[Openswan Users] eatablish Ipsec VPN from Cisco IOS to Openswan
MichaelLeung
gbcbooksmj at gmail.com
Sun Feb 15 10:08:16 EST 2015
Can anyone help me get out of the trouble
i try to establish a Ipsec vpn from Cisco ios and Linux openswan
here is the topology
______________
|Cisco IOS |------------(gateway:public address
)--------------------(Centos openswan)
| | public address:dynamic public
address :8.8.8.8
192.168.1.253 private address :
192.168.0.1/24 on the it virtual adapter
and my configuration file of Cisco IOS and openswan
CIsco :
--------------------------------------------Cisco----------------
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key cisco address 8.8.8.8
!
crypto ipsec transform-set vps esp-3des esp-md5-hmac
!
!
crypto map vps 10 ipsec-isakmp
set peer 8.8.8.8
set security-association lifetime seconds 86400
set transform-set vps
set pfs group2
match address vps
ip access-list extended vps
permit gre host 192.168.1.253 host 8.8.8.8 #they are the source and
destination address of GRE tunnel on Cisco IOS
---------------------------------------------------------------------
Openswan
-----------------------------------Openswan----------------------------
version 2.0
config setup
#interfaces=%defaultroute
protostack=netkey
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8,%v6:fd00::/8,%v6:fe80::/10
oe=off
dumpdir=/var/run/pluto/
plutostderrlog=/var/log/pluto.log
nhelpers=0
disable_port_floating=no
conn %default
rekey=no
conn GRE
authby=secret
pfs=no
auto=add
type=tunnel
keyexchange=ike
ike=3des-md5
phase2alg=3des-md5
left=8.8.8.8
leftprotoport=47/%any
leftupdown="ipsec _updown --route yes"
leftsubnet=192.168.0.1/32 ##actually , this is a address on
Virtual network adapter of Centos
right=%any
rightprotoport=47/%any
rightsubnet=192.168.1.253/32 #192.168.1.253 is
the interface ip address of Cisco IOS, it is behind the WAN.
-------------------------------------------------------------------
[root at vultr ~]# cat /etc/ipsec.secrets
#
include /etc/ipsec.d/*.secrets
8.8.8.8 %any : PSK "cisco"
and the error ouput:
packet from 113.111.97.145:5609: received Vendor ID payload [RFC 3947]
method set to=109
packet from 113.111.97.145:5609: ignoring unknown Vendor ID payload
[439b59f8ba676c4c7737ae22eab8f582]
packet from 113.111.97.145:5609: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
packet from 113.111.97.145:5609: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
"GRE"[1] 113.111.97.145 #83: responding to Main Mode from unknown peer
113.111.97.145
"GRE"[1] 113.111.97.145 #83: transition from state STATE_MAIN_R0 to
state STATE_MAIN_R1
"GRE"[1] 113.111.97.145 #83: STATE_MAIN_R1: sent MR1, expecting MI2
it just keeping a the 5/6 isakmp message .
i am so confusing why it stuck in the isakmp neigotiation.
i established successful before, but i dont know what line i removed.
please get help
thanks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20150215/eddf45a9/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: gbcbooksmj.vcf
Type: text/x-vcard
Size: 4 bytes
Desc: not available
URL: <http://lists.openswan.org/pipermail/users/attachments/20150215/eddf45a9/attachment.vcf>
More information about the Users
mailing list