[Openswan Users] Not passing the "STATE_QUICK_I1: initiate"
Oliver Schulze L.
oliver at samera.com.py
Mon Nov 7 18:48:17 CET 2005
Hi,
I'm trying to connect RH9 <-> Cisco, I have another thread in the list
named "[Openswan Users] Connecting RH9 <-> Cisco", but I created
this one because I have a more specific question.
Here is my output:
# ipsec auto --verbose --up ipsec01
002 "ipsec01" #1587: initiating Main Mode
104 "ipsec01" #1587: STATE_MAIN_I1: initiate
002 "ipsec01" #1587: transition from state STATE_MAIN_I1 to state
STATE_MAIN_I2
106 "ipsec01" #1587: STATE_MAIN_I2: sent MI2, expecting MR2
003 "ipsec01" #1587: received Vendor ID payload [Cisco-Unity]
003 "ipsec01" #1587: received Vendor ID payload [Dead Peer Detection]
003 "ipsec01" #1587: ignoring unknown Vendor ID payload
[56e1df657ba6c134da7f5ed33ba2851c]
003 "ipsec01" #1587: received Vendor ID payload [XAUTH]
002 "ipsec01" #1587: I did not send a certificate because I do not have
one.
002 "ipsec01" #1587: transition from state STATE_MAIN_I2 to state
STATE_MAIN_I3
108 "ipsec01" #1587: STATE_MAIN_I3: sent MI3, expecting MR3
002 "ipsec01" #1587: Main mode peer ID is ID_IPV4_ADDR: '10.200.200.2'
002 "ipsec01" #1587: transition from state STATE_MAIN_I3 to state
STATE_MAIN_I4
004 "ipsec01" #1587: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1536}
002 "ipsec01" #1588: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using
isakmp#1587}
117 "ipsec01" #1588: STATE_QUICK_I1: initiate
010 "ipsec01" #1588: STATE_QUICK_I1: retransmission; will wait 20s for
response
010 "ipsec01" #1588: STATE_QUICK_I1: retransmission; will wait 40s for
response
The problem is that I don't get pass the:
117 "ipsec01" #1588: STATE_QUICK_I1: initiate
message. Reading further, I found this page:
http://wiki.openswan.org/index.php/CiscoPIX
that says that it may be one of two options:
1. You have set 3DES/MD5 at one end and 3DES/SHA1 at the other, or some
similar misconfiguration.
2. Your access lists are set up wrong on the PIX. For example,
access-list FREESWAN-VPN permit ip 10.7.3.0 255.255.255.0 10.69.1.0
255.255.255.0 will work, where access-list FREESWAN-VPN permit ip
10.7.3.0 255.255.255.0 host 202.0.45.170 while it appears to do to the
same thing, will cause problems at this point when the ?
<http://wiki.openswan.org/index.php/ISAKMP?action=create>_ISAKMP_ phase
has finished, and the actual establishing of the tunnel begins.
And my question is, how can I know if my problem is #1 or #2?
How can I debug further?
If my problem is #2, is there a solution without the need to modify the
Cisco?
Many thanks
Oliver
--
Oliver Schulze L.
<oliver at samera.com.py>
More information about the Users
mailing list