<div dir="ltr"><div><div><div>Hi Ozai,<br><br></div>It could be that the router that is in front of the client that is trying to connect is altering the packages with IPsec-passthrough functions. Sometimes this breaks the connection and it is better to turn these features off. You could try to connect directly and see if that works. On the openswan 2.6.38 computer, what kernel version do you run? And which linux distribution? And the NAT is done by which device?<br>
<br></div>Greetings,<br><br></div>Bart<br></div><div class="gmail_extra"><br><br><div class="gmail_quote">2013/11/8 Ozai <span dir="ltr"><<a href="mailto:ozai.tien@gmail.com" target="_blank">ozai.tien@gmail.com</a>></span><br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><u></u>
<div dir="auto" bgcolor="#ffffff">
<div><font color="#0000ff" face="Verdana">Dear Sirs,</font></div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana">The messages are from server.It
seem that client did not transform the IP address.So the server can not check
antyhing.It seem the NAT traversal could not work.What kernel feature do I need
to enable?or anything else I need to check?</font></div><div class="im">
<div>
<div><font color="#0000ff" face="Verdana">Can someone point me in the
right direction?Please help,Thank's.</font></div></div>
<div><font color="#0000ff" face="Verdana"></font> </div>
</div><div><font color="#0000ff" face="Verdana">Best Regards,</font></div>
<div><font color="#0000ff" face="Verdana">Ozai</font></div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana">Nov 8 09:00:09 daemon err
ipsec_setup: Starting Openswan IPsec U2.6.38/K2.6.30...<br>Nov 8 09:00:09
daemon err ipsec_setup: Using NETKEY(XFRM) stack<br>Nov 8 09:00:11
authpriv err ipsec__plutorun: Starting Pluto subsystem...<br>Nov 8
09:00:11 user warn syslog: adjusting ipsec.d to /var/ipsec.d<br>Nov 8
09:00:11 daemon err ipsec__plutorun: adjusting ipsec.d to
/var/ipsec.d<br>Nov 8 09:00:11 authpriv warn pluto[8242]: WARNING: 1DES is
enabled<br>Nov 8 09:00:11 authpriv warn pluto[8242]: LEAK_DETECTIVE
support [disabled]<br>Nov 8 09:00:11 authpriv warn pluto[8242]: OCF
support for IKE [disabled]<br>Nov 8 09:00:11 authpriv warn pluto[8242]:
NSS support [disabled]<br>Nov 8 09:00:11 authpriv warn pluto[8242]:
HAVE_STATSD notification support not compiled in<br>Nov 8 09:00:11
authpriv warn pluto[8242]: Setting NAT-Traversal port-4500 floating to
off<br>Nov 8 09:00:11 authpriv warn pluto[8242]: port
floating activation criteria nat_t=0/port_float=1<br>Nov 8 09:00:11
authpriv warn pluto[8242]: NAT-Traversal support
[disabled]<br>Nov 8 09:00:11 authpriv warn pluto[8242]: using /dev/urandom
as source of random entropy<br>Nov 8 09:00:11 daemon err ipsec_setup:
...Openswan IPsec started<br>Nov 8 09:00:11 authpriv warn pluto[8242]:
starting up 1 cryptographic helpers<br>Nov 8 09:00:11 authpriv warn
pluto[8242]: started helper pid=8244 (fd:6)<br>Nov 8 09:00:11 authpriv
warn pluto[8244]: using /dev/urandom as source of random entropy<br>Nov 8
09:00:13 authpriv warn pluto[8242]: Could not change to directory
'/var/ipsec.d/cacerts': No such file or directory<br>Nov 8 09:00:13
authpriv warn pluto[8242]: Could not change to directory '/var/ipsec.d/aacerts':
No such file or directory<br>Nov 8 09:00:13 authpriv warn pluto[8242]:
Could not change to directory '/var/ipsec.d/ocspcerts': No such file or
directory<br>Nov 8 09:00:13 authpriv warn pluto[8242]: Could not change to
directory '/var/ipsec.d/crls': 2 No such file or directory<br>Nov 8
09:00:13 authpriv warn pluto[8242]: added connection description
"test"<br>Nov 8 09:00:13 daemon err ipsec__plutorun: 002 added connection
description "test"<br>Nov 8 09:00:14 authpriv warn pluto[8242]: listening
