Good morning,<br><br>I have a problem with Leopard, I have read the threads that are linked on jacco webpage. For me i diffirent: the tunnels go up, but don't work l2tpd.<br>This is the logs:<br><br>auth.log<br><br>Apr 30 14:56:59 vpnserver pluto[9623]: "roadwarrior"[3]<a href="http://192.168.1.55">192.168.1.55</a> #6: switched from "roadwarrior" to "roadwarrior"<br>
Apr 30 14:56:59 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://213.144.67.21">213.144.67.21</a> #6: deleting connection "roadwarrior" instance with peer <a href="http://192.168.1.55">192.168.1.55</a> {isakmp=#0/ipsec=#0}<br>
Apr 30 14:56:59 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #6: I am sending my cert<br>Apr 30 14:56:59 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #6: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3<br>
Apr 30 14:56:59 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #6: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}<br>
Apr 30 14:56:59 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #6: ignoring informational payload, type IPSEC_INITIAL_CONTACT<br>Apr 30 14:56:59 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #6: received and ignored informational message<br>
Apr 30 14:57:00 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #7: responding to Quick Mode {msgid:fa1bde89}<br>Apr 30 14:57:00 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #7: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1<br>
Apr 30 14:57:00 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #7: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2<br>Apr 30 14:57:00 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #7: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2<br>
Apr 30 14:57:00 vpnserver pluto[9623]: "roadwarrior"[4] <a href="http://192.168.1.55">192.168.1.55</a> #7: STATE_QUICK_R2: IPsec SA established {ESP=>0x0d23926b <0x5f69f275 xfrm=AES_128-HMAC_SHA1 NATD=none DPD=none}<br>
<br><br>but l2tpd don't go:<br><br>[global]<br>; if you run l2tpd on the internal interface only, enable the line below<br>; listen-addr = <a href="http://127.0.0.1">127.0.0.1</a><br>[lns default]<br>ip range = <a href="http://10.1.1.1">10.1.1.1</a> - <a href="http://10.1.1.50">10.1.1.50</a><br>
local ip = <a href="http://10.1.1.254">10.1.1.254</a><br>require chap = yes<br>refuse pap = yes<br>require authentication = yes<br>name = OpenswanVPNServer<br>ppp debug = yes<br>pppoptfile = /etc/ppp/options.l2tpd<br>length bit = yes<br>
<br><br>log:<br><br>Apr 29 17:39:48 vpnserver l2tpd[8216]: check_control: control, cid = 0, Ns = 0, Nr = 0<br>Apr 29 17:39:48 vpnserver l2tpd[8216]: handle_avps: handling avp's for tunnel 62387, call 65531<br>Apr 29 17:39:48 vpnserver l2tpd[8216]: message_type_avp: message type 1 (Start-Control-Connection-Request)<br>
Apr 29 17:39:48 vpnserver l2tpd[8216]: protocol_version_avp: peer is using version 1, revision 0.<br>Apr 29 17:39:48 vpnserver l2tpd[8216]: framing_caps_avp: supported peer frames: async sync<br>Apr 29 17:39:48 vpnserver l2tpd[8216]: hostname_avp: peer reports hostname ''<br>
Apr 29 17:39:48 vpnserver l2tpd[8216]: assigned_tunnel_avp: using peer's tunnel 17<br>Apr 29 17:39:48 vpnserver l2tpd[8216]: receive_window_size_avp: peer wants RWS of 4. Will use flow control.<br>Apr 29 17:39:48 vpnserver l2tpd[8216]: control_finish: Peer requested tunnel 17 twice, ignoring second one.<br>
Apr 29 17:39:52 vpnserver l2tpd[8216]: control_xmit: Unable to deliver closing message for tunnel 49184. Destroying anyway.<br><br><br><br>YOu have sugggestion?<br clear="all">
<br>-- <br>Denis Beltramo