Quoting Michael O'Donnell <[EMAIL PROTECTED]>: > >Please inform your husband that his firewall > >needs to allow outbound UDP port 50 and IP > >protocol 500. If he is doing NAT, then there > >needs to be a way to let an IPsec tunnel > >through without manipulating the packet. > Is my firewall scrogging us? I clearly need > to learn more about IPsec and VPN stuff...
Yeppers, it sure is. It sounds like they have a fairly strict VPN policy, and, more then likely, are detecting the fact that the firewall is manipulating packets. Good news is, there is *PROBRABLY* a way around it. Make sure you have the ip_masq_ipsec and ip_masq_pptp loaded on the firewall. ` This will sounds a bit strange, but the reason they are required is becouse inbound data from a VPN connection, be it PPTP, IPSec, etc, *DOES NOT USE TCP*. It uses IP, but it uses a different protocol then TCP. In this case, 'protocol 500', which is basically just a numeric protocol ID within the IP header. Becouse of this strait old port forwarding will not work. -- Thomas Charron -={ Is beadarrach an ni an onair }=- _______________________________________________ gnhlug-discuss mailing list [EMAIL PROTECTED] http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss