[Openswan Users] NAT traversal on Openswan
Tejas Jin
txjin at intelliepi.com
Thu Aug 30 19:09:16 EDT 2007
Tejas Jin wrote:
> Paul Wouters wrote:
>
>> On Thu, 30 Aug 2007, Tejas Jin wrote:
>>
>>
>>
>>> 104 "office" #1: STATE_MAIN_I1: initiate
>>> 003 "office" #1: received Vendor ID payload [Openswan (this version)
>>> openswan-2.4.9-31.el4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
>>> 003 "office" #1: received Vendor ID payload [Dead Peer Detection]
>>> 003 "office" #1: received Vendor ID payload [RFC 3947] method set to=110
>>> 106 "office" #1: STATE_MAIN_I2: sent MI2, expecting MR2
>>> 003 "office" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i
>>> am NATed
>>> 108 "office" #1: STATE_MAIN_I3: sent MI3, expecting MR3
>>> 004 "office" #1: STATE_MAIN_I4: ISAKMP SA established
>>> {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
>>> group=modp1536}
>>> 117 "office" #2: STATE_QUICK_I1: initiate
>>> 010 "office" #2: STATE_QUICK_I1: retransmission; will wait 20s for response
>>>
>>>
> Here is the message I found in /var/log/secure on the other end.
>
> "office"[3] 76.185.110.212 #38: sending encrypted notification
> INVALID_MESSAGE_ID to 76.184.110.195:4500
>
>
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>
>
Okay, I think my problem has to do with this but I'm not sure why.
Reposting ipsec.conf
cannot respond to IPsec SA request because no connection is known for
192.168.3.0/24===75.107.111.99[@firewall]...76.184.110.195[@warrior]===192.168.1.232/32
ipsec.conf [firewall]
conn office
keyexchange=ike
esp=3des-md5
ike=3des-md5
authby=secret
pfs=yes
keylife=3600
left=64.221.219.99
leftsubnet=192.168.3.0/24
#leftsourceip=192.168.1.177
leftnexthop=%defaultroute
leftid=@firewall
right=%any
#rightsubnet=192.168.3.0/24
rightnexthop=%defaultroute
rightid=@warrior
ipsec.conf [road warrior]
conn office
keyexchange=ike
esp=3des-md5
ike=3des-md5
authby=secret
pfs=yes
keylife=3600
right=75.107.111.99
rightsubnet=192.168.3.0/24
#rightsourceip=192.168.3.177
rightnexthop=%defaultroute
rightid=@firewall
left=%defaultroute
#leftsubnet=192.168.3.0/24
#rightnexthop=%defaultroute
leftid=@warrior
More information about the Users
mailing list