[Openswan Users] ipsec vpn l2tp connects but then dies

Brad Chang openswan at dotnoc.com
Tue Jul 6 14:45:18 CEST 2004


thanks,  now I get error 619 "the specified port is not connected"


==> /var/log/daemon.log <==
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 0, Ns = 0,
Nr = 0
Jul  6 14:40:23 guardfw2 l2tpd[7982]: handle_avps: handling avp's for tunnel
51445, call 64159
Jul  6 14:40:23 guardfw2 l2tpd[7982]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Jul  6 14:40:23 guardfw2 l2tpd[7982]: protocol_version_avp: peer is using
version 1, revision 0.
Jul  6 14:40:23 guardfw2 l2tpd[7982]: framing_caps_avp: supported peer frames: sync
Jul  6 14:40:23 guardfw2 l2tpd[7982]: bearer_caps_avp: supported peer bearers:
Jul  6 14:40:23 guardfw2 l2tpd[7982]: firmware_rev_avp: peer reports firmware
version 1280 (0x0500)
Jul  6 14:40:23 guardfw2 l2tpd[7982]: hostname_avp: peer reports hostname 'pikachu'
Jul  6 14:40:23 guardfw2 l2tpd[7982]: vendor_avp: peer reports vendor
'Microsoft\200^H'
Jul  6 14:40:23 guardfw2 l2tpd[7982]: assigned_tunnel_avp: using peer's tunnel 4
Jul  6 14:40:23 guardfw2 l2tpd[7982]: receive_window_size_avp: peer wants RWS of
8.  Will use flow control.
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 0, Ns = 1,
Nr = 1
Jul  6 14:40:23 guardfw2 l2tpd[7982]: handle_avps: handling avp's for tunnel
51445, call 64159
Jul  6 14:40:23 guardfw2 l2tpd[7982]: message_type_avp: message type 3
(Start-Control-Connection-Connected)
Jul  6 14:40:23 guardfw2 l2tpd[7982]: control_finish: Connection established to
64.180.180.220, 1701.  Local: 51445, Remote: 4.  LNS session is 'default'
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 0, Ns = 2,
Nr = 1
Jul  6 14:40:23 guardfw2 l2tpd[7982]: handle_avps: handling avp's for tunnel
51445, call 64159
Jul  6 14:40:23 guardfw2 l2tpd[7982]: message_type_avp: message type 10
(Incoming-Call-Request)
Jul  6 14:40:23 guardfw2 l2tpd[7982]: message_type_avp: new incoming call
Jul  6 14:40:23 guardfw2 l2tpd[7982]: assigned_call_avp: using peer's call 1
Jul  6 14:40:23 guardfw2 l2tpd[7982]: call_serno_avp: serial number is 0
Jul  6 14:40:23 guardfw2 l2tpd[7982]: bearer_type_avp: peer bears: analog
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 0, Ns = 3,
Nr = 1
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 1, Ns = 3,
Nr = 2
Jul  6 14:40:23 guardfw2 l2tpd[7982]: handle_avps: handling avp's for tunnel
51445, call 64225
Jul  6 14:40:23 guardfw2 l2tpd[7982]: message_type_avp: message type 12
(Incoming-Call-Connected)
Jul  6 14:40:23 guardfw2 l2tpd[7982]: tx_speed_avp: transmit baud rate is 10000000
Jul  6 14:40:23 guardfw2 l2tpd[7982]: frame_type_avp: peer uses:sync frames
Jul  6 14:40:23 guardfw2 l2tpd[7982]: ignore_avp : Ignoring AVP
Jul  6 14:40:23 guardfw2 l2tpd[7982]: start_pppd: I'm running:
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "/usr/sbin/pppd"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "passive"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "-detach"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "192.168.1.51:192.168.1.25"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "refuse-pap"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "auth"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "require-chap"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "name"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "GuardianVPNserver"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "debug"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "file"
Jul  6 14:40:23 guardfw2 l2tpd[7982]: "/etc/ppp/options.l2tpd"
Jul  6 14:40:23 guardfw2 l2tpd[7982]:
Jul  6 14:40:23 guardfw2 l2tpd[7982]: control_finish: Call established with
64.180.180.220, Local: 64225, Remote: 1, Serial: 0
Jul  6 14:40:23 guardfw2 l2tpd[7982]: child_handler : pppd died for call 1
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 0, Ns = 4,
Nr = 2
Jul  6 14:40:23 guardfw2 l2tpd[7982]: read_packet: Error 9 (Bad file descriptor)
Jul  6 14:40:23 guardfw2 last message repeated 10 times
Jul  6 14:40:23 guardfw2 l2tpd[7982]: read_packet: Too many errors.  Declaring
call dead.
Jul  6 14:40:23 guardfw2 l2tpd[7982]: network_thread: tossing read packet, error
= Bad file descriptor (9).  Closing call.
Jul  6 14:40:23 guardfw2 l2tpd[7982]: call_close: Call 64225 to 64.180.180.220
disconnected
Jul  6 14:40:23 guardfw2 l2tpd[7982]: write_packet: Bad file descriptor(9)
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 0, Ns = 4,
Nr = 3
Jul  6 14:40:23 guardfw2 l2tpd[7982]: check_control: control, cid = 0, Ns = 4,
Nr = 3
Jul  6 14:40:23 guardfw2 l2tpd[7982]: handle_avps: handling avp's for tunnel
51445, call 64159
Jul  6 14:40:23 guardfw2 l2tpd[7982]: message_type_avp: message type 4
(Stop-Control-Connection-Notification)
Jul  6 14:40:23 guardfw2 l2tpd[7982]: assigned_tunnel_avp: using peer's tunnel 4
Jul  6 14:40:23 guardfw2 l2tpd[7982]: result_code_avp: peer closing for reason 6
(Requester is being shut down), error = 0 ()
Jul  6 14:40:23 guardfw2 l2tpd[7982]: control_finish: Connection closed to
64.180.180.220, port 1701 (), Local: 51445, Remote: 4

