[Openswan Users] Openswan to Fortigate 60B - VPN

Erick Chinchilla Berrocal erick at netcrc.net
Sat Sep 4 14:56:23 EDT 2010


I have the following situation

I need connect two office, in the main office used Debian-Lenny with
IPtables and openswan and the remote office used Fortigate 60B (firewall and
VPN).

The web server is located in the remote office, but need use the Public IP
from the Main Office

 

Internet-------- >www-------- >Public IP in the Main
Office<--------------------VPN-------------- >Remote Office--------------
>WEB server (LAN)

                                                            |
Public IP

                                                            |


                                                            |

                                                              LAN

                                                        Main Office

 

 

This is the configuration in both sides , but at this moment not work

 

Fortigate 60B

VPN-- > IP SEC

 

Phase 1

Static IP Address

Local Interface = WAN1

Mode = Main (ID Protection)

Authentication Method = Pre-shared Key

Peer Options = Accept any peer ID

P1 Proposal

1-      Encryption = 3DES Authentication = MD5

2-      Encryption = 3DES Authentication = SHA1

DH Group = 2 - 5

Keylife = 28800

Local ID = ________

XAuth = Disable

NAT-traversal = enable

Keep alive Frequency = 10 seconds

Dead Peer Detection = enable

 

Phase 2

P2 Proposal

1-      Encryption = 3DES Authentication = MD5

2-      Encryption = 3DES Authentication = SHA1

Enable replay detection = yes

Enable perfect forward secrecy (PFS) = yes

DH Group = 5

Keylife= 1800 Seconds

Autokey Keep Alive = enable

Quick Mode Selector

-          Source address = 192.168.x.x/24 (LAN this side)

-          Source port = 0

-          Destinations address = 192.168.x.x (LAN side Openswan)

-          Protocol = 0

 

Log Access 

#          Date                time                 Level    User Interface
Action  Message          


1 2010-09-04

13:22:27

notice

 

negotiate

Initiator: sent x.x.x.x (public IP openswan) main mode message #1 (OK)

 

 

Openswan

 

-          #/etc/ipsec.conf

nat_traversal=yes

nat_traversal=yes

# Add connections here

include /etc/ipsec.d/fortigate.conf

 

-          VPN

conn nb-vpn # Nombre de la conexion

        type=tunnel

        auth=esp

        authby=secret

        esp=3des-md5!;modp1536

        ikelifetime=1800s

        keyingtries=10

        keylife=28800s

        pfs=yes

        left=x.x.x.x                 # Public IP Openswan

        leftsubnet=192.168.x.x/24 #LAN Openswan

        leftid=x.x.x.x        # Public IP Openswan

        leftrsasigkey=abc   # key

        leftnexthop=y.y.y.y      # %defaultroute correct in many situations

        right=a.b.c.d                # Public Ip Fortigate

        rightsubnet=192.168.x.x/24 #LAN Fortigate

        rightid=a.b.c.d        # Public IP Fortigate

        rightrsasigkey=abc   # key

        rightnexthop=%defaultroute     # correct in many situations

        auto=add                       # authorizes but doesn't start this

        ike=3des-md5!

        keyexchange=ike                # connection at startup

 

/etc/init.d/ipsec restart

ipsec_setup: Stopping Openswan IPsec...

ipsec_setup: Starting Openswan IPsec 2.4.12..

 

ipsec auto --up vpn (wait and wait..)

 

ipsec auto -status

000 "vpn":
192.168.x.x/24===a.b.c.d---a.b.c..d...a.b.c.d---a.b.c.d===192.168.x.x/24;
unrouted; eroute owner: #0

000 "vpn":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec
_updown;

000 "vpn":   ike_life: 1800s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 10

000 "vpn":   policy: PSK+ENCRYPT+TUNNEL+PFS+UP; prio: 24,24; interface:
eth0; encap: esp;

000 "vpn":   newest ISAKMP SA: #0; newest IPsec SA: #0; 

000 "vpn":   IKE algorithms wanted: 3DES_CBC(5)_000-MD5(1)-MODP1536(5),
3DES_CBC(5)_000-MD5(1)-MODP1024(2); flags=strict

000 "vpn":   IKE algorithms found: 3DES_CBC(5)_192-MD5(1)_128-MODP1536(5),
3DES_CBC(5)_192-MD5(1)_128-MODP1024(2)

000 "vpn":   ESP algorithms wanted: 3DES(3)_000-MD5(1);
pfsgroup=MODP1536(5); flags=strict

000 "vpn":   ESP algorithms loaded: 3DES(3)_000-MD5(1);
pfsgroup=MODP1536(5); flags=strict

000  

000 #61: "vpn":500 STATE_MAIN_I1 (sent MI1, expecting MR1); none in -1s;
lastdpd=-1s(seq in:0 out:0)

000 #61: pending Phase 2 for "nb-vpn" replacing #0

 

cat /var/log/syslog

Sep  4 14:43:45 VPN1 ipsec_setup: Stopping Openswan IPsec...

Sep  4 14:43:45 VPN1 kernel: [104640.705317] NET: Registered protocol family
15

Sep  4 14:43:45 VPN1 kernel: [104640.853503] padlock: VIA PadLock Hash
Engine not detected.

Sep  4 14:43:45 VPN1 kernel: [104640.976681] padlock: VIA PadLock Hash
Engine not detected.

Sep  4 14:43:46 VPN1 kernel: [104641.153758] padlock: VIA PadLock not
detected.

Sep  4 14:43:46 VPN1 kernel: [104641.350985] Initializing XFRM netlink
socket

Sep  4 14:43:46 VPN1 ipsec_setup: NETKEY on eth0 a.b.c.d/255.255.255.128
broadcast a.b.c.255 

Sep  4 14:43:46 VPN1 ipsec_setup: ...Openswan IPsec started

Sep  4 14:43:46 VPN1 ipsec_setup: Starting Openswan IPsec 2.4.12...

 

 

any recommendation are welcome

 

Best regards

Erick Ch.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100904/eaec90e5/attachment-0001.html 


More information about the Users mailing list