<html><head><style type="text/css"><!-- DIV {margin:0px;} --></style></head><body><div style="font-family:times new roman, new york, times, serif;font-size:10pt"><DIV>Hi List,</DIV>
<DIV> </DIV>
<DIV>I have a centos 5.4 + xl2tpd 1.2.5 compiled from source, openswan stock from centos 5.4 2.6.21</DIV>
<DIV> </DIV>
<DIV>ipsec was able to established, but an error in xl2tpd with maximum retries exceed appears on log file this is</DIV>
<DIV>the same config i have on different machine before without a hiccup. can some one shed some light thanks in advance</DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV>please find the following excerpt log,</DIV>
<DIV> </DIV>
<DIV>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: responding to Quick Mode proposal {msgid:01000000}<BR>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: us: 222.xx.xx.162<222.xx.xx.162>[+S=C]:17/1701---222.xx.xx.161<BR>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: them: 58.69.86.62[192.168.2.254,+S=C]:17/1701===192.168.2.254/32<BR>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1<BR>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2<BR>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2<BR>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1]
58.69.86.62 #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x0589839b <0xdfb44f01 xfrm=AES_128-HMAC_SHA1 NATOA=192.168.2.254 NATD=58.69.86.62:4500 DPD=none}</DIV>
<DIV> </DIV>
<DIV>Jan 8 02:36:08 tcmr xl2tpd[6518]: Maximum retries exceeded for tunnel 1127. Closing.<BR>Jan 8 02:45:04 tcmr xl2tpd[6518]: Connection 63 closed to 58.69.86.62, port 1701 (Timeout)<BR>Jan 8 02:45:09 tcmr xl2tpd[6518]: Maximum retries exceeded for tunnel 5511. Closing.</DIV>
<DIV> </DIV>
<DIV>my config snippet is</DIV>
<DIV> </DIV>
<DIV>version 2.0 # conforms to second version of ipsec.conf specification<BR>config setup<BR> interfaces=%defaultroute<BR> klipsdebug=none<BR> plutodebug=none<BR> nat_traversal=yes<BR> virtual_private=%v4:192.168.0.0/24,%v4:192.168.1.0/24,%v4:192.168.2.0/24<BR> protostack=netkey<BR> oe=off</DIV>
<DIV>conn %default<BR> keyingtries=3<BR> disablearrivalcheck=no<BR> authby=secret<BR> type=tunnel<BR> keyexchange=ike<BR> ikelifetime=240m<BR> keylife=60m</DIV>
<DIV>conn roadwarrior-net<BR> leftsubnet=192.168.0.0/24<BR> also=roadwarrior</DIV>
<DIV>conn roadwarrior-all<BR> leftsubnet=0.0.0.0/0<BR> also=roadwarrior</DIV>
<DIV>conn roadwarrior-l2tp<BR> leftprotoport=17/1701<BR> rightprotoport=17/%any<BR> also=roadwarrior</DIV>
<DIV>conn roadwarrior<BR> pfs=no<BR> left=222.xxx.xxx.162<BR> leftnexthop=222.xx.xx.161<BR> right=%any<BR> rightsubnet=vhost:%no,%priv<BR> auto=add<BR></DIV>
<DIV> </DIV>
<DIV>[global]<BR>port=1701<BR>;listen-addr = 192.168.0.1<BR>;<BR>; requires openswan-3.1 or higher<BR>;ipsec saref = yes<BR>;<BR>debug tunnel = yes</DIV>
<DIV>[lns default]<BR>ip range = 192.168.0.180-192.168.0.185<BR>local ip = 192.168.0.1<BR>require chap = yes<BR>refuse pap = yes<BR>require authentication = yes<BR>name = LinuxVPNserver<BR>ppp debug = yes<BR>pppoptfile = /etc/ppp/options.xl2tpd<BR>length bit = yes<BR></DIV><!-- cg26.c1.mail.mud.yahoo.com compressed/chunked Wed Jan 6 17:35:15 PST 2010 --></div><br>
</body></html>