[Openswan Users] FW: FW: Please help me with openSuSE 10.3 host and Vista clients

Wei-min Lee weiminlee at sbcglobal.net
Sun Mar 2 23:45:49 EST 2008


Wei-min Lee wrote:

> Vista event viewer just says "...dialed a connection named VPN Connection
> which has failed. The error code returned on failure is 0."

Strange error code... They could have made it a bit more informative.

> L2TP server logs...OK, I guess that's what's wrong.  I never configured a
> L2TP server. 

Right :-) Problem solved! Well, not yet.

> I read that it could either be another Windows server or
> SAMBA, but have not researched the configurations required for SAMBA.

No, "Windows Networking" is not a required part of an L2TP/IPsec VPN.
You're confusing an L2TP server with an SMB server.

Jacco
-- 

OK, I couldn't get l2tpd to install on openSUSE 10.3 so I got xl2tpd and
that installed just fine.  So now, as before, the connection gets through,
but never completes and I guess I'm still too new at this but I can't see
what the problem might be.

Log file:
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000005]
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
received Vendor ID payload [RFC 3947] method set to=110 
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but
already using method 110
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
ignoring Vendor ID payload [FRAGMENTATION]
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
ignoring Vendor ID payload [Vid-Initial-Contact]
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: responding to Main Mode from unknown peer 192.168.2.22
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: Diffie-Hellamn group 20 is not a supported modp group.  Attribute
OAKLEY_GROUP_DESCRIPTION
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: Diffie-Hellamn group 19 is not a supported modp group.  Attribute
OAKLEY_GROUP_DESCRIPTION
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: STATE_MAIN_R1: sent MR1, expecting MI2
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): no NAT detected
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: STATE_MAIN_R2: sent MR2, expecting MI3
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: Main mode peer ID is ID_IPV4_ADDR: '192.168.2.22'
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: I did not send a certificate because I do not have one.
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: STATE_MAIN_R3: sent MR3, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp2048}
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#28: responding to Quick Mode {msgid:01000000}
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#28: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#28: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: get_call: allocating new tunnel for
host 192.168.2.22, port 1701.
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: ourtid = 27320, entropy_buf = 6ab8
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: new_call: initializing ourcid to 0
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: handle_avps: handling avp's for
tunnel 27320, call 0
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: protocol_version_avp: peer is using
version 1, revision 0.
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: framing_caps_avp: supported peer
frames: sync
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: bearer_caps_avp: supported peer
bearers:
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: firmware_rev_avp: peer reports
firmware version 1536 (0x0600)
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: hostname_avp: peer reports hostname
'leevsnb01'
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: vendor_avp: peer reports vendor
'Microsoft'
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: assigned_tunnel_avp: using peer's
tunnel 24
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: receive_window_size_avp: peer wants
RWS of 8.  Will use flow control.
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: my configured LNS hostname:
DWEXPVPN
Mar  2 20:33:27 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 0
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#28: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Mar  2 20:33:27 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#28: STATE_QUICK_R2: IPsec SA established {ESP=>0x029b8772 <0x2d267aac
xfrm=AES_128-HMAC_SHA1 NATD=none DPD=none}
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: get_call: allocating new tunnel for
host 192.168.2.22, port 1701.
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: ourtid = 865, entropy_buf = 361
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: new_call: initializing ourcid to 0
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: handle_avps: handling avp's for
tunnel 865, call 0
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: protocol_version_avp: peer is using
version 1, revision 0.
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: framing_caps_avp: supported peer
frames: sync
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: bearer_caps_avp: supported peer
bearers:
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: firmware_rev_avp: peer reports
firmware version 1536 (0x0600)
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: hostname_avp: peer reports hostname
'leevsnb01'
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: vendor_avp: peer reports vendor
'Microsoft'
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: assigned_tunnel_avp: using peer's
tunnel 24
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: receive_window_size_avp: peer wants
RWS of 8.  Will use flow control.
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: my configured LNS hostname:
DWEXPVPN
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: control_finish: Peer requested
tunnel 24 twice, ignoring second one.
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: control_zlb: sending control ZLB on
tunnel 24
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: call_close: Actually closing tunnel
865
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 0
Mar  2 20:33:28 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 0
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: get_call: allocating new tunnel for
host 192.168.2.22, port 1701.
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: ourtid = 56137, entropy_buf = db49
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: new_call: initializing ourcid to 0
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: handle_avps: handling avp's for
tunnel 56137, call 0
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: protocol_version_avp: peer is using
version 1, revision 0.
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: framing_caps_avp: supported peer
frames: sync
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: bearer_caps_avp: supported peer
bearers:
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: firmware_rev_avp: peer reports
firmware version 1536 (0x0600)
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: hostname_avp: peer reports hostname
'leevsnb01'
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: vendor_avp: peer reports vendor
'Microsoft'
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: assigned_tunnel_avp: using peer's
tunnel 24
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: receive_window_size_avp: peer wants
RWS of 8.  Will use flow control.
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: my configured LNS hostname:
DWEXPVPN
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: control_finish: Peer requested
tunnel 24 twice, ignoring second one.
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: control_zlb: sending control ZLB on
tunnel 24
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: call_close: Actually closing tunnel
56137