==> /var/log/auth.log <==
Jul  6 14:40:23 guardfw2 pluto[8082]: "roadwarrior2"[2] 64.180.180.220 #3:
received Delete SA(0x45c5510e) payload: deleting IPSEC State #4
Jul  6 14:40:23 guardfw2 pluto[8082]: "roadwarrior2"[2] 64.180.180.220 #3:
received Delete SA payload: deleting ISAKMP State #3
Jul  6 14:40:23 guardfw2 pluto[8082]: "roadwarrior2"[2] 64.180.180.220: deleting
connection "roadwarrior2" instance with peer 64.180.180.220 {isakmp=#0/ipsec=#0}








Quoting Jacco de Leeuw <jacco2 at dds.nl>:

> Brad Chang wrote:
> 
> > I have a vpn that is semi working. basically the tunnel will come up for
> about a
> > minuite, but during this time there is no ping over the tunnel etc.
> > 
> > [lns default]
> > ip range = 192.168.1.25-192.168.1.50
> > local ip = 216.187.95.142
> 
> No, 'local ip' should be on the *internal* subnet, i.e. something like
> 192.168.1.24 (not within 192.168.1.25-192.168.1.50). And also
> excluding the IP address of that internal interface.
> 
> > Jul  6 14:04:53 guardfw2 pppd[7583]: rcvd [CCP ConfRej id=0x1 <deflate
> 15>
> > <deflate(old#) 15>]
> 
> You can prevent these nasty Compression Control packets by adding
> noccp to /etc/ppp/options.l2tpd.
> 
> Jacco
> -- 
> Jacco de Leeuw                         mailto:jacco2 at dds.nl
> Zaandam, The Netherlands           http://www.jacco2.dds.nl
> 






Thanks and best regards,
-Brad Chang
-http://www.dotnoc.com


-------------------------------------------------------------------
hosting,web design and managed services @ http://www.dotnoc.com



More information about the Users mailing list