamed Mydeen A<br></p>