[Openswan Users] VPN tunnel up but traffic will not pass

Ryan Slick speedy_1s at yahoo.com.au
Sat Oct 11 01:56:19 EDT 2014


Ok update. Seems I can ping in both directions only if I iniate a ping from the openswan LAN side first. So ipsec sa is showing as up on both ends. Contious ping running from juniper LAN side is running and failing as soon as a single ping from openswan side is run the contipus ping starts to work. Any ideas on how to fix it so either side can ping first??



------------------------------
On Sat, Oct 11, 2014 3:34 PM NZDT Ryan Slick wrote:

>Hi guys, I have phase 1 and 2 up on both sides. logs look good. But I cannot ping from either end.
>One side is openswan, the other is Juniper firewall.
>
>Traceroute from the juniper to the internal address shows the first hop failing, traceroute from openswan shows the traffic going out into the realms of the internet. It would appear openswan is not routing the traffic correctly. Juniper has permit any any rules on all interfaces.  
>
>
>Any help would be appreciated!
>
>
>
>conn netconn7
>        authby="secret"
>        left=%defaultroute
>        leftsubnet=192.168.10.0/24
>        leftid=@routerA
>        right=111.69.xx.xx
>        rightsubnet=192.168.1.0/24
>        rightid=@srx
>        pfs=off
>        salifetime=28800s
>        ikelifetime=3600s
>        auth=esp
>        ike=aes128-sha1;modp768
>        phase2alg=aes128-sha1;modp768
>        dpdaction=restart
>        dpddelay=10
>        dpdtimeout=60
>        aggrmode=yes
>        auto=add
>
>iptables:
>
>oot:/etc# iptables -L -v -n
>hain INPUT (policy ACCEPT 204 packets, 9136 bytes)
>pkts bytes target     prot opt in     out     source               destination
>
>   5   145 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
>
> 266 16806 macipport_filter_inbound  all  --  *      *       0.0.0.0/0
>  0.0.0.0/0
> 266 16806 macipport_filter  all  --  *      *       0.0.0.0/0            0.0.0
>0/0
> 266 16806 filter     all  --  *      *       0.0.0.0/0            0.0.0.0/0
>
>
>hain FORWARD (policy ACCEPT 0 packets, 0 bytes)
>pkts bytes target     prot opt in     out     source               destination
>
>   0     0 macipport_filter_forward  all  --  *      *       0.0.0.0/0
>  0.0.0.0/0
>   0     0 ipport_filter_forward  all  --  *      *       0.0.0.0/0
>.0.0.0/0
>   0     0 macipport_filter  all  --  *      *       0.0.0.0/0            0.0.0
>0/0
>   0     0 filter_forward  all  --  *      *       0.0.0.0/0            0.0.0.0
>0
>
>hain OUTPUT (policy ACCEPT 195 packets, 30949 bytes)
>pkts bytes target     prot opt in     out     source               destination
>
> 197 31007 macipport_filter_outbound  all  --  *      *       0.0.0.0/0
>   0.0.0.0/0
>
>hain filter (1 references)
>pkts bytes target     prot opt in     out     source               destination
>
>   0     0 ACCEPT     icmp --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       icmp type 8
>   0     0 ACCEPT     tcp  --  wwan0  *       0.0.0.0/0            192.168.10.1
>       tcp dpt:80
>   0     0 DROP       tcp  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       tcp dpt:80
>   0     0 ACCEPT     tcp  --  wwan0  *       0.0.0.0/0            192.168.10.1
>       tcp dpt:443
>   0     0 DROP       tcp  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       tcp dpt:443
>   0     0 ACCEPT     tcp  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       tcp dpt:23
>   0     0 ACCEPT     tcp  --  wwan0  *       0.0.0.0/0            192.168.10.1
>       tcp dpt:22
>   0     0 DROP       tcp  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       tcp dpt:22
>   7  1171 ACCEPT     udp  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       udp dpt:500
>   0     0 ACCEPT     udp  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       udp dpt:4500
>   0     0 ACCEPT     esp  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>
>   0     0 ACCEPT     ah   --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>
>   0     0 ACCEPT     all  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       state RELATED,ESTABLISHED
>   0     0 DROP       all  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>
>
>hain filter_forward (1 references)
>pkts bytes target     prot opt in     out     source               destination
>
>   0     0 ACCEPT     all  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       mark match 0x1
>   0     0 ACCEPT     all  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>       state RELATED,ESTABLISHED
>   0     0 DROP       all  --  wwan0  *       0.0.0.0/0            0.0.0.0/0
>
>
>hain ipport_filter_forward (1 references)
>pkts bytes target     prot opt in     out     source               destination
>
>
>
>root:/etc# netstat -rn
>Kernel IP routing table
>Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
>0.0.0.0         49.226.157.41   0.0.0.0         UG        0 0          0 wwan0
>49.226.157.40   0.0.0.0         255.255.255.252 U         0 0          0 wwan0
>192.168.10.0    0.0.0.0         255.255.255.0   U         0 0          0 br0


More information about the Users mailing list