[Openswan Users] gate-to-net and gate-to-gate not working

Pahud pahudnet at gmail.com
Wed Jan 13 04:44:59 EST 2010


Hello list,

I have established a net-to-net VPN successfully but I just can't make
 gate-to-net and gate-to-gate work.

This is my scenario:

192.168.100.0/24  left subnet

192.168.100.100 left gw private interface
200.200.200.200 left gw public interface

200.200.200.1 left gw defaultroute

INTERNET

100.100.100.1 right gw defaultroute

100.100.100.100 right gw public interface
192.168.10.1 right gw private interface

192.168.10.0/24 right subnet


OK my /etc/ipsec/ipsec.conf is

config setup
nat_traversal=yes
 nhelpers=0
interfaces=%defaultroute

conn net-to-net
   right=100.100.100.100
   rightsubnet=192.168.10.0/24
   rightcert=right.cert
   left=200.200.200.200
   leftsubnet=192.168.100.0/24
   leftcert=left.cert
   pfs=yes
   auto=add

conn lgate-to-rnet
   left=200.200.200.200
   right=100.100.100.100
   leftcert=left.cert
   rightsubnet=192.168.10.0/24
   rightcert=right.cert
   auto=add

conn rgate-to-lnet
   left=200.200.200.200
   leftsubnet=192.168.100.0/24
   right=100.100.100.100
   leftcert=left.cert
   rightcert=right.cert
   auto=add

conn lgate-to-rgate
   left=200.200.200.200
   right=100.100.100.100
   leftcert=left.cert
   rightcert=right.cert
   auto=add

----------------------

OK when I start net-to-net, everything is cool.

# ipsec auto --up net-to-net
104 "net-to-net" #1: STATE_MAIN_I1: initiate
003 "net-to-net" #1: received Vendor ID payload [Openswan (this version)
2.4.15  PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR]
003 "net-to-net" #1: received Vendor ID payload [Dead Peer Detection]
003 "net-to-net" #1: received Vendor ID payload [RFC 3947] method set
to=109
106 "net-to-net" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "net-to-net" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal):
no NAT detected
108 "net-to-net" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "net-to-net" #1: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 prf=oakley_md5
group=modp1536}
117 "net-to-net" #2: STATE_QUICK_I1: initiate
004 "net-to-net" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
{ESP=>0x346c70d8 <0x96ddd1d9 xfrm=AES_0-HMAC_SHA1 NATD=none DPD=none}


And I can ping from left subnet to right subnet.

Then I try to establish lgate-to-rnet from the left gateway:

# ipsec auto --up lgate-to-rnet
117 "lgate-to-rnet" #3: STATE_QUICK_I1: initiate
004 "lgate-to-rnet" #3: STATE_QUICK_I2: sent QI2, IPsec SA established
{ESP=>0x96d7436d <0x0662bbe4 xfrm=AES_0-HMAC_SHA1 NATD=none DPD=none}


It looks good as well. But I just can't ping from left gw to right subnet,
in the meantime, the previously established net-to-net VPN is broken,
as I can't ping from the left subnet to right subnet either.


I am not sure what's going wrong.

My question is:

1. In my scenario, is it possible to build net-to-net, lgate-to-rnet,
rgate-to-lnet and  lgate-to-rgate at the same time with one single
ipsec.conf?
2. How to correct my problem so I can establish them with no error?

Pahud
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100113/1d26d7e5/attachment-0001.html 


More information about the Users mailing list