[Openswan Users] Client VPN on Vista OS
Sasa
sasa at shoponweb.it
Mon Oct 19 04:47:30 EDT 2009
Hi, my ip address space are:
85.18.z.k= ip public on vpn server
10.0.0.100= ip private on vpn server
89.97.x.y= ip public on that remote vpn client
10.0.1.221= ip private on that remote vpn client
..now in ipsec.conf I have:
virtual_private=%v4:0.0.0.0/0,%v4:!10.0.0.0/24
..but also with this parameter I have error in log file:
Oct 19 10:40:13 fw pluto[20921]: "left-road"[2] 89.97.x.y #6: I did not send
a certificate because I do not have one.
Oct 19 10:40:13 fw pluto[20921]: "left-road"[2] 89.97.x.y #6: transition
from state STATE_MAIN_R2 to state STATE_MAIN_R3
Oct 19 10:40:13 fw pluto[20921]: "left-road"[2] 89.97.x.y #6: STATE_MAIN_R3:
sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
Oct 19 10:40:13 fw pluto[20921]: "left-road"[2] 89.97.x.y #6: cannot respond
to IPsec SA request because no connection is known for
85.18.z.k...89.97.x.y[10.0.1.221]===10.0.1.221/32
Oct 19 10:40:13 fw pluto[20921]: "left-road"[2] 89.97.x.y #6: sending
encrypted notification INVALID_ID_INFORMATION to 89.97.x.y:4500
..where is my error ?
Thanks.
------
Salvatore.
----- Original Message -----
From: "Paul Wouters" <paul at xelerance.com>
To: "Sasa" <sasa at shoponweb.it>
Cc: <users at openswan.org>
Sent: Friday, October 16, 2009 3:32 PM
Subject: Re: [Openswan Users] Client VPN on Vista OS
> On Fri, 16 Oct 2009, Sasa wrote:
>
>> the address space is this:
>>
>> 85.18.z.k= ip public on vpn server
>> 89.97.x.y= ip public on that remote vpn client
>> 10.0.1.221= ip private on that remote vpn client
>>
>> I have tried with this parameter:
>> virtual_private=%v4:0.0.0.0/0,%v4:!10.0.1.0/24
>>
>> ..but in log file I have always:
>
>> Oct 16 14:47:32 fw pluto[22744]: "left-road"[2] 89.97.x.y #6: cannot
>> respond to IPsec SA request because no connection is known for
>> 85.18.z.k...89.97.x.y[10.0.1.221]===10.0.1.221/32
>
> Oh. i didnt realise 85.18.z.k was the server.
>
> Your virtual_private= should include the addresses that may appear NAT'ed.
> It
> should exclude any IP ranges used *behind* the server. You did not list
> any
> in this email. But lets say your vpn server has an internal address in
> 192.168.0.0/24
> then you could use virtual_private=%v4:0.0.0.0/0,%v4:!192.168.0.0/24 to
> disallowe clients connecting with conflicting IP addresses from the server
> side
> network.
>
> Paul
>
More information about the Users
mailing list