[Openswan Users] Questions with our real config this time ;-)
alet at librelogiciel.com
alet at librelogiciel.com
Fri Mar 23 01:02:37 EDT 2012
Hi there,
Here at University of New-Caledonia we've got a Debian squeeze box with
openswan 1:2.6.28+dfsg-5+squeeze1 on a public IP address, serving
roadwarriors with the help of xl2tpd.
This works fine.
Now we've got a distant site on Wallis Island that we want to connect in
tunnel mode to our gateway, so some of our internal networks
(10.0.0.0/8) are visible from the remote internal network
(192.168.3.x/24), and both ways of course.
Our configuration looks correct to me, but when from the Wallis site I
ping an internal IP address in New-Caledonia, I can see the packets
coming through the VPN from Wallis to New-Caledonia's openswan gw :
14:56:07.142816 IP 117.20.37.70.4500 > 194.254.189.254.4500: UDP-encap:
ESP(spi=0x818d315d,seq=0x2), length 132
14:56:07.142816 IP 192.168.3.250 > 10.10.0.3: ICMP echo request, id
3290, seq 2, length 64
14:56:08.132701 IP 194.254.189.251 > 224.0.0.18: VRRPv2, Advertisement,
vrid 20, prio 100, authtype none, intvl 1s, length 36
14:56:08.143350 IP 117.20.37.70.4500 > 194.254.189.254.4500: UDP-encap:
ESP(spi=0x818d315d,seq=0x3), length 132
14:56:08.143350 IP 192.168.3.250 > 10.10.0.3: ICMP echo request, id
3290, seq 3, length 64
14:56:09.142281 IP 117.20.37.70.4500 > 194.254.189.254.4500: UDP-encap:
ESP(spi=0x818d315d,seq=0x4), length 132
14:56:09.142281 IP 192.168.3.250 > 10.10.0.3: ICMP echo request, id
3290, seq 4, length 64
14:56:09.542667 IP 194.254.189.251 > 224.0.0.18: VRRPv2, Advertisement,
vrid 20, prio 100, authtype none, intvl 1s, length 36
14:56:10.145066 IP 117.20.37.70.4500 > 194.254.189.254.4500: UDP-encap:
ESP(spi=0x818d315d,seq=0x5), length 132
14:56:10.145066 IP 192.168.3.250 > 10.10.0.3: ICMP echo request, id
3290, seq 5, length 64
14:56:10.952701 IP 194.254.189.251 > 224.0.0.18: VRRPv2, Advertisement,
vrid 20, prio 100, authtype none, intvl 1s, length 36
14:56:11.142272 IP 117.20.37.70.4500 > 194.254.189.254.4500: UDP-encap:
ESP(spi=0x818d315d,seq=0x6), length 132
14:56:11.142272 IP 192.168.3.250 > 10.10.0.3: ICMP echo request, id
3290, seq 6, length 64
But once on our local vpn gateway the packets seem to be lost, and never
reach the internal IP address. There's no icmp echo reply either.
Our gateway is configured to forward packets, and in fact it works for
all our roadwarriors, for which an IP address is assigned through xl2tpd
in the 10.10.66.0/24 range.
