On Saturday 15 February 2003 11:08 am, [EMAIL PROTECTED] wrote:
> Charles,
>
> I am not sure how to get the net ipfilter list output to my windows
> machine for adding to email.

Per the 'SR FAQ' linked at the bottom of every post from the list:

svi net ipfilter list >some_temp_file_name.txt

transport on a floppy (other than the LEAF one) or whatever other means
you might have on the LEAF box (SSH, etc...).


> I did capture the output from the logs displayed by weblet.  They are
> pasted in below.
>
>
> 1      10:53:34.490  02/15/03  Sev=Warning/2  IKE/0xE300007B
> Exceeded 3 IKE SA negotiation retransmits... peer is not responding
>
> 2      10:53:34.550  02/15/03  Sev=Warning/3  DIALER/0xE3300015
> GI VPN start callback failed "CM_PEER_NOT_RESPONDING" (16h).

Where exactly is this error coming from? 
Not the LEAF box, correct!


> IP masquerading entries
> prot   expire source               destination          ports

> udp   1:24.01 192.168.1.3          149.2.141.5          500 -> 500 (500)

Looks like you have initiated an ipsec connection to the host 149.2.141.5
that you have initiated.


> Chain input (policy DENY: 38 packets, 3910 bytes):
>  pkts bytes target     prot opt    tosa tosx  ifname     mark
> outsize  source                destination           ports

>     0     0 ACCEPT     udp  ------ 0xFF 0x00
> eth0                           0.0.0.0/0
> 0.0.0.0/0             * ->   500

The rule is good, however you have received '0' packets
from your remote ipsec server. The remote server has not
returned your request for a connection.

This is what you are missing... the auth protocols that should look
like this on your IN chain:

    0     0 ACCEPT     50   ------ 0xFF 0x00  eth0                           
0.0.0.0              0.0.0.0/0             n/a
    0     0 ACCEPT     51   ------ 0xFF 0x00  eth0                           
0.0.0.0              0.0.0.0/0             n/a
 
This is likely your problem, and I have sent you the exact rule
I used on my Dachstein box to enable this.


> Chain forward (policy DENY: 0 packets, 0 bytes):
>  pkts bytes target     prot opt    tosa tosx  ifname     mark
> outsize  source                destination           ports

>     8  4680 MASQ       udp  ------ 0xFF 0x00
> *                              192.168.1.3
> 0.0.0.0/0             500 ->   *

Good, 8 packets here. This is the request for a connection that you
have sent.



Chain portfw ????
> prot localaddr            rediraddr               lport    rport  pcnt
> pref
> UDP  12.237.136.59        192.168.1.3               500      500
> 10    10

The redirect of ipsec information from your external ip address to
your LAN machine.


> Installed Modules:
> ip_masq_portfw          2416   1
> ip_masq_ipsec           7328   1

Good, portfw'ding is enabled.


###### Summary #####
It should work when you add the rule:

# Generic Services open to outside world
# Space seperated list: protocol_srcip/mask_dstport
EXTERN_PORTS="50_0.0.0.0 51_0.0.0.0"

# -or-
# Indexed list: "Protocol SrcAddr/Mask [ DestAddr[/DestMask] ]"
#EXTERN_PROTO0="50 0.0.0.0"
#EXTERN_PROTO1="51 0.0.0.0"

I hope this helps!
-- 
~Lynn Avants
Linux Embedded Appliance Firewall developer
http://leaf.sourceforge.net


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to