[Openswan Users] How to config Static-to-Roadwarrior in different openswan version?
Erich Titl
erich.titl at think.ch
Thu May 26 10:37:57 EDT 2011
Hi
at 26.05.2011 12:52, tknv wrote:
> Buggy
>
> Hello,
> I try Static-to-RoadWarrior IPsec at below network.
> at IPsec router:ipsec setup start
> at RoadWarrior:ipsec auto --up road
> But can not establish.
>
> router(192.168.11.0/24)
> / \
> / \
> IPsec router Roadwarrior
> Static(192.168.11.11) Dynamic(192.168.11.X)
> Openswan 2.4.15(klips) Openswan U2.6.32
> /
> /
> A-macihne:192.168.25.X
>
> --ipsec.config:IPsec router--
> version 2.0
>
> config setup
> interfaces=%defaultroute
> nat_traversal=yes
> nhelpers=0
> syslog=daemon.error
> klipsdebug=none
> plutodebug=none
> plutoopts=
> handle_delete=no
> overridemtu=1280
>
> conn road
> left=192.168.11.11
> leftsubnet=192.168.25.0/24
> right=%any
> rightnexthop=%defaultroute
> auto=add
> authby=secret
> type=tunnel
> leftid=@dh.srv.org
> rightid=@dh.ore.org
> keyingtries=0
> aggrmode=yes
don't do that
> pfs=no
> keylife=28800
> ikelifetime=3600
> rekeymargin=100
> rekeyfuzz=0%
> dpddelay=30
> dpdaction=clear
> include /etc/ipsec.d/examples/no_oe.conf
>
> --ipsec.config:Roadwarrior--
> version 2.0
>
> config setup
> nat_traversal=yes
> virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
> protostack=klips
> klipsdebug=none
> plutodebug=none
> nhelpers=0
>
> conn road
> authby=secret
> left=%defaultroute
> leftid=@dh.ore.org
> right=192.168.11.11
> rightsubnet=192.168.25.0/24
> rightid=@dh.srv.org
> auto=add
> include /etc/ipsec.d/*.conf
>
> --ipsec.secrets:both--
> @dh.ore.org @dh.srv.org : PSK "foo"
>
> --log when try :ipsec auto --up road: from Roadwarrior--
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: ignoring unknown Vendor ID payload
> [4f4568794c64414365636661]
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: received Vendor ID payload [Dead Peer Detection]
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: received Vendor ID payload [RFC 3947] method set
> to=109
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: received Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: received Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: received Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: received Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-00]
> May 25 20:32:48 localhost authpriv.warn pluto[10313]: packet from
> 192.168.11.3:500: initial Main Mode message received on
> 192.168.11.11:500 but no connection has been authorized
The log says it all, you did not authorize a connection.
For tests use
ipsec auto --up road
or modify your config file accordingly
auto=up
cheers
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3409 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.openswan.org/pipermail/users/attachments/20110526/156b7653/attachment.bin
More information about the Users
mailing list