[Openswan Users] l2tpd/ppp/openswan on redhat as 4
Christophe Ngo Van Duc
cngovanduc at gmail.com
Fri Jan 20 03:32:34 CET 2006
Dear all,
I've been struggling with making work the following config for some
roadwarriors (winxp)
openswan 2.4.5rc4
l2tpd-0.69-12jdl.i386.rpm
ppp-2.4.2-6.4.RHEL4
kernel 2.6.9-5.ELsmp
I can see that the VPN starts:
Jan 20 03:05:54 cedric pluto[830]: "L2TP-PSK"[6] x.x.x.x #12:
STATE_QUICK_R2: IPsec SA established {ESP=>0xa087e7fe <0x4a7ab458
xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
But then after a while the client disconnect. It seems that l2tpd is not
receiving packets
Jan 20 03:06:29 cedric pluto[830]: "L2TP-PSK"[6] x.x.x.x #11: received
Delete SA(0xa087e7fe) payload: deleting IPSEC State #12
Jan 20 03:06:29 cedric pluto[830]: "L2TP-PSK"[6] x.x.x.x #11: received and
ignored informational message
Jan 20 03:06:29 cedric pluto[830]: "L2TP-PSK"[6] x.x.x.x #11: received
Delete SA payload: deleting ISAKMP State #11
Jan 20 03:06:29 cedric pluto[830]: "L2TP-PSK"[6] x.x.x.x: deleting
connection "L2TP-PSK" instance with peer 82.238.30.8 {isakmp=#0/ipsec=#0}
Jan 20 03:06:29 cedric pluto[830]: packet from x.x.x.x:500: received and
ignored informational message
Jan 20 03:06:32 cedric pluto[830]: ERROR: asynchronous network error report
on eth1 (sport=500) for message to x.x.x.x port 500, complainant x.x.x.z: No
route to host [errno 113, origin ICMP type 3 code 1 (not authenticated)]
my firewall is configured as follow (eth1 unsecure eth2 secure)
$IPTABLES -N RH-Firewall-1-INPUT
$IPTABLES -A INPUT -j RH-Firewall-1-INPUT -i eth1
$IPTABLES -A FORWARD -j RH-Firewall-1-INPUT -i eth1
$IPTABLES -A INPUT -i lo -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
$IPTABLES -t mangle -A PREROUTING -i eth1 -p esp -j MARK --set-mark 1
$IPTABLES -A RH-Firewall-1-INPUT -i eth1 -m mark --mark 1 -j ACCEPT
$IPTABLES -A OUTPUT -s public_ext_ip -p udp -m udp --sport 1701 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p 50 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p 51 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j
ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p udp -m udp --dport 53 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 53 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j
ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
22 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
80 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
21 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
25 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport
5432 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p udp -m udp --dport 500 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p udp -m udp --dport 4500 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 143 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 110 -j ACCEPT
$IPTABLES -A RH-Firewall-1-INPUT -j REJECT --reject-with
icmp-host-prohibited
$IPTABLES -A INPUT -i eth2 -j ACCEPT
$IPTABLES -A FORWARD -i $INTIF -o $EXTIF -j ACCEPT
$IPTABLES -A FORWARD -j LOG
echo " Enabling SNAT (MASQUERADE) functionality on $EXTIF"
$IPTABLES -t nat -A POSTROUTING -o $EXTIF -d ! 10.0.0.0/24 -j MASQUERADE
I've tryied different set of rules to forward the packet entering to the
l2tpd daemon without success
Does anybody have any solution to that ?
Thanks in anticipation
Cheers,
Christophe.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20060120/554761f6/attachment-0001.htm
More information about the Users
mailing list