[Openswan Users] No traffic between Openswan and Cisco IPSEC
users-bounces at lists.openswan.org
users-bounces at lists.openswan.org
Tue May 17 04:09:28 EDT 2016
Rescued from the spam bucket. Please remember to subscribe to the mailing list before posting to it.
From: Ümit Çakar <ue_cakar at yahoo.com.au <mailto:ue_cakar at yahoo.com.au>>
Subject: No traffic between Openswan and Cisco IPSEC
Date: May 17, 2016 at 4:09:18 AM EDT
To: <users at lists.openswan.org <mailto:users at lists.openswan.org>>
Hi Everyone,
Complete newbie here trying to implement and learn a bit too but wondering if I’m out of my depth here…
Anyway, I’ve got the basic IPSEC tunnel up and running between an Openswan server and a Cisco router. VPN tunnel is established and stays up. I have no traffic between the two end points though (by no traffic I mean ICMP/ping traffic. Below are my configs on both ends, any light you can shed is highly appreciated. Thanks in advamce.
######/etc/ipsec.conf#######
config setup
conn IPSEC
#auto=start #automatically start if detected
type=tunnel #tunnel mode/not transport
authby=secret
auto=add
###THIS SIDE###
left=193.Open.Swan.WAN # OpenSwan-WAN_IP
leftsubnet=172.16.255.0/24 # OpenSwan-LAN
leftsourceip=172.16.255.1 # OpenSwan-LAN_IP
###PEER SIDE###
right=123.Cisco.Router.WAN # CiscoRouter-WAN
rightsubnet=172.16.0.0/24 # CiscoRouter-LAN
rightsourceip=172.16.0.1 # CiscoRouter-LAN_IP
#phase 1
keyexchange=ike
#phase 2
esp=3des-md5-96
#######/etc/ipsec.secrets##############
#{local} {peer} : PSK "{secret}"
193.Open.Swan.WAN 123.Cisco.Router.WAN : PSK "{secret}"
# IPTABLE ENTRIES ON OPENSWAN
iptables -t filter -N FORWARDS
iptables -t filter -A FORWARDS -d 172.16.0.0/24 -i eth0 -o ipsec0 -j ACCEPT
iptables -t filter -A FORWARDS -d 172.16.0.0/24 -i ipsec0 -o eth0 -j ACCEPT
iptables -t filter -A OUTPUT -d 172.16.0.0/24 -o ipsec0 -j ACCEPT
! Cisco Config
!====================================================
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key privacyviolationbybigbrother address 193.Open.Swan.WAN
!
crypto ipsec security-association lifetime seconds 86400
!
crypto ipsec transform-set s1s2trans esp-3des esp-md5-hmac
!
crypto map to-site2 10 ipsec-isakmp
set peer 193.Open.Swan.WAN
set transform-set s1s2trans
match address 101
interface Dialer 0
crypto map to-site2
ip route 172.16.255.0 255.255.255.0 193.Open.Swan.WAN
ip nat inside source route-map nonat interface Dialer 0 overload
!
access-list 101 permit ip 172.16.0.0 0.0.0.255 172.16.255.0 0.0.0.255
!access-list 150 deny ip 172.16.0.0 0.0.0.255 172.16.255.0 0.0.0.255
!access-list 150 permit ip 172.16.0.0 0.0.0.255 any
route-map nonat permit 10
match ip address 150
Regards,
Umit
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20160517/d15f265f/attachment-0001.html>
More information about the Users
mailing list