[Openswan Users] Ipsec configuration Lucent VPN Gateway with OpenSwan or others (Lucent IPSec Client 9.2.0 in Windows XP)
Oscar Barrios
srbarrios at gmail.com
Fri Feb 19 17:17:01 EST 2010
Hello,
I want to connect my laptop (using Ubuntu) to VPN of the enterprise.
But I don't know how I must configure ipsec.conf.
In this moment I have this config but don't work:
--------------------------------------------------------------
conn Intranet
ike=aes256-sha1-modp1024
phase2alg=aes256-sha1
aggrmode=no
keyexchange=ike
ikelifetime=24h
auth=esp
type=tunnel
authby=secret
left=192.168.2.100
leftmodecfgclient=yes
leftxauthclient=yes
leftid="obarrios"
right=62.xx.xx.xx
rightmodecfgserver=yes
rightxauthserver=yes
modecfgpull=yes
pfs=yes
compress=yes
auto=add
------------------------------------------------------
oscar at ob22:~$ sudo ipsec auto --status
(...)
000 "Intranet":
192.168.2.100<192.168.2.100>[62.210.183.9,+MC+XC+S=C]...62.14.231.67<62.14.231.67>[MS+XS+S=C];
unrouted; eroute owner: #0
000 "Intranet": myip=unset; hisip=unset;
000 "Intranet": ike_life: 86400s; ipsec_life: 28800s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 0
000 "Intranet": policy:
PSK+ENCRYPT+COMPRESS+TUNNEL+PFS+UP+MODECFGPULL+IKEv2ALLOW; prio:
32,32; interface: wlan0;
000 "Intranet": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "Intranet": IKE algorithms wanted:
AES_CBC(7)_256-SHA1(2)-MODP1536(5); flags=-strict
000 "Intranet": IKE algorithms found: AES_CBC(7)_256-SHA1(2)_160-5,
000 "Intranet": ESP algorithms wanted: AES(12)_256-SHA1(2); flags=-strict
000 "Intranet": ESP algorithms loaded: AES(12)_256-SHA1(2)_160
<----------- This is the problem?
000
000 #2: "Intranet":500 STATE_MAIN_I1 (sent MI1, expecting MR1);
EVENT_RETRANSMIT in 11s; nodpd; idle; import:admin initiate
000 #2: pending Phase 2 for "Intranet" replacing #0
---------------------------------------------------------------------------------------------------------------------------------------------
In the Windows client you can only configure:
Primary Tunnel End Point, User Identity,Password,Group Key
Specifications of client:
--------------------------------
http://enterprise.alcatel-lucent.com/?product=IPSecClient&page=technical
Supported Standards
* IPSec Encapsulating Security Payload (ESP) with DES, Triple-DES,
and AES-128, AES-192, and AES-256
* IPSec Authentication Header (AH) with HMAC-MD5 and HMAC SHA-1
authentication
* Diffie-Hellman Group 1, 2, 5, 14, and 15
* IPComp (LZS compression)
* X.509
* PKCS #12
User Authentication
* Local passwords, RADIUS, SecurID, X.509 digital certificates
with PKI PKCS #12 and PFX standard
* CAPI Store Integration
* Automatic LDAP certificate retrieval
RADIUS Parameter Download
User-specific parameters configurable in administrator's RADIUS
database applicable to IPSec Client user tunnels:
* Local Presence address
* Primary/Secondary DNS
* Primary/Secondary WINS
* Login Timeout
* Idle Timeout
* User Group
Notifications
* Delivers administrator-specified message when tunnel
established, must be acknowledged to continue
Software Upgrade Management
* Notifies when Client upgrade is available, single click upgrades
IPSec Client software with newer version
Logging
* Maintains local logs of connection attempts, including detailed
IKE and IPSec negotiation
Tray Icon
* Indicates tunnel activity, firewall setting in effect and
provides continuous traffic statistics
DNS/WINS
* Automatically configures local primary and secondary DNS (Domain
Name Server) and WINS (Windows Information Name Server) addresses
That's appear when I'm connected in Windows:
-------------------------------------------------------------------------------------------------------------------------------------
02/05/10 10:33:58 IKE/IKE Started Enable Secure Access to TEP: Oesia
(62.xx.xx.xx) for user obarrios
10:33:59 IKE/IKE Source IP Address, Port for IKE : 192.168.2.100, 1624
10:33:59 IKE/IKE Contacted VPN gateway (62.xx.xx.xx)
10:33:59 IKE/IKE User Authentication Successful.
10:34:00 IKE/IKE Tunnel Parameters received from gateway are:
Encryption : AES256 CBC Authentication : SHA1
Tunnel transport method: Standard
Authentication Timeout: 60 Minutes
Heartbeat Interval: 300 Seconds
Internal IP for local presence :192.168.1.37
Pri. DNS :10.95.0.4 Sec. DNS :0.0.0.0
Pri. WINS :0.0.0.0 Sec. WINS :0.0.0.0
HostList: 192.168.1.0-192.168.1.255,10.95.0.0-10.95.255.255,10.237.17.0-10.237.17.255,192.168.1.37,
Tunnel administrator allows you to save password
Orig Pri. WINS : Orig Sec. WINS :
Firewall Policy: Allow All Traffic
02/05/10 10:34:00 IKE/IKE IPSec SA SPIs: Inbound: 0x 7646,
Outbound: 0x 38101010
02/05/10 10:34:00 IKE/IKE Successfully established VPN Tunnel to TEP
62.xx.xx.xx for User obarrios
-----------------------------------------------------------------------------------------------------------------------------------------
Any idea of a configuration, solution, to connect to VPN?
Help please!
More information about the Users
mailing list