[Openswan Users] sonicwall roadwarrior

Iain Pople iain at brunny.com
Mon Sep 20 20:27:35 EDT 2010


Hi,

I have a working config to connect to a Sonicwall NSA 3500. The problem is I
can only ping the Sonicwall itself (10.23.0.254), not any of the hosts
behind it (10.23.0.0/24). When using the windows sonicwall client i am
assigned an IP address in the 10.23.0.0/24 range via DHCP. I assume this is
the reason why I am unable to contact any hosts using openswan. What is the
correct way to do this using the netkey driver? I understand that netkey
doesn't actually setup a virtual network interface with an IP, so how do I
get a valid IP address?

# ipsec auto --up melbourne
112 "melbourne" #1: STATE_AGGR_I1: initiate
003 "melbourne" #1: ignoring Vendor ID payload [Sonicwall 1 (TZ 170
Standard?)]
003 "melbourne" #1: ignoring unknown Vendor ID payload [5b362bc820f60007]
003 "melbourne" #1: received Vendor ID payload [RFC 3947] method set to=109
003 "melbourne" #1: received Vendor ID payload [Dead Peer Detection]
003 "melbourne" #1: received Vendor ID payload [XAUTH]
003 "melbourne" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal):
both are NATed
004 "melbourne" #1: STATE_AGGR_I2: sent AI2, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1024}
004 "melbourne" #1: STATE_XAUTH_I1: XAUTH client - awaiting CFG_set
003 "melbourne" #1: ignoring informational payload, type
IPSEC_INITIAL_CONTACT msgid=00000000
003 "melbourne" #1: received and ignored informational message
004 "melbourne" #1: STATE_XAUTH_I1: XAUTH client - awaiting CFG_set
117 "melbourne" #2: STATE_QUICK_I1: initiate
004 "melbourne" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel
mode {ESP=>0xed3ae2ea <0x833df1ed xfrm=3DES_0-HMAC_SHA1 NATOA=none
NATD=xx.xx.xx.xx:4500 DPD=none}

Here is my ipsec.conf:

config setup
    nat_traversal=yes
    virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
    oe=off
    protostack=netkey

conn melbourne
    aggrmode=yes
    authby=secret
    auto=add
    ike=3des-sha1-modp1024
    phase2=esp
    phase2alg=3des-sha1
    pfs=no
    ikelifetime=28800s
    keyingtries=1
    left=%defaultroute
    leftid=@GroupVPN
    leftxauthclient=yes
    leftxauthusername=username
    right=xx.xx.xx.xx
    rightid=@sonicwallid
    rightsubnet=10.23.0.0/24
    rightxauthserver=yes

ipsec.secrets:

@GroupVPN @sonicwallid : PSK "xxxxxxxxxxxxxx"
@username : XAUTH "xxxxxxxxxx"
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100921/307e1bc2/attachment-0001.html 


More information about the Users mailing list