for IKE messages<br>Nov 8 09:00:14 authpriv warn pluto[8242]: adding
interface eth3.1/eth3.1 <a href="http://192.17.200.110:500" target="_blank">192.17.200.110:500</a><br>Nov 8 09:00:14 authpriv warn
pluto[8242]: adding interface br0/br0 <a href="http://192.168.12.254:500" target="_blank">192.168.12.254:500</a><br>Nov 8 09:00:14
authpriv warn pluto[8242]: adding interface lo/lo <a href="http://127.0.0.1:500" target="_blank">127.0.0.1:500</a><br>Nov 8
09:00:14 authpriv warn pluto[8242]: adding interface lo/lo ::1:500<br>Nov
8 09:00:14 authpriv warn pluto[8242]: loading secrets from
"/var/ipsec.secrets"<br>Nov 8 09:00:15 authpriv warn pluto[8242]: "test":
deleting connection<br>Nov 8 09:00:15 authpriv warn pluto[8242]: added
connection description "test"<br>Nov 8 09:00:15 authpriv warn pluto[8242]:
"test" #1: initiating Main Mode<br>Nov 8 09:00:15 authpriv warn
pluto[8242]: "test" #1: ERROR: asynchronous network error report on eth3.1
(sport=500) for message to 192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>:
Connection refused [errno 146, origin ICMP type 3 code 3 (not<br>Nov 8
09:00:20 authpriv warn pluto[8242]: packet from 192.17.200:1: received Vendor ID
payload [Dead Peer Detection]<br>Nov 8 09:00:20 authpriv warn pluto[8242]:
"test" #2: responding to Main Mode<br>Nov 8 09:00:20 authpriv warn
pluto[8242]: "test" #2: transition from state STATE_MAIN_R0 to state
STATE_MAIN_R1<br>Nov 8 09:00:20 authpriv warn pluto[8242]: "test" #2:
STATE_MAIN_R1: sent MR1, expecting MI2<br>Nov 8 09:00:21 authpriv warn
pluto[8242]: "test" #2: transition from state STATE_MAIN_R1 to state
STATE_MAIN_R2<br>Nov 8 09:00:21 authpriv warn pluto[8242]: "test" #2:
STATE_MAIN_R2: sent MR2, expecting MI3<br>Nov 8 09:00:21 authpriv warn
pluto[8242]: "test" #2: Main mode peer ID is ID_IPV4_ADDR:
'192.168.11.2'<br>Nov 8 09:00:21 authpriv warn pluto[8242]: "test" #2: no
suitable connection for peer '192.168.11.2'<br>Nov 8 09:00:21 authpriv
warn pluto[8242]: "test" #2: sending encrypted notification
INVALID_ID_INFORMATION to <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:00:25 authpriv warn
pluto[8242]: "test" #1: ERROR: asynchronous network error report on eth3.1
(sport=500) for message to 192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>:
Connection refused [errno 146, origin ICMP type 3 code 3 (not<br>Nov 8
09:00:31 authpriv warn pluto[8242]: "test" #2: no suitable connection for peer
'192.168.11.2'<br>Nov 8 09:00:31 authpriv warn pluto[8242]: "test" #2:
sending encrypted notification INVALID_ID_INFORMATION to
<a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:00:45 authpriv warn pluto[8242]: "test" #1:
ERROR: asynchronous network error report on eth3.1 (sport=500) for message to
192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>: Connection refused [errno
146, origin ICMP type 3 code 3 (not<br>Nov 8 09:00:51 authpriv warn
pluto[8242]: "test" #2: no suitable connection for peer
'192.168.11.2'<br>Nov 8 09:00:51 authpriv warn pluto[8242]: "test" #2:
sending encrypted notification INVALID_ID_INFORMATION to
<a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:01:25 authpriv warn pluto[8242]: "test" #1:
ERROR: asynchronous network error report on eth3.1 (sport=500) for message to
192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>: Connection refused [errno
146, origin ICMP type 3 code 3 (not<br>Nov 8 09:01:31 authpriv warn
pluto[8242]: packet from <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a>: received Vendor ID payload [Openswan
(this version) 2.6.38 ]<br>Nov 8 09:01:31 authpriv warn pluto[8242]:
packet from <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a>: received Vendor ID payload [Dead Peer
Detection]<br>Nov 8 09:01:31 authpriv warn pluto[8242]: "test" #3:
responding to Main Mode<br>Nov 8 09:01:31 authpriv warn pluto[8242]:
"test" #3: transition from state STATE_MAIN_R0 to state
STATE_MAIN_R1<br>Nov 8 09:01:31 authpriv warn pluto[8242]: "test" #3:
STATE_MAIN_R1: sent MR1, expecting MI2<br>Nov 8 09:01:31 authpriv warn
pluto[8242]: "test" #3: transition from state STATE_MAIN_R1 to state
STATE_MAIN_R2<br>Nov 8 09:01:31 authpriv warn pluto[8242]: "test" #3:
STATE_MAIN_R2: sent MR2, expecting MI3<br>Nov 8 09:01:31 authpriv warn
pluto[8242]: "test" #3: Main mode peer ID is ID_IPV4_ADDR:
'192.168.11.2'<br>Nov 8 09:01:31 authpriv warn pluto[8242]: "test" #3: no
suitable connection for peer '192.168.11.2'<br>Nov 8 09:01:31 authpriv
warn pluto[8242]: "test" #3: sending encrypted notification
INVALID_ID_INFORMATION to <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:01:41 authpriv warn
pluto[8242]: "test" #3: Main mode peer ID is ID_IPV4_ADDR:
'192.168.11.2'<br>Nov 8 09:01:41 authpriv warn pluto[8242]: "test" #3: no
suitable connection for peer '192.168.11.2'<br>Nov 8 09:01:41 authpriv
warn pluto[8242]: "test" #3: sending encrypted notification
INVALID_ID_INFORMATION to <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:02:01 authpriv warn
pluto[8242]: "test" #3: Main mode peer ID is ID_IPV4_ADDR:
'192.168.11.2'<br>Nov 8 09:02:01 authpriv warn pluto[8242]: "test" #3: no
suitable connection for peer '192.168.11.2'<br>Nov 8 09:02:01 authpriv
warn pluto[8242]: "test" #3: sending encrypted notification
INVALID_ID_INFORMATION to <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:02:05 authpriv warn
pluto[8242]: "test" #1: ERROR: asynchronous network error report on eth3.1
(sport=500) for message to 192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>:
Connection refused [errno 146, origin ICMP type 3 code 3 (not<br>Nov 8
09:02:41 authpriv warn pluto[8242]: packet from <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a>: received Vendor
ID payload [Dead Peer Detection]<br>Nov 8 09:02:41 authpriv warn
pluto[8242]: "test" #4: responding to Main Mode<br>Nov 8 09:02:41 authpriv
warn pluto[8242]: "test" #4: transition from state STATE_MAIN_R0 to state
STATE_MAIN_R1<br>Nov 8 09:02:41 authpriv warn pluto[8242]: "test" #4:
STATE_MAIN_R1: sent MR1, expecting MI2<br>Nov 8 09:02:41 authpriv warn
pluto[8242]: "test" #3: max number of retransmissions (2) reached
STATE_MAIN_R2<br>Nov 8 09:02:41 authpriv warn pluto[8242]: "test" #4:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2<br>Nov 8
09:02:41 authpriv warn pluto[8242]: "test" #4: STATE_MAIN_R2: sent MR2,
expecting MI3<br>Nov 8 09:02:41 authpriv warn pluto[8242]: "test" #4: Main
mode peer ID is ID_IPV4_ADDR: '192.168.11.2'<br>Nov 8 09:02:41 authpriv
warn pluto[8242]: "test" #4: no suitable connection for peer
'192.168.11.2'<br>Nov 8 09:02:41 authpriv warn pluto[8242]: "test" #4:
sending encrypted notification INVALID_ID_INFORMATION to
<a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:02:45 authpriv warn pluto[8242]: "test" #1:
ERROR: asynchronous network error report on eth3.1 (sport=500) for message to
192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>: Connection refused [errno
146, origin ICMP type 3 code 3 (not<br>Nov 8 09:02:51 authpriv warn
pluto[8242]: "test" #4: no suitable connection for peer
'192.168.11.2'<br>Nov 8 09:02:51 authpriv warn pluto[8242]: "test" #4:
sending encrypted notification INVALID_ID_INFORMATION to
<a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:03:11 authpriv warn pluto[8242]: "test" #4:
Main mode peer ID is ID_IPV4_ADDR: '192.168.11.2'<br>Nov 8 09:03:11
authpriv warn pluto[8242]: "test" #4: no suitable connection for peer