Mar  2 20:33:30 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 0
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: get_call: allocating new tunnel for
host 192.168.2.22, port 1701.
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: ourtid = 44161, entropy_buf = ac81
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: new_call: initializing ourcid to 0
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: handle_avps: handling avp's for
tunnel 44161, call 0
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: protocol_version_avp: peer is using
version 1, revision 0.
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: framing_caps_avp: supported peer
frames: sync
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: bearer_caps_avp: supported peer
bearers:
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: firmware_rev_avp: peer reports
firmware version 1536 (0x0600)
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: hostname_avp: peer reports hostname
'leevsnb01'
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: vendor_avp: peer reports vendor
'Microsoft'
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: assigned_tunnel_avp: using peer's
tunnel 24
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: receive_window_size_avp: peer wants
RWS of 8.  Will use flow control.
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: my configured LNS hostname:
DWEXPVPN
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: control_finish: Peer requested
tunnel 24 twice, ignoring second one.
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: control_zlb: sending control ZLB on
tunnel 24
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: call_close: Actually closing tunnel
44161
Mar  2 20:33:34 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 0
Mar  2 20:33:35 dwelnxsrv1 l2tpd[15612]: control_xmit: Maximum retries
exceeded for peer (null)
Mar  2 20:33:35 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:33:35 dwelnxsrv1 l2tpd[15612]: call_close: enqueing close message
for tunnel
Mar  2 20:33:35 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 1
Mar  2 20:33:35 dwelnxsrv1 l2tpd[15612]: call_close : Connection closed with
peer (null), reason: Timeout
Mar  2 20:33:36 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 1
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: get_call: allocating new tunnel for
host 192.168.2.22, port 1701.
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: ourtid = 28777, entropy_buf = 7069
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: new_call: initializing ourcid to 0
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: handle_avps: handling avp's for
tunnel 28777, call 0
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: protocol_version_avp: peer is using
version 1, revision 0.
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: framing_caps_avp: supported peer
frames: sync
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: bearer_caps_avp: supported peer
bearers:
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: firmware_rev_avp: peer reports
firmware version 1536 (0x0600)
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: hostname_avp: peer reports hostname
'leevsnb01'
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: vendor_avp: peer reports vendor
'Microsoft'
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: assigned_tunnel_avp: using peer's
tunnel 24
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: receive_window_size_avp: peer wants
RWS of 8.  Will use flow control.
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: my configured LNS hostname:
DWEXPVPN
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: control_finish: Peer requested
tunnel 24 twice, ignoring second one.
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: control_zlb: sending control ZLB on
tunnel 24
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: call_close: Actually closing tunnel
28777
Mar  2 20:33:42 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 1
Mar  2 20:33:43 dwelnxsrv1 l2tpd[15612]: control_xmit: Unable to deliver
closing message for peer (null)
Mar  2 20:33:43 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:33:43 dwelnxsrv1 l2tpd[15612]: call_close: Actually closing tunnel
27320
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: get_call: allocating new tunnel for
host 192.168.2.22, port 1701.
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: ourtid = 10206, entropy_buf = 27de
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: new_call: initializing ourcid to 0
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: handle_avps: handling avp's for
tunnel 10206, call 0
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: protocol_version_avp: peer is using
version 1, revision 0.
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: framing_caps_avp: supported peer
frames: sync
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: bearer_caps_avp: supported peer
bearers:
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: firmware_rev_avp: peer reports
firmware version 1536 (0x0600)
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: hostname_avp: peer reports hostname
'leevsnb01'
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: vendor_avp: peer reports vendor
'Microsoft'
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: assigned_tunnel_avp: using peer's
tunnel 24
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: receive_window_size_avp: peer wants
RWS of 8.  Will use flow control.
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: my configured LNS hostname:
DWEXPVPN
Mar  2 20:33:52 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 0
Mar  2 20:33:53 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 0
Mar  2 20:34:00 dwelnxsrv1 l2tpd[15612]: control_xmit: Maximum retries
exceeded for peer (null)
Mar  2 20:34:00 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:34:00 dwelnxsrv1 l2tpd[15612]: call_close: enqueing close message
for tunnel
Mar  2 20:34:00 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 1
Mar  2 20:34:00 dwelnxsrv1 l2tpd[15612]: call_close : Connection closed with
peer (null), reason: Timeout
Mar  2 20:34:01 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 1
Mar  2 20:34:01 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 1
Mar  2 20:34:02 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: received Delete SA(0x029b8772) payload: deleting IPSEC State #28
Mar  2 20:34:02 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: received and ignored informational message
Mar  2 20:34:02 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22
#27: received Delete SA payload: deleting ISAKMP State #27
Mar  2 20:34:02 dwelnxsrv1 pluto[5200]: "L2TP-PSK-noNAT"[14] 192.168.2.22:
deleting connection "L2TP-PSK-noNAT" instance with peer 192.168.2.22
{isakmp=#0/ipsec=#0}
Mar  2 20:34:02 dwelnxsrv1 pluto[5200]: packet from 192.168.2.22:500:
received and ignored informational message
Mar  2 20:34:03 dwelnxsrv1 l2tpd[15612]: control_xmit: Scheduling and
transmitting packet 1
Mar  2 20:34:08 dwelnxsrv1 l2tpd[15612]: control_xmit: Unable to deliver
closing message for peer (null)
Mar  2 20:34:08 dwelnxsrv1 l2tpd[15612]: 
Mar  2 20:34:08 dwelnxsrv1 l2tpd[15612]: call_close: Actually closing tunnel
10206

l2tpd.conf:
[global]
port = 1701
auth file = /etc/ppp/chap-secrets

[lns default]
ip range = 10.4.8.100-10.4.8.253
local ip = 10.4.8.1
require chap = yes
refuse pap = yes
require authentication = yes
hostname = DWEXPVPN
name = DWEXPVPN
ppp debug = yes
pppoptfile = /etc/ppp/options.l2tpd
length bit = yes


options.l2tpd:
ipcp-accept-local
ipcp-accept-remote
ms-dns  10.4.8.1
ms-wins 10.4.8.1
noccp
auth
crtscts
idle 1800
mtu 1410
mru 1410
nodefaultroute
debug
lock
proxyarp
connect-delay 5000
silent

Thanks in advance.

Wei-min Lee



More information about the Users mailing list