<html>
<head>
<style>
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Verdana
}
</style>
</head>
<body class='hmmessage'>
Thanks Pau<br>
<br>
<br>
I do not know how to upgrade, do not get<br><br>
<br>
<br>
<br>
<div class="ExternalClass" id="MsgContainer"><style>
.ExternalClass p.EC_MsoNormal, .ExternalClass li.EC_MsoNormal, .ExternalClass div.EC_MsoNormal
{margin-bottom:.0001pt;font-size:11.0pt;font-family:'Calibri','sans-serif';}
.ExternalClass span.EC_EstiloCorreo15
{font-family:'Calibri','sans-serif';color:windowtext;}
.ExternalClass .EC_MsoChpDefault
{;}
@page Section1
{size:612.0pt 792.0pt;}
.ExternalClass div.EC_Section1
{page:Section1;}
</style>
<p class="EC_MsoNormal"><span style="" lang="EN-US"> </span></p>
<p class="EC_MsoNormal" style=""><b><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">> ipsec
verify</span></b><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US"></span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Checking
your system to see if IPsec got installed and started correctly:</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Version
check and ipsec on-path<span style=""> </span><span style=""> </span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Linux
Openswan U2.4.9/K2.6.24-24-generic (netkey)</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Checking for
IPsec support in kernel<span style="">
</span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">NETKEY
detected, testing for disabled ICMP send_redirects<span style=""> </span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">NETKEY
detected, testing for disabled ICMP accept_redirects <span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Checking for
RSA private key (/etc/ipsec.secrets)<span style="">
</span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Checking
that pluto is running<span style=""> </span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Two or more
interfaces found, checking IP forwarding<span style="">
</span><span style=""> </span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Checking NAT
and MASQUERADEing<span style="">
</span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Checking for
'ip' command<span style="">
</span><span style=""> </span>[OK]</span></p>
<p class="EC_MsoNormal" style=""><span style="font-size: 10pt; font-family: 'Courier New';" lang="EN-US">Checking for
'iptables' command<span style="">
</span><span style=""> </span>[OK]</span></p></div><br><br>> Date: Mon, 27 Apr 2009 12:34:54 -0400<br>> From: paul@xelerance.com<br>> To: santi-ti@hotmail.com<br>> CC: users@openswan.org<br>> Subject: Re: [Openswan Users] openswan VPN between OpenSWAN and a client vpn<br>> <br>> On Mon, 27 Apr 2009, santi santi santi wrote:<br>> <br>> > This problem with Openswan version U2.4.9/K2.6.24-24-generic.<br>> <br>> upgrade to at least 2.4.14.<br>> <br>> > conn tunel<br>> > auth=esp<br>> > authby=secret<br>> > auto=add<br>> > compress=no<br>> > dpdaction=clear<br>> > dpddelay=30<br>> > dpdtimeout=120<br>> > esp=aes128-sha1<br>> > ike=aes128-sha<br>> > ikelifetime=60m<br>> > keyingtries=3<br>> > keylife=20m<br>> > left=172.16.0.10<br>> > leftsubnet=172.16.0.0/24<br>> > leftnexthop=172.16.0.1<br>> > pfs=no<br>> > rekeymargin=3m<br>> > right=%any<br>> > rightsubnet=172.16.0.15/24<br>> <br>> This tunnel will surely complete implode on itself. It lives on<br>> both sides of the tunnel AND it is using its own range to tunnel<br>> itself.<br>> <br>> Paul<br><br /><hr />Más rápido, sencillo y seguro. Descárgate ya el nuevo Internet Explorer 8 <a href='http://www.vivelive.com/ie8 ' target='_new'>¡Es gratis!</a></body>
</html>