'192.168.11.2'<br>Nov 8 09:03:11 authpriv warn pluto[8242]: "test" #4:
sending encrypted notification INVALID_ID_INFORMATION to
<a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a><br>Nov 8 09:03:25 authpriv warn pluto[8242]: "test" #1:
max number of retransmissions (5) reached STATE_MAIN_I1. No response (or
no acceptable response) to our first IKE message<br>Nov 8 09:03:25
authpriv warn pluto[8242]: "test" #5: initiating Main Mode to replace
#1<br>Nov 8 09:03:25 authpriv warn pluto[8242]: "test" #5: ERROR:
asynchronous network error report on eth3.1 (sport=500) for message to
192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>: Connection refused [errno
146, origin ICMP type 3 code 3 (not<br>Nov 8 09:03:51 authpriv warn
pluto[8242]: packet from <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a>: received Vendor ID payload [Openswan
(this version) 2.6.38 ]<br>Nov 8 09:03:51 authpriv warn pluto[8242]:
packet from <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a>: received Vendor ID payload [Dead Peer
Detection]<br>Nov 8 09:03:51 authpriv warn pluto[8242]: "test" #6:
responding to Main Mode<br>Nov 8 09:03:51 authpriv warn pluto[8242]:
"test" #6: transition from state STATE_MAIN_R0 to state
STATE_MAIN_R1<br>Nov 8 09:03:51 authpriv warn pluto[8242]: "test" #6:
STATE_MAIN_R1: sent MR1, expecting MI2<br>Nov 8 09:03:51 authpriv warn
pluto[8242]: "test" #4: max number of retransmissions (2) reached
STATE_MAIN_R2<br>Nov 8 09:03:55 authpriv warn pluto[8242]: "test" #5:
ERROR: asynchronous network error report on eth3.1 (sport=500) for message to
192.17.200.79 port 500, complainant <a href="http://192.17.200.79" target="_blank">192.17.200.79</a>: Connection refused [errno
146, origin ICMP type 3 code 3 (not<br>Nov 8 09:04:01 authpriv warn
pluto[8242]: "test" #6: STATE_MAIN_R2: sent MR2, expecting MI3<br>Nov 8
09:04:01 authpriv warn pluto[8242]: "test" #6: Main mode peer ID is
ID_IPV4_ADDR: '192.168.11.2'<br>Nov 8 09:04:01 authpriv warn pluto[8242]:
"test" #6: no suitable connection for peer '192.168.11.2'<br>Nov 8
09:04:01 authpriv warn pluto[8242]: "test" #6: sending encrypted notification
INVALID_ID_INFORMATION to <a href="http://192.17.200.79:1" target="_blank">192.17.200.79:1</a></font></div><div><div class="h5">
<blockquote style="BORDER-LEFT:#0000ff 2px solid;PADDING-LEFT:5px;PADDING-RIGHT:0px;MARGIN-LEFT:5px;MARGIN-RIGHT:0px" dir="ltr">
<div style="FONT:10pt 新細明體">----- Original Message ----- </div>
<div style="FONT:10pt 新細明體;BACKGROUND:#e4e4e4"><b>From:</b>
<a title="ozai.tien@gmail.com" href="mailto:ozai.tien@gmail.com" target="_blank">Ozai</a> </div>
<div style="FONT:10pt 新細明體"><b>To:</b> <a title="users@lists.openswan.org" href="mailto:users@lists.openswan.org" target="_blank">users@lists.openswan.org</a> </div>
<div style="FONT:10pt 新細明體"><b>Sent:</b> Tuesday, November 05, 2013 6:17
PM</div>
<div style="FONT:10pt 新細明體"><b>Subject:</b> NAT-Traversal issue</div>
<div><br></div>
<div><font color="#0000ff" face="Verdana">Hi Sirs,</font></div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana">I setup a openswan VPN
client behind the NAT.The test environment is as below.</font></div>
<div><font color="#0000ff" face="Verdana">It did not work.The traffic did
not seem to pass to server.</font></div>
<div><font color="#0000ff" face="Verdana">I got a message like
"NAT-Traversal: ESPINUDP(1) not supported by kernel for family
IPv4".</font></div>
<div><font color="#0000ff" face="Verdana">It seem the NAT Traversal
issue.</font><font color="#0000ff" face="Verdana">What kernel feature do I
need to enable?or anything else I need to check?</font></div>
<div><font color="#0000ff" face="Verdana">Can someone point me in the
