[Openswan Users] Openswan can not connect to Cisco ASA
Yiyun Meng
manfonly at gmail.com
Tue Dec 31 02:55:43 EST 2013
Hi,
My openswan version is U2.6.37, OS is fedora 16. I want to use openswan
as a client and Cisco ASA as a VPN server.
I use following URL as a reference:
http://binaryjunction.com/2010/05/07/openswan-vpn-client-cisco-servers/
Client ip: 10.140.28.12
Server ip:10.75.189.105
Here is my ipsec.conf:
version 2.0 # must support 2.0 openswan
# basic configuration
config setup
protostack=netkey
nat_traversal=yes
interfaces=%defaultroute
plutodebug=none
strictcrlpolicy=no
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
oe=off
conn labVPN
type=tunnel
authby=secret
left=%defaultroute
leftid=@mum
leftxauthclient=yes
leftmodecfgclient=yes
leftxauthusername=VPNTester
right=10.75.189.105
remote_peer_type=cisco
rightxauthserver=yes
rightmodecfgserver=yes
modecfgpull=yes
keyexchange=ike
ike=3des-md5;modp1024
esp=3des-md5;modp1024
#ikelifetime=28800s
#keylife=60m
#compress=no
aggrmode=yes
pfs=no
auto=add
When I use ipsec auto up labVPN, the output seems OK
112 "labVPN" #1: STATE_AGGR_I1: initiate
003 "labVPN" #1: received Vendor ID payload [XAUTH]
003 "labVPN" #1: received Vendor ID payload [RFC 3947] method set to=109
003 "labVPN" #1: received Vendor ID payload [Dead Peer Detection]
003 "labVPN" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): no
NAT detected
004 "labVPN" #1: STATE_AGGR_I2: sent AI2, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
group=modp1024}
004 "labVPN" #1: STATE_XAUTH_I1: XAUTH client - awaiting CFG_set
004 "labVPN" #1: STATE_XAUTH_I1: XAUTH client - awaiting CFG_set
004 "labVPN" #1: STATE_MAIN_I4: ISAKMP SA established
117 "labVPN" #2: STATE_QUICK_I1: initiate
But no tunnel up:
# /etc/init.d/ipsec status
IPsec running - pluto pid: 29480
pluto pid 29480
No tunnels up
# tail -20 /var/log/messages
Dec 31 15:42:21 localhost pluto[29480]: ike_alg_register_enc(): Activating
aes_gcm_16: FAILED (ret=-17)
Dec 31 15:42:21 localhost pluto[29480]: Changed path to directory
'/etc/ipsec.d/cacerts'
Dec 31 15:42:21 localhost pluto[29480]: loaded CA cert file 'cacert.pem'
(1025 bytes)
Dec 31 15:42:21 localhost pluto[29480]: Could not change to directory
'/etc/ipsec.d/aacerts': /
Dec 31 15:42:21 localhost pluto[29480]: Could not change to directory
'/etc/ipsec.d/ocspcerts': /
Dec 31 15:42:21 localhost pluto[29480]: Could not change to directory
'/etc/ipsec.d/crls'
Dec 31 15:42:21 localhost pluto[29480]: added connection description
"labVPN"
Dec 31 15:42:21 localhost ipsec__plutorun: 002 added connection description
"labVPN"
Dec 31 15:42:21 localhost pluto[29480]: listening for IKE messages
Dec 31 15:42:21 localhost pluto[29480]: adding interface eth0/eth0
10.140.28.12:500
Dec 31 15:42:21 localhost pluto[29480]: adding interface eth0/eth0
10.140.28.12:4500
Dec 31 15:42:21 localhost pluto[29480]: adding interface lo/lo 127.0.0.1:500
Dec 31 15:42:21 localhost pluto[29480]: adding interface lo/lo
127.0.0.1:4500
Dec 31 15:42:21 localhost pluto[29480]: adding interface lo/lo ::1:500
Dec 31 15:42:21 localhost pluto[29480]: loading secrets from
"/etc/ipsec.secrets"
Dec 31 15:42:31 localhost pluto[29480]: packet from 10.75.189.105:500: Quick
Mode message is for a non-existent (expired?) ISAKMP SA
I think my ASA setting is OK, because I can use vpnc to establish the
connection.
Regards,
Yiyun
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20131231/d8a24484/attachment.html>
More information about the Users
mailing list