[Openswan Users] Configuration problems with Cisco and Clavister
Jim Barber
jim.barber at ddihealth.com
Tue Jun 27 09:20:51 CEST 2006
I recently set up OpenSWAN connections to a Cisco box and a Fortigate
network appliance.
The Cisco and Fortigate boxes could bring up the tunnel okay, but if I
tried to bring the tunnel up it would fail during the Phase 2 part
complaining about a bad proposal.
The debugging logs on the Fortigate were rubbish so I didn't sort the
problem out until I had solved it for the Cisco box.
After looking through debug logs sent to me by the sysadmin of the Cisco
box, I found that it was unhappy with the ESP settings.
When I first got it working I found I could get it running by specifying:
esp=3des-md5-modp1536
And for the fortigate box it worked when I added:
esp=3des-sha1-modp1536
By default the Linux box was trying to use esp=aes
So I thought I'd simplify both of them and see what would happen if I
just set:
esp=3des
This worked for both of the boxes, and it correctly negotiated the other
two parameters, so perhaps try that.
Also in my setup, I didn't specify the leftnexthop and rightnexthop values.
Instead I used leftsourceip, specifying the private IP assigned to an
interface on my gateway box that is connected to the network that the
tunnel is connected to.
If that makes sense?
I'll give an example of my connection that likes to a Cisco box.
conn cisco
auto=start
authby=secret
compress=yes
esp=3des
keyingtries=0
left=xxx.xxx.xxx.xxx
leftsourceip=10.128.0.1
leftsubnet=10.128.0.0/16
right=yyy.yyy.yyy.yyy
rightsubnet=10.5.0.0/23
Where the OpenSWAN box has a public IP of xxx.xxx.xxx.xxx and behind it
is a 10.128.0.0/16 network.
10.128.0.1 is bound to the OpenSWAN box itself.
The Cisco box has a public IP address of yyy.yyy.yyy.yyy and behind it
is a 10.5.0.0/23 network.
Note that I have pfs=yes because we enabled that on the Cisco box as
well, but you may still need pfs=no.
Good luck.
----------
Jim Barber
DDI Health
Benoit Demiddeleer wrote:
>
> Hello,
>
> I’m trying to setup Openswan installed on Debian Sarge as client for a
> Cisco firewall and for a Clavister.
>
> Both servers are using shared secrets which are already inserted in
> the ipsec.secrets file.
>
> Any help will be very appreciated as I’m trying to initiate the
> connection for 2 days now…
>
> //
>
> Ipsec.conf
>
> /version 2.0 # conforms to second version of ipsec.conf specification/
>
> /config setup/
>
> / /
>
> /#Disable Opportunistic Encryption/
>
> /include /etc/ipsec.d/examples/no_oe.conf/
>
> / /
>
> /conn net-to-first/
>
> / type= tunnel/
>
> / left= ggg.hhh.iii.170/
>
> / leftnexthop= ggg.hhh.iii.169/
>
> / leftsubnet= 10.1.1.0/24/
>
> / right= //www.xxx.yyy.zzz <http://www.xxx.yyy.zzz/>///
>
> / rightsubnet= 10.10.4.64/26/
>
> / auto= add/
>
> / authby= secret/
>
> / esp= 3des-sha1-96/
>
> / keyexchange=ike/
>
> / ike= 3des-sha1/
>
> / pfs= no/
>
> / /
>
> / /
>
> /conn net-to-second/
>
> / type= tunnel/
>
> / left= ggg.hhh.iii.170/
>
> / leftnexthop= ggg.hhh.iii.169/
>
> / leftsubnet= 10.1.1.0/24/
>
> / right= aaa.bbb.ccc.ddd/
>
> / rightsubnet= 57.57.0.0/16/
>
> / esp= 3des-md5-96/
>
> / keyexchange= ike/
>
> / authby=secret/
>
> / pfs= no/
>
> / auto= add/
>
> So I meet different problems with both tunnels but I running out of ideas.
>
> Thank in advance to people who will help me to solve those problems.
>
> Best regards,
>
> Benoît Demiddeleer
>
More information about the Users
mailing list