right direction?Please help,Thank's.</font></div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana"> 2.6.38
client--------------------NAT------------------ 2.6.38 Server</font></div>
<div><font color="#0000ff" face="Verdana">192.168.15.x 192.168.11.x
192.17.200.x
192.168.12.x</font></div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana">Nov 5 10:01:11 daemon err
ipsec_setup: Starting Openswan IPsec U2.6.38/K2.6.30...<br>Nov 5
10:01:11 daemon err ipsec_setup: Using NETKEY(XFRM) stack<br>Nov 5
10:01:13 authpriv err ipsec__plutorun: Starting Pluto
subsystem...<br>Nov 5 10:01:13 user warn syslog: adjusting ipsec.d to
/var/ipsec.d<br>Nov 5 10:01:13 authpriv warn pluto[11706]: WARNING: 1DES
is enabled<br>Nov 5 10:01:13 authpriv warn pluto[11706]: LEAK_DETECTIVE
support [disabled]<br>Nov 5 10:01:13 authpriv warn pluto[11706]: OCF
support for IKE [disabled]<br>Nov 5 10:01:13 authpriv warn pluto[11706]:
NSS support [disabled]<br>Nov 5 10:01:13 authpriv warn pluto[11706]:
HAVE_STATSD notification support not compiled in<br>Nov 5 10:01:13
authpriv warn pluto[11706]: Setting NAT-Traversal port-4500 floating to
on<br>Nov 5 10:01:13 authpriv warn pluto[11706]: port
floating activation criteria nat_t=1/port_float=1<br>Nov 5 10:01:13
authpriv warn pluto[11706]: NAT-Traversal support
[enabled]<br>Nov 5 10:01:13 authpriv warn pluto[11706]: using
/dev/urandom as source of random entropy<br>Nov 5 10:01:13 daemon err
ipsec__plutorun: adjusting ipsec.d to /var/ipsec.d<br>Nov 5 10:01:13
authpriv warn pluto[11706]: starting up 1 cryptographic helpers<br>Nov 5
10:01:13 authpriv warn pluto[11711]: using /dev/urandom as source of random
entropy<br>Nov 5 10:01:13 authpriv warn pluto[11706]: started helper
pid=11711 (fd:6)<br>Nov 5 10:01:13 daemon err ipsec_setup: ...Openswan
IPsec started<br>Nov 5 10:01:15 authpriv warn pluto[11706]: Could not
change to directory '/var/ipsec.d/cacerts': No such file or
directory<br>Nov 5 10:01:15 authpriv warn pluto[11706]: Could not change
to directory '/var/ipsec.d/aacerts': No such file or directory<br>Nov 5
10:01:15 authpriv warn pluto[11706]: Could not change to directory
'/var/ipsec.d/ocspcerts': No such file or directory<br>Nov 5 10:01:15
authpriv warn pluto[11706]: Could not change to directory '/var/ipsec.d/crls':
2 No such file or directory<br>Nov 5 10:01:15 authpriv warn
pluto[11706]: added connection description "test"<br>Nov 5 10:01:15
daemon err ipsec__plutorun: 002 added connection description
"test"<br>Nov 5 10:01:15 authpriv warn pluto[11706]: listening for IKE
messages<br>Nov 5 10:01:15 authpriv warn pluto[11706]: NAT-Traversal:
ESPINUDP(1) not supported by kernel for family IPv4<br>Nov 5 10:01:15
authpriv warn pluto[11706]: adding interface eth0.1/eth0.1
<a href="http://192.168.11.2:500" target="_blank">192.168.11.2:500</a><br>Nov 5 10:01:15 daemon err ipsec__plutorun: 003
NAT-Traversal: ESPINUDP(1) not supported by kernel for family
IPv4<br>Nov 5 10:01:15 authpriv warn pluto[11706]: NAT-Traversal:
ESPINUDP(2) not supported by kernel for family IPv4<br>Nov 5 10:01:15
authpriv warn pluto[11706]: NAT-Traversal port floating turned
off<br>Nov 5 10:01:15 daemon err ipsec__plutorun: 003 NAT-Traversal:
ESPINUDP(2) not supported by kernel for family IPv4<br>Nov 5 10:01:15
authpriv warn pluto[11706]: NAT-Traversal is turned OFF due to lack of KERNEL
support: 0/0<br>Nov 5 10:01:15 authpriv warn pluto[11706]: adding
interface eth0.1/eth0.1 <a href="http://192.168.11.2:4500" target="_blank">192.168.11.2:4500</a><br>Nov 5 10:01:15 authpriv
warn pluto[11706]: adding interface br0/br0 <a href="http://192.168.15.254:500" target="_blank">192.168.15.254:500</a><br>Nov 5
10:01:15 authpriv warn pluto[11706]: adding interface lo/lo
