[Openswan Users] Connecting a branch office to nortel contivity
Ken Bantoft
ken at xelerance.com
Tue Dec 14 14:52:28 CET 2004
I did this config last year, and worked okay. I assume you used the
docs from http://www.freeswan.ca/docs/Contivity/ ? Although your config
differs a bit from mine.
You logs aren't usefull, as I don't see the pluto logs. KLIPS logs
won't be of much use in this, as it'll be a mismatch somewhere in the
configuration. Perhaps you need to look in /var/log/secure to see your
pluto logs, as on RH boxen, that's where pluto normally logs too.
Ensure Contivity is on 4.x code. I had issues on 3.x based Contivities.
On Tue, 2004-12-14 at 16:50 -0200, Bento Loewenstein wrote:
> Hi ppl,
>
> I'kind of desperate here. I'm trying to connect our branch office in
> brasil to a Nortel Contivity switch in the head office using openswan
> without luck.
>
> bellow is my ipsec.conf file. what happens is even when the tunnel is
> that the tunnel is not established. even when phase 2 negotiation
> completes my side doesen't send IKE packet to the head office according
> to my contact there. i'm also sending a packet dump.
>
> my setup is:
>
> Red hat linux 7.3 (updated with packages from fedoralegacy.org)
> vanila kernel 2.4.28 with nat-traversal patch
> openswan 2.1.6 (also tried 2.4.0dr4)
>
>
> a log with "klipsdebug=all" and "plutodebug=all" is available at
> http://sprints.tks.com.br/messages.log
>
> - any idea of what i'm doing wrong ?
> - would a complete upgrade (maybe debian sarge with 2.6 kernel) help ?
>
>
> Any help would be apreciated.
>
> TIA,
>
> Bento Loewenstein
>
> # /etc/ipsec.conf - Openswan IPsec configuration file
> # RCSID $Id: ipsec.conf.in,v 1.13 2004/03/24 04:14:39 ken Exp $
>
> # This file: /usr/local/share/doc/openswan/ipsec.conf-sample
> #
> # Manual: ipsec.conf.5
>
>
> version 2.0 # conforms to second version of ipsec.conf specification
>
> # basic configuration
> config setup
> # Debug-logging controls: "none" for (almost) none, "all" for
> lots.
> interfaces="ipsec0=eth1"
> klipsdebug=all
> plutodebug=all
>
> conn %default
> left=200.xxx.xxx.2
> leftnexthop=200.xxx.xxx.1
> leftsubnet=10.1.0.0/21
> keyingtries=10
> disablearrivalcheck=no
> auto=start
> keylife=8h
> rekeymargin=5m
> ikelifetime=3h
>
> include /etc/ipsec.d/examples/no_oe.conf
>
> conn nortel
> right=65.xxx.xxx.65
> rightsubnet=198.36.64.0/22
> pfs=yes
> compress=no
> authby=secret
> type=tunnel
> auto=route
> auth=esp
> esp=3des-md5-96
>
> keyexchange=ike
> keylife=8h
> keyingtries=3
>
> packet dump (with tcpdump -vnni host 65.xxx.xxx.65)
>
> 11:40:09.637570 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: isakmp 1.0 msgid
> : phase 1 R ident[E]: [encrypted id] [tos 0xe0]
> (ttl 53, id 6439, len 96)
>
> 11:40:19.014517 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: isakmp 1.0 msgid
> : phase 1 I ident[E]: [encrypted id] [tos 0xe0]
> (ttl 53, id 6634, len 88)
>
> 11:40:26.127226 200.xxx.xxx.2.500 > 65.xxx.xxx.65.500: isakmp 1.0 msgid
> : phase 1 R ident: [|ke] (DF) (ttl 64, id 0, len
> 208)
>
> 11:40:33.834634 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: isakmp 1.0 msgid
> : phase 1 I ident[E]: [encrypted id] [tos 0xe0]
> (ttl 53, id 6939, len 88)
>
> 11:40:34.912995 200.xxx.xxx.2.500 > 65.xxx.xxx.65.500: isakmp 1.0 msgid
> : phase 1 I ident[E]: [encrypted id] (DF) (ttl 64
> , id 0, len 96)
>
> 11:40:35.361100 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: isakmp 1.0 msgid
> : phase 1 R ident[E]: [encrypted id] [tos 0xe0]
> (ttl 53, id 6961, len 96)
>
> 11:40:50.319664 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: isakmp 1.0 msgid
> : phase 1 I ident[E]: [encrypted id] [tos 0xe0]
> (ttl 53, id 7192, len 88)
>
> 11:41:01.305440 200.xxx.xxx.2.500 > 65.xxx.xxx.65.500: isakmp 1.0 msgid
> : phase 2/others I oakley-quick[E]: [encrypted ha
> sh] (DF) (ttl 64, id 0, len 344)
>
> 11:41:10.594172 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: isakmp 1.0 msgid
> : phase 2/others R oakley-quick[E]: [encrypted ha
> sh] [tos 0xe0] (ttl 53, id 7615, len 320)
>
> 11:41:11.100647 200.xxx.xxx.2.500 > 65.xxx.xxx.65.500: isakmp 1.0 msgid
> : phase 1 R ident[E]: [encrypted id] (DF) (ttl 64
> , id 0, len 88)
>
> 11:41:12.684555 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: [udp sum
> ok]isakmp 1.0 msgid : phase 1 I inf:
> (n: doi=ipsec proto=isakmp type=INVALID-COOKIE) [tos 0xe0] (ttl
> 53, id 7654, len 68)
> 11:41:14.551198 200.xxx.xxx.2.500 > 65.xxx.xxx.65.500: isakmp 1.0 msgid
> : phase 2/others I oakley-quick[E]: [encrypted ha
> sh] (DF) (ttl 64, id 0, len 344)
>
> 11:41:26.143745 200.xxx.xxx.2.500 > 65.xxx.xxx.65.500: isakmp 1.0 msgid
> : phase 1 R ident[E]: [encrypted id] (DF) (ttl 64
> , id 0, len 88)
>
> 11:41:27.501807 200.xxx.xxx.2.500 > 65.xxx.xxx.65.500: isakmp 1.0 msgid
> : phase 1 R ident[E]: [encrypted id] (DF) (ttl 64
> , id 0, len 88)
>
> 11:41:30.928968 65.xxx.xxx.65.500 > 200.xxx.xxx.2.500: isakmp 1.0 msgid
> : phase 2/others R oakley-quick[E]: [encrypted ha
> sh] [tos 0xe0] (ttl 53, id 8042, len 320)
>
> _______________________________________________
> Users mailing list
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
More information about the Users
mailing list