[Openswan Users] openswan to netscreen
Daren Hickman
DarenHickman at ruggedcom.com
Wed Apr 5 17:12:56 CEST 2006
I am trying to establish a PSK VPN to a netscreen 5xt using OS5 and openswan 2.2.0. I have created a tunnel between the two devices and established a phase 2 SA but I can only ping from the openswan side to the netscreen subnet and not from netscreen to openswan subnet. I have searched the archives and cannot find any configs that work (Paul I bought your book). My configuration is below. Any ideas?
host 192.168.200.114 192.168.200.1netscreen 2.2.2.1==1.1.1.1openswan 192.168.100.34 host 192.168.100.33
conn netscreen
keyingtries=3
pfs=yes
keylife=3600
authby=secret
auto=add
esp=3des,aes
left=%defaultroute
leftid=1.1.1.1
leftsubnet=192.168.100.0/24
right=2.2.2.1
rightsubnet=192.168.200.0/24
set clock timezone -5
set vrouter trust-vr sharable
set vrouter "trust-vr" auto-route-export
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth-server "DefL2TPAuthServer" id 1
set auth-server "DefL2TPAuthServer" account-type l2tp
set auth default auth server "Local"
set admin name "netscreen"
set admin password "nKVUM2rwMUzPcrkG5sWIHdCtqkAibn"
set admin auth timeout 0
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
set zone "VLAN" block
set zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ip-spoofing
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ip-spoofing
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set zone "Untrust" screen ip-sweep threshold 30000
set zone "V1-Untrust" screen ip-sweep threshold 30000
set interface "trust" zone "Trust"
set interface "untrust" zone "Untrust"
set interface "tunnel.1" zone "Trust"
unset interface vlan1 ip
set interface trust ip 192.168.200.1/24
set interface trust nat
set interface untrust ip 2.2.2.1/24
set interface untrust route
set interface tunnel.1 ip unnumbered interface untrust
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface untrust manage-ip 2.2.2.3
set interface trust ip manageable
set interface untrust ip manageable
unset interface trust manage snmp
unset interface trust manage ssl
set interface untrust manage ping
set interface untrust manage ssh
set interface untrust manage telnet
set interface untrust manage web
set interface trust dhcp server service
set interface trust dhcp server auto
set interface trust dhcp server option lease 1440000
set interface trust dhcp server option gateway 192.168.200.1
set interface trust dhcp server option netmask 255.255.255.0
set interface trust dhcp server option dns1 205.152.144.23
set interface trust dhcp server option dns2 205.152.132.23
set interface trust dhcp server ip 192.168.200.100 to 192.168.200.199
set flow tcp-mss 1392
set domain test
set hostname NS5XT
set webauth banner success "Remote Management Console"
set dns host dns1 205.152.144.23
set dns host dns2 205.152.132.23
set dns host schedule 00:00
set address "Trust" "192.168.200.0/24" 192.168.200.0 255.255.255.0
set address "Trust" "192.168.200.114/32" 192.168.200.114 255.255.255.255
set address "Trust" "_192.168.1.0/24" 192.168.1.0 255.255.255.0
set address "Trust" "_192.168.4.0/24" 192.168.4.0 255.255.255.0
set address "Trust" "local lan" 192.168.200.0 255.255.255.0
set address "Untrust" "192.168.100.0/24" 192.168.100.0 255.255.255.0
set user "joe" uid 3
set user "joe" ike-id u-fqdn "joegould at bellsouth.net" share-limit 1
set user "joe" type ike
set user "joe" "enable"
set ike p1-proposal "dial-up vpn:*g2-3des-sha" preshare group2 esp 3des sha-1 hour 8
set ike p1-proposal "dial up vpn:*g2-3des-sha" preshare group2 esp 3des sha-1 hour 8
set ike p2-proposal "dial up vpn:*esp-3des-sha" no-pfs esp 3des sha-1 hour 1
set ike gateway "router" address 1.1.1.1 Main outgoing-interface "untrust" preshare "9s5fam3BN7B0VlsAxHC53oEh6Wn7UrtXNg==" proposal "pre-g2-3des-sha" "pre-g2-aes128-sha"
set ike respond-bad-spi 1
set vpn "vpn" gateway "router" no-replay tunnel idletime 0 proposal "g2-esp-aes128-sha" "g2-esp-3des-md5" "g2-esp-aes128-md5"
set vpn "vpn" monitor source-interface trust destination-ip 192.168.100.33
set vpn-group id 1
set vpn-group id 2
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set group address "Trust" "internal lan"
set group address "Trust" "internal lan" add "_192.168.1.0/24"
set group address "Trust" "internal lan" add "_192.168.4.0/24"
set policy id 1 from "Trust" to "Untrust" "192.168.200.0/24" "192.168.100.0/24" "ANY" tunnel vpn "vpn" id 1 pair-policy 2 log
set policy id 3 name "test" from "Trust" to "Untrust" "Any" "Any" "ANY" permit log
set policy id 3 disable
set policy id 2 from "Untrust" to "Trust" "192.168.100.0/24" "192.168.200.0/24" "ANY" tunnel vpn "vpn" id 1 pair-policy 1 log
set policy id 4 from "Untrust" to "Trust" "Any" "Any" "ANY" permit log
set policy id 4 disable
set vpn "vpn" proxy-id local-ip 192.168.200.0/24 remote-ip 192.168.100.0/24 "ANY"
set pppoe name "untrust"
set pppoe name "untrust" username "joegould at bellsouth.net" password "rmudMbB2NxSexdsCNyCetogrD/no6frU+A=="
set pppoe name "untrust" idle 0
unset pppoe name "untrust" update-dhcpserver
set pppoe name "untrust" ppp lcp-echo-retries 5
set pppoe name "untrust" auto-connect 10
set ssh version v2
set config lock timeout 5
set ntp server "0.0.0.0"
set ntp server backup1 "0.0.0.0"
set ntp server backup2 "0.0.0.0"
set modem speed 115200
set modem retry 3
set modem interval 10
set modem idle-time 10
set snmp name "NS5XT"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
set max-routes 1024
exit
set vrouter "trust-vr"
set max-routes 1024
set preference ebgp 250
set preference ibgp 40
unset add-default-route
set route 1.1.1.0/24 interface untrust gateway 2.2.2.2
exit
More information about the Users
mailing list