[Openswan Users] OpenSwan and Palo Alto PA-4020
Neal Murphy
neal.p.murphy at alum.wpi.edu
Wed May 21 17:53:11 EDT 2014
Which log file contains entries like the following (reformatted for email)?
----
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
initiating Main Mode to replace #59
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
ignoring unknown Vendor ID payload [4f4576795c6b677a57715c73]
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
received Vendor ID payload [Dead Peer Detection]
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
STATE_MAIN_I2: sent MI2, expecting MR2
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
STATE_MAIN_I3: sent MI3, expecting MR3
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
received Vendor ID payload [CAN-IKEv2]
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
Main mode peer ID is ID_IPV4_ADDR: '64.n.n.102'
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
May 21 17:14:49 lanner pluto[6654]: "connName" #60: \
STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY \
cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1536}
----
Those entries should be a bit more informative.
N
On Wednesday, May 21, 2014 05:10:19 PM Patrick Naubert wrote:
> Rescued from the Spam bucket. Please remember to subscribe to the mailing
> list before you post to it.
>
> From: David Jones <david at proficienthealth.com>
> Subject: Re: OpenSwan and Palo Alto PA-4020
> Date: May 20, 2014 at 1:57:51 PM EDT
> To: users at lists.openswan.org
>
>
> Can anyone help me with this or tell me to include more information or
> something?
>
> Thanks,
>
> David
>
>
> On Wed, Apr 30, 2014 at 12:04 PM, David jones <david at proficienthealth.com>
> wrote: Hi,
>
> First-time poster here. To set the mood, I am new to OpenSwan and network
> security in general but a chain of events have left me having to manage
> something better suited by someone else :-)
>
> I have set up numerous IPSec connections using OpenSwan interfacing with
> Ciso, Sonicwall, and others but this Palo Alto is causing me some pain.
>
> Here is the scenario… I have an existing IPSec connection with a client
> that is working perfectly, with a Cisco 300 Series VPN appliance as there
> endpoint. They are replacing it with this Palo Alto and gave me the new
> information for it. I created a new connection and secret and updated the
> rightIP and subnets, but left everything else the same except for setting
> PFS =Yes in the conf.
>
> Linux version 3.2.0-2-amd64 (Debian 3.2.18-1)
> (debian-kernel at lists.debian.org) (gcc version 4.6.3 (Debian 4.6.3-1) ) #1
> SMP Mon May 21 17:45:41 UTC 2012
>
> Version: Linux Openswan U2.6.38-g312f1b8a-dirty/K3.2.0-2-amd64
>
> example
> WORKS!
> conn clientvpn_old
> authby=secret
> left=xxx.xxx.xxx.167
> leftsourceip=xxx.xxx.xxx.167
> leftnexthop=xxx.xxx.xxx.161
> right=xxx.xxx.xxx.5
> rightsubnet=xxx.xxx.xxx.133/32
> auto=route
> pfs=no
>
> DOESNT WORK!
> conn clientvpn_new
> authby=secret
> left=xxx.xxx.xxx.167
> leftsourceip=xxx.xxx.xxx.167
> leftnexthop=xxx.xxx.xxx.161
> right=xxx.xxx.xxx.2
> rightsubnets={xxx.xxx.xxx6.34/32,xxx.xxx.xxx.35/32}
> auto=route
> pfs=yes
>
>
>
> root at xxx:~# ipsec auto —status | grep clientvpn_new
> 000 "clientvpn_new/0x1":
> xxx.xxx.xxx.167/32===xxx.xxx.xxx.167<xxx.xxx.xxx.167>---xxx.xxx.xxx.161...
> xxx.xxx.xxx.2<xxx.xxx.xxx.2>===xxx.xxx.xxx.34/32; unrouted; eroute owner:
> #0 000 "clientvpn_new/0x1": myip=xxx.xxx.xxx.167; hisip=unset;
> 000 "clientvpn_new/0x1": ike_life: 3600s; ipsec_life: 28800s;
> rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0 000
> "clientvpn_new/0x1": policy:
> PSK+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 32,32;
> interface: eth1; 000 "clientvpn_new/0x1": newest ISAKMP SA: #0; newest
> IPsec SA: #0; 000 "clientvpn_new/0x1": aliases: clientvpn_new
> 000 "clientvpn_new/0x2":
> xxx.xxx.xxx.167/32===xxx.xxx.xxx.167<xxx.xxx.xxx.167>---xxx.xxx.xxx.161...
> xxx.xxx.xxx.2<xxx.xxx.xxx.2>===xxx.xxx.xxx.35/32; unrouted; eroute owner:
> #0 000 "clientvpn_new/0x2": myip=xxx.xxx.xxx.167; hisip=unset;
> 000 "clientvpn_new/0x2": ike_life: 3600s; ipsec_life: 28800s;
> rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0 000
> "clientvpn_new/0x2": policy:
> PSK+ENCRYPT+TUNNEL+PFS+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 32,32;
> interface: eth1; 000 "clientvpn_new/0x2": newest ISAKMP SA: #0; newest
> IPsec SA: #0; 000 "clientvpn_new/0x2": aliases: clientvpn_new
>
>
>
> root at xxx:~# grep clientvpn_new /var/log/auth.log
> Apr 30 01:00:05 xxx pluto[13917]: added connection description
> "clientvpn_new/0x1" Apr 30 01:00:05 xxx pluto[13917]: added connection
> description "clientvpn_new/0x2" Apr 30 01:00:05 xxx pluto[13917]: loading
> secrets from "/etc/ipsec.d/clientvpn_new.secrets"
>
>
> So it looks like everything comes up properly but when the other side tries
> to connect, they get a timeout and I get nothing in my auth.log or ipsec
> auto —status. I have verified a trace route form their side and they can
> reach my IP just fine. Im completely lost at this point and looking for
> some suggestions. My assumption is that there is something not right on
> their side but I dont know how to prove it.
>
> Thanks,
>
>
> David Jones
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20140521/d14d018a/attachment-0001.html>
More information about the Users
mailing list