Wallis' openswan GW's internal IP is 192.168.3.250, it's ADSL / NAT
modem is 192.168.3.254, and the modem's external address is 117.20.37.70
Wallis gw's config :
--- CUT ---
config setup
nat_traversal=yes
oe=off
protostack=netkey
interfaces=%defaultroute
uniqueids=yes
nhelpers=0
conn %default
keyingtries=5
compress=no
authby=rsasig
leftca=%same
leftrsasigkey=%cert
rightrsasigkey=%cert
rightsendcert=always
conn UNC
type=tunnel
left=194.254.189.254
leftsubnets={10.10.0.0/24 10.10.10.0/23 10.10.20.0/24 10.10.30.0/23}
leftid=@gwvpn.univ-nc.nc
rightcert=/etc/ipsec.d/certs/certificat-utilisateur.pem
right=%defaultroute
rightsubnet=192.168.3.0/24
pfs=yes
forceencaps=no
dpdaction=restart
auto=add
--- CUT ---
New-Caledonia gw's config :
--- CUT ---
config setup
nat_traversal=yes
nhelpers=0
plutodebug="none"
uniqueids=yes
oe=off
protostack=netkey
interfaces=%defaultroute
# 10.10.66.0/24 is assigned to roadwarriors through xl2tpd
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:!10.10.66.0/24
conn %default
rekey=no
dpdaction=clear
dpddelay=30
dpdtimeout=120
compress=no
disablearrivalcheck=no
authby=rsasig
leftid=@gwvpn.univ-nc.nc
leftcert=/etc/ipsec.d/certs/gwvpn.univ-nc.nc.pem
leftrsasigkey=%cert
leftsendcert=always
rightrsasigkey=%cert
rightca=%same
conn UNC-l2tp
leftprotoport=17/1701
rightprotoport=17/%any
also=UNC
conn UNC-all
leftsubnet=0.0.0.0/0
also=UNC
conn UNC
left=%defaultroute
right=%any
rightsubnet=vhost:%priv,%no
pfs=no
auto=add
--- CUT ---
Attached to this message you'll find the output of "ipsec auto --status"
and "ip xfrm state" on both sides.
On our internal (NC) router/firewall we've added a static route to
192.168.3.0/24 through our vpn gateway, so from my (biased) point of
view it should just work.
What have I done wrong ?
Thanks in advance for any help on this subject.
FYI ping's latency is always > 550 ms due to the satellite link between
Australia and Wallis. New-Caledonia to Australia is fiber. Could this
impact the situation and/or what are the best parameters in openswan to
ensure the best end user experience ?
--
Jerome Alet
-------------- next part --------------
Wallis side :
=============
$ ipsec auto --status
000 "UNC/1x0": 192.168.3.0/24===192.168.3.250[C=NC, ST=Province Sud, O=Universite de la Nouvelle-Caledonie, OU=Antenne de Wallis, CN=wallis,+S=C]...194.254.189.254<194.254.189.254>[@gwvpn.univ-nc.nc,+S=C]===10.10.0.0/24; erouted; eroute owner: #2
000 "UNC/1x0": myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/certificat-utilisateur.pem;
000 "UNC/1x0": CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC/1x0": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 5
000 "UNC/1x0": policy: RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW; prio: 24,24; interface: eth0;
000 "UNC/1x0": newest ISAKMP SA: #0; newest IPsec SA: #2;
000 "UNC/1x0": aliases: UNC
000 "UNC/2x0": 192.168.3.0/24===192.168.3.250[C=NC, ST=Province Sud, O=Universite de la Nouvelle-Caledonie, OU=Antenne de Wallis, CN=wallis,+S=C]...194.254.189.254<194.254.189.254>[@gwvpn.univ-nc.nc,+S=C]===10.10.10.0/23; erouted; eroute owner: #3
000 "UNC/2x0": myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/certificat-utilisateur.pem;
000 "UNC/2x0": CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC/2x0": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 5
000 "UNC/2x0": policy: RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW; prio: 23,24; interface: eth0;
000 "UNC/2x0": newest ISAKMP SA: #0; newest IPsec SA: #3;
000 "UNC/2x0": aliases: UNC
000 "UNC/3x0": 192.168.3.0/24===192.168.3.250[C=NC, ST=Province Sud, O=Universite de la Nouvelle-Caledonie, OU=Antenne de Wallis, CN=wallis,+S=C]...194.254.189.254<194.254.189.254>[@gwvpn.univ-nc.nc,+S=C]===10.10.20.0/24; erouted; eroute owner: #4
