[Openswan Users] openswan and Cisco PIX
Serge Paquin
serge at skycomp.ca
Tue Mar 23 15:38:53 CET 2004
I cannot seem to get IPSec between my Cisco PIX and Openswan working. Below
I have included my configuration for both Cisco and openswan. Along with
debug output from Cisco and status output from openswan.
I am using the latest RPMs (Just download .tar.gz 1hour ago and built RPMs
myself) for openswan.
Any suggestions would be appriciated.
Thanks,
Serge.
********* ipsec.conf *********
conn tunnelipsec
type=tunnel
# The Linux box
left=67.71.216.114
leftnexthop=67.71.216.113
leftsubnet=192.168.2.0/24
# The Cisco PIX
right=207.61.27.102
rightnexthop=207.61.27.101
rightsubnet=192.168.7.0/24
esp=3des-md5-96
keyexchange=ike
# Pre-shared keys
#authby=secret
# Turn perfect forwarding security off
pfs=no
# auto=start will bring this up when you start ipsec
auto=start
********* ipsec.secrets *********
67.71.216.114 207.61.27.102: PSK "*****"
********* cisco config: *********
nameif ethernet0 outside security0
nameif ethernet1 inside security100
access-list NO-NAT permit ip 192.168.7.0 255.255.255.0 192.168.2.0
255.255.255.0
access-list FREESWAN-VPN permit ip 192.168.7.0 255.255.255.0 192.168.2.0
255.255.255.0
ip address outside 207.61.27.102 255.255.255.252
ip address inside 192.168.7.50 255.255.255.0
nat (inside) 0 access-list NO-NAT
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto map mymap 10 ipsec-isakmp
crypto map mymap 10 match address FREESWAN-VPN
crypto map mymap 10 set peer 67.71.216.114
crypto map mymap 10 set transform-set myset
crypto map mymap interface outside
isakmp enable outside
isakmp key ******** address 67.71.216.114 netmask 255.255.255.255 no-xauth
no-c
isakmp identity address
isakmp policy 5 authentication pre-share
isakmp policy 5 encryption 3des
isakmp policy 5 hash md5
isakmp policy 5 group 2
isakmp policy 5 lifetime 28800
********* ipsec auto --status ***********
000 interface ipsec0/eth1 67.71.216.114
000 %myid = (none)
000 debug
raw+crypt+parsing+emitting+control+lifecycle+klips+dns+oppo+controlmore+pfke
y+nattraversal
000
000 "tunnelipsec":
192.168.2.0/24===67.71.216.114---67.71.216.113...207.61.27.101---207.61.27.1
02===192.168.7.0/24; prospective erouted; eroute owner: #0
000 "tunnelipsec": ike_life: 3600s; ipsec_life: 28800s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "tunnelipsec": policy: RSASIG+ENCRYPT+TUNNEL+UP+lKOD+rKOD; prio:
24,24; interface: eth1;
000 "tunnelipsec": newest ISAKMP SA: #0; newest IPsec SA: #0;
000
000 #1: "tunnelipsec" STATE_MAIN_I1 (sent MI1, expecting MR1);
EVENT_RETRANSMIT in 20s
000 #1: pending Phase 2 for "tunnelipsec" replacing #0
000
********* Cisco Debug Output *********
ISAKMP (0): processing SA payload. message ID = 0
ISAKMP (0): Checking ISAKMP transform 0 against priority 5 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash MD5
ISAKMP: auth RSA sig
ISAKMP: default group 5
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 1 against priority 5 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash SHA
ISAKMP: auth RSA sig
ISAKMP: default group 5
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 2 against priority 5 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash SHA
ISAKMP: auth RSA sig
ISAKMP: default group 2
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 3 against priority 5 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash MD5
ISAKMP: auth RSA sig
ISAKMP: default group 2
ISAKMP (0): atts are not acceptable. Next payload is 0
ISAKMP (0): Checking ISAKMP transform 0 against priority 65535 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash MD5
ISAKMP: auth RSA sig
ISAKMP: default group 5
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 1 against priority 65535 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash SHA
ISAKMP: auth RSA sig
ISAKMP: default group 5
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 2 against priority 65535 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash SHA
ISAKMP: auth RSA sig
ISAKMP: default group 2
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 3 against priority 65535 policy
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 3600
ISAKMP: encryption 3DES-CBC
ISAKMP: hash MD5
ISAKMP: auth RSA sig
ISAKMP: default group 2
ISAKMP (0): atts are not acceptable. Next payload is 0
ISAKMP (0): no offers accepted!
ISAKMP (0): SA not acceptable!
return status is IKMP_ERR_TRANS
More information about the Users
mailing list