Here is my ipsec.conf and ipsec auto --status.
Do you want to see all the configs I changed from shorewall?
Doug
####################
my ipsec.conf file:
>>>>>>>> 
 # /etc/ipsec.conf - FreeS/WAN IPsec configuration file
 
 # More elaborate and more varied sample configurations
 can be found
 # in FreeS/WAN's doc/examples file, and in the HTML
 documentation.
 
 
 
 # basic configuration
 config setup
        interfaces="ipsec0=eth0"
        klipsdebug=none
        plutodebug=all
        plutoload=%search
        plutostart=%search
        uniqueids=yes
 
 # defaults for subsequent connection descriptions
 conn %default
        keyingtries=0
        #added for sshSENT
        disablearrivalcheck=no
        keyexchange=ike
        ikelifetime=240m
        keylife=60m
        compress=no
        authby=secret
        pfs=yes
        auto=add
                
 #win2k vpn
 conn roadwarrior-net
        leftsubnet=172.16.0.0/16
        also=roadwarrior
        
 conn roadwarrior
        right=%any
        left=12.144.99.39
        leftnexthop=12.144.99.33
        auto=add
        pfs=yes
##########################
 Here is the "ipsec auto --status" 
>>>>>> 
 000 interface ipsec0/eth0 12.144.99.39
 000  
 000 "roadwarrior-net"[1]:

172.16.0.0/16===12.144.99.39---12.144.99.33...32.103.170.99
 000 "roadwarrior-net"[1]:   ike_life: 14400s;
 ipsec_life: 3600s;
 rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
 000 "roadwarrior-net"[1]:   policy:
 PSK+ENCRYPT+TUNNEL+PFS; interface: eth0;
 erouted
 000 "roadwarrior-net"[1]:   newest ISAKMP SA: #1;
 newest IPsec SA: #2;
 eroute owner: #2
 000 "roadwarrior": 12.144.99.39---12.144.99.33...%any
 000 "roadwarrior":   ike_life: 14400s; ipsec_life:
 3600s; rekey_margin:
 540s; rekey_fuzz: 100%; keyingtries: 0
 000 "roadwarrior":   policy: PSK+ENCRYPT+TUNNEL+PFS;
 interface: eth0;
 unrouted
 000 "roadwarrior":   newest ISAKMP SA: #0; newest
IPsec
 SA: #0; eroute
 owner: #0
 000 "roadwarrior-net":
 172.16.0.0/16===12.144.99.39---12.144.99.33...%any
 000 "roadwarrior-net":   ike_life: 14400s; ipsec_life:
 3600s; rekey_margin:
 540s; rekey_fuzz: 100%; keyingtries: 0
 000 "roadwarrior-net":   policy:
 PSK+ENCRYPT+TUNNEL+PFS; interface: eth0;
 unrouted
 000 "roadwarrior-net":   newest ISAKMP SA: #0; newest
 IPsec SA: #0; eroute
 owner: #0
 000  
 000 #2: "roadwarrior-net"[1] 32.103.170.99
 STATE_QUICK_R2 (IPsec SA
 established); EVENT_SA_REPLACE in 2843s; newest IPSEC;
 eroute owner
 000 #2: "roadwarrior-net"[1] 32.103.170.99
 [EMAIL PROTECTED]
 [EMAIL PROTECTED] [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 000 #1: "roadwarrior-net"[1] 32.103.170.99
 STATE_MAIN_R3 (sent MR3, ISAKMP
 SA established); EVENT_SA_REPLACE in 13642s; newest
 ISAKMP
 000  
####################

-----Original Message-----
From: guitarlynn [mailto:guitarlynn@;cox.net]
Sent: Tuesday, October 29, 2002 11:36 PM
To: Simpson, Doug
Cc: [EMAIL PROTECTED]
Subject: Re: [leaf-user] (no subject)


On Tuesday 22 October 2002 22:36, Simpson, Doug wrote:

> I believe it is the firewall or a routing issue.  Pardon my ignorance
> but I do not know where to look next or what to test or disable.
> Has anyone done this successfully?   Bering (LRP) and FreeSwan and
> SSHSentinel.
>  THank you for your time

Yep, many people are running this setup without problems. We'll need
some configuration information for Ipsec and Shorewall to have any
clue to what might be wrong.
-- 

~Lynn Avants
aka Guitarlynn

guitarlynn at users.sourceforge.net
http://leaf.sourceforge.net

If linux isn't the answer, you've probably got the wrong question!


-------------------------------------------------------
This sf.net email is sponsored by: Influence the future 
of Java(TM) technology. Join the Java Community 
Process(SM) (JCP(SM)) program now. 
http://ads.sourceforge.net/cgi-bin/redirect.pl?sunm0004en
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to