000 "UNC/3x0": myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/certificat-utilisateur.pem;
000 "UNC/3x0": CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC/3x0": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 5
000 "UNC/3x0": policy: RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW; prio: 24,24; interface: eth0;
000 "UNC/3x0": newest ISAKMP SA: #0; newest IPsec SA: #4;
000 "UNC/3x0": aliases: UNC
000 "UNC/4x0": 192.168.3.0/24===192.168.3.250[C=NC, ST=Province Sud, O=Universite de la Nouvelle-Caledonie, OU=Antenne de Wallis, CN=wallis,+S=C]...194.254.189.254<194.254.189.254>[@gwvpn.univ-nc.nc,+S=C]===10.10.30.0/23; erouted; eroute owner: #5
000 "UNC/4x0": myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/certificat-utilisateur.pem;
000 "UNC/4x0": CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC/4x0": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 5
000 "UNC/4x0": policy: RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW; prio: 23,24; interface: eth0;
000 "UNC/4x0": newest ISAKMP SA: #1; newest IPsec SA: #5;
000 "UNC/4x0": aliases: UNC
000 "UNC/4x0": IKE algorithm newest: AES_CBC_128-SHA1-MODP2048
000
000 #2: "UNC/1x0":4500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 28025s; newest IPSEC; eroute owner; isakmp#1; idle; import:admin initiate
000 #2: "UNC/1x0" esp.818d315d at 194.254.189.254 esp.aac075ea at 192.168.3.250 tun.0 at 194.254.189.254 tun.0 at 192.168.3.250 ref=0 refhim=4294901761
000 #3: "UNC/2x0":4500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 27810s; newest IPSEC; eroute owner; isakmp#1; idle; import:admin initiate
000 #3: "UNC/2x0" esp.57a0193f at 194.254.189.254 esp.8b3101cc at 192.168.3.250 tun.0 at 194.254.189.254 tun.0 at 192.168.3.250 ref=0 refhim=4294901761
000 #4: "UNC/3x0":4500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 28200s; newest IPSEC; eroute owner; isakmp#1; idle; import:admin initiate
000 #4: "UNC/3x0" esp.b4f3797e at 194.254.189.254 esp.7086d00a at 192.168.3.250 tun.0 at 194.254.189.254 tun.0 at 192.168.3.250 ref=0 refhim=4294901761
000 #5: "UNC/4x0":4500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 27941s; newest IPSEC; eroute owner; isakmp#1; idle; import:admin initiate
000 #5: "UNC/4x0" esp.c4ccb419 at 194.254.189.254 esp.c61c4dfa at 192.168.3.250 tun.0 at 194.254.189.254 tun.0 at 192.168.3.250 ref=0 refhim=4294901761
000 #1: "UNC/4x0":4500 STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 2864s; newest ISAKMP; lastdpd=18s(seq in:0 out:0); idle; import:admin initiate
000
$ ip xfrm state
src 194.254.189.254 dst 192.168.3.250
proto esp spi 0xc61c4dfa reqid 16397 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x23caba6b46ac8b634744765569dcadd49eacc695
enc cbc(aes) 0x4449acd499d62b3ab45d17e188f04219
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.168.3.250 dst 194.254.189.254
proto esp spi 0xc4ccb419 reqid 16397 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x6ac4c5f1e65e013d7f6058fc6d9c9a64801f27cd
enc cbc(aes) 0x3caed116bfff4d757e12e9ef781a3a22
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 194.254.189.254 dst 192.168.3.250
proto esp spi 0x7086d00a reqid 16393 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x5adb99f84f068b5f0f57db14728983b960fc574b
enc cbc(aes) 0xaac446a28ec2f08bf109aecf594ebf6c
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.168.3.250 dst 194.254.189.254
proto esp spi 0xb4f3797e reqid 16393 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x51bd6bb4ffa6972a20b60805b42dd55c619e8f86
enc cbc(aes) 0xbd87096dd8d9d5b3a8a3e4c0ad9b5e11
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 194.254.189.254 dst 192.168.3.250
proto esp spi 0x8b3101cc reqid 16389 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x8539d1e750718dc570542af782646a3ada5d538f
enc cbc(aes) 0x59aa93109f6a304fed3f1ce4a2ca372f
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.168.3.250 dst 194.254.189.254
proto esp spi 0x57a0193f reqid 16389 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0xde8000543391049e2fb3ea1b42dbfce01e12d629
enc cbc(aes) 0x9822f7b2266b2e52d8e93d3a0d531345
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 194.254.189.254 dst 192.168.3.250
proto esp spi 0xaac075ea reqid 16385 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0xfcc931d362a869af44a166e2d15a428126e3a2fa
enc cbc(aes) 0xff6de564bc7429b11c9f11057527e9dc
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.168.3.250 dst 194.254.189.254
proto esp spi 0x818d315d reqid 16385 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x112b659e4c6ae3d1bce3fe992c061d7256efcd49
enc cbc(aes) 0xaf6abbc090cf34a0e7bdb1ce55831ab6
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
New-Caledonia side :
====================
$ ipsec auto --status
000 "UNC": 194.254.189.254[@gwvpn.univ-nc.nc,+S=C]...%virtual[+S=C]===?; unrouted; eroute owner: #0
000 "UNC": myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/gwvpn.univ-nc.nc.pem;
000 "UNC": CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "UNC": policy: RSASIG+ENCRYPT+TUNNEL+DONTREKEY+IKEv2ALLOW; prio: 32,32; interface: eth0;
000 "UNC": dpd: action:clear; delay:30; timeout:120;
000 "UNC": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "UNC-all": 0.0.0.0/0===194.254.189.254[@gwvpn.univ-nc.nc,+S=C]...%virtual[+S=C]===?; unrouted; eroute owner: #0
000 "UNC-all": myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/gwvpn.univ-nc.nc.pem;
000 "UNC-all": CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC-all": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "UNC-all": policy: RSASIG+ENCRYPT+TUNNEL+DONTREKEY+IKEv2ALLOW; prio: 0,32; interface: eth0;
000 "UNC-all": dpd: action:clear; delay:30; timeout:120;
000 "UNC-all": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "UNC-l2tp": 194.254.189.254[@gwvpn.univ-nc.nc,+S=C]:17/1701...%virtual[+S=C]:17/%any===?; unrouted; eroute owner: #0
000 "UNC-l2tp": myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/gwvpn.univ-nc.nc.pem;
000 "UNC-l2tp": CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC-l2tp": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "UNC-l2tp": policy: RSASIG+ENCRYPT+TUNNEL+DONTREKEY+IKEv2ALLOW; prio: 32,32; interface: eth0;
000 "UNC-l2tp": dpd: action:clear; delay:30; timeout:120;
000 "UNC-l2tp": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "UNC-l2tp"[2]: 194.254.189.254[@gwvpn.univ-nc.nc,+S=C]:17/1701...117.20.37.70[C=NC, ST=Province Sud, O=Universite de la Nouvelle-Caledonie, OU=Antenne de Wallis, CN=wallis,+S=C]:17/0===192.168.3.0/24; erouted; eroute owner: #5
000 "UNC-l2tp"[2]: myip=unset; hisip=unset; mycert=/etc/ipsec.d/certs/gwvpn.univ-nc.nc.pem;
000 "UNC-l2tp"[2]: CAs: 'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'...'C=NC, ST=Province Sud, L=Noumea, O=Universite de la Nouvelle-Caledonie, OU=Centre de Ressources Informatiques, CN=RSSI, E=rssi at univ-nc.nc'
000 "UNC-l2tp"[2]: ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "UNC-l2tp"[2]: policy: RSASIG+ENCRYPT+TUNNEL+DONTREKEY+IKEv2ALLOW; prio: 32,32; interface: eth0;
000 "UNC-l2tp"[2]: dpd: action:clear; delay:30; timeout:120;
000 "UNC-l2tp"[2]: newest ISAKMP SA: #1; newest IPsec SA: #5;