<a href="http://127.0.0.1:500" target="_blank">127.0.0.1:500</a><br>Nov 5 10:01:15 authpriv warn pluto[11706]: adding
interface lo/lo ::1:500<br>Nov 5 10:01:15 authpriv warn pluto[11706]:
loading secrets from "/var/ipsec.secrets"<br>Nov 5 10:01:17 authpriv
warn pluto[11706]: "test": deleting connection<br>Nov 5 10:01:17
authpriv warn pluto[11706]: added connection description "test"<br>Nov 5
10:01:18 authpriv warn pluto[11706]: "test" #1: initiating Main
Mode<br>Nov 5 10:01:18 authpriv warn pluto[11706]: "test" #1: received
Vendor ID payload [Openswan (this version) 2.6.38 ]<br>Nov 5 10:01:18
authpriv warn pluto[11706]: "test" #1: received Vendor ID payload [Dead Peer
Detection]<br>Nov 5 10:01:18 authpriv warn pluto[11706]: "test" #1:
transition from state STATE_MAIN_I1 to state STATE_MAIN_I2<br>Nov 5
10:01:18 authpriv warn pluto[11706]: "test" #1: STATE_MAIN_I2: sent MI2,
expecting MR2<br>Nov 5 10:01:18 authpriv warn pluto[11706]: "test" #1:
transition from state STATE_MAIN_I2 to state STATE_MAIN_I3<br>Nov 5
10:01:18 authpriv warn pluto[11706]: "test" #1: STATE_MAIN_I3: sent MI3,
expecting MR3<br>Nov 5 10:01:18 authpriv warn pluto[11706]: "test" #1:
ignoring informational payload, type INVALID_ID_INFORMATION
msgid=00000000<br>Nov 5 10:01:18 authpriv warn pluto[11706]: "test" #1:
received and ignored informational message</font></div>
<div><font color="#0000ff" face="Verdana"> </font></div>
<div><br>config
setup<br>
nat_traversal=yes<br>
keep_alive=60<br>
oe=off<br>
protostack=netkey<br>
interfaces=%defaultroute</div>
<div> </div>
<div><font color="#0000ff" face="Verdana">conn
test<br>
left=192.168.11.2<br>
leftsubnet=<a href="http://192.168.15.0/24" target="_blank">192.168.15.0/24</a><br>
rightsubnet=<a href="http://192.168.12.0/24" target="_blank">192.168.12.0/24</a><br>
connaddrfamily=ipv4<br>
right=192.17.200.110<br>
ike=3des-md5;modp1024!<br>
ikelifetime=480m<br>
type=tunnel<br>
salifetime=60m<br>
phase2alg=3des-hmac_md5!<br>
pfs=no<br>
phase2=esp<br>
keyexchange=ike<br>
authby=secret<br>
auto=add</font></div>
<div><font color="#0000ff" face="Verdana"></font> </div>
<div><font color="#0000ff" face="Verdana">Best Regards,</font></div>
<div><font color="#0000ff" face="Verdana">Ozai</font></div></blockquote></div></div></div>
<br>_______________________________________________<br>
<a href="mailto:Users@lists.openswan.org">Users@lists.openswan.org</a><br>
<a href="https://lists.openswan.org/mailman/listinfo/users" target="_blank">https://lists.openswan.org/mailman/listinfo/users</a><br>
Micropayments: <a href="https://flattr.com/thing/38387/IPsec-for-Linux-made-easy" target="_blank">https://flattr.com/thing/38387/IPsec-for-Linux-made-easy</a><br>
Building and Integrating Virtual Private Networks with Openswan:<br>
<a href="http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155" target="_blank">http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155</a><br>
<br></blockquote></div><br><br clear="all"><br>-- <br><span style="font-family:Calibri,sans-serif;font-size:14px;border-collapse:collapse">**** DISCLAIMER ****<br><br>"This e-mail and any attachment thereto may contain information which is confidential and/or protected by intellectual property rights and are intended for the sole use of the recipient(s) named above. <br>
Any use of the information contained herein (including, but not limited to, total or partial reproduction, communication or distribution in any form) by other persons than the designated recipient(s) is prohibited. <br>If you have received this e-mail in error, please notify the sender either by telephone or by e-mail and delete the material from any computer".<br>
<br>Thank you for your cooperation.</span>
</div>