000 "UNC-l2tp"[2]: IKE algorithm newest: AES_CBC_128-SHA1-MODP2048
000
000 #5: "UNC-l2tp"[2] 117.20.37.70:4500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_EXPIRE in 28789s; newest IPSEC; eroute owner; isakmp#1; idle; import:not set
000 #5: "UNC-l2tp"[2] 117.20.37.70 esp.c61c4dfa at 117.20.37.70 esp.c4ccb419 at 194.254.189.254 tun.0 at 117.20.37.70 tun.0 at 194.254.189.254 ref=0 refhim=4294901761
000 #4: "UNC-l2tp"[2] 117.20.37.70:4500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_EXPIRE in 28789s; isakmp#1; idle; import:not set
000 #4: "UNC-l2tp"[2] 117.20.37.70 esp.7086d00a at 117.20.37.70 esp.b4f3797e at 194.254.189.254 tun.0 at 117.20.37.70 tun.0 at 194.254.189.254 ref=0 refhim=4294901761
000 #3: "UNC-l2tp"[2] 117.20.37.70:4500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_EXPIRE in 28789s; isakmp#1; idle; import:not set
000 #3: "UNC-l2tp"[2] 117.20.37.70 esp.8b3101cc at 117.20.37.70 esp.57a0193f at 194.254.189.254 tun.0 at 117.20.37.70 tun.0 at 194.254.189.254 ref=0 refhim=4294901761
000 #2: "UNC-l2tp"[2] 117.20.37.70:4500 STATE_QUICK_R2 (IPsec SA established); EVENT_SA_EXPIRE in 28789s; isakmp#1; idle; import:not set
000 #2: "UNC-l2tp"[2] 117.20.37.70 esp.aac075ea at 117.20.37.70 esp.818d315d at 194.254.189.254 tun.0 at 117.20.37.70 tun.0 at 194.254.189.254 ref=0 refhim=4294901761
000 #1: "UNC-l2tp"[2] 117.20.37.70:4500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_EXPIRE in 3587s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0); idle; import:not set
000
$ ip xfrm state
src 194.254.189.254 dst 117.20.37.70
proto esp spi 0xaac075ea reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0xfcc931d362a869af44a166e2d15a428126e3a2fa
enc cbc(aes) 0xff6de564bc7429b11c9f11057527e9dc
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 117.20.37.70 dst 194.254.189.254
proto esp spi 0x818d315d reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x112b659e4c6ae3d1bce3fe992c061d7256efcd49
enc cbc(aes) 0xaf6abbc090cf34a0e7bdb1ce55831ab6
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 194.254.189.254 dst 117.20.37.70
proto esp spi 0x8b3101cc reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x8539d1e750718dc570542af782646a3ada5d538f
enc cbc(aes) 0x59aa93109f6a304fed3f1ce4a2ca372f
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 117.20.37.70 dst 194.254.189.254
proto esp spi 0x57a0193f reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0xde8000543391049e2fb3ea1b42dbfce01e12d629
enc cbc(aes) 0x9822f7b2266b2e52d8e93d3a0d531345
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 194.254.189.254 dst 117.20.37.70
proto esp spi 0x7086d00a reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x5adb99f84f068b5f0f57db14728983b960fc574b
enc cbc(aes) 0xaac446a28ec2f08bf109aecf594ebf6c
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 117.20.37.70 dst 194.254.189.254
proto esp spi 0xb4f3797e reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x51bd6bb4ffa6972a20b60805b42dd55c619e8f86
enc cbc(aes) 0xbd87096dd8d9d5b3a8a3e4c0ad9b5e11
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 194.254.189.254 dst 117.20.37.70
proto esp spi 0xc61c4dfa reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x23caba6b46ac8b634744765569dcadd49eacc695
enc cbc(aes) 0x4449acd499d62b3ab45d17e188f04219
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 117.20.37.70 dst 194.254.189.254
proto esp spi 0xc4ccb419 reqid 16401 mode tunnel
replay-window 32 flag af-unspec
auth hmac(sha1) 0x6ac4c5f1e65e013d7f6058fc6d9c9a64801f27cd
enc cbc(aes) 0x3caed116bfff4d757e12e9ef781a3a22
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
More information about the Users
mailing list