I am trying to set up an IPSec tunnel between two sites.

One site puts the route into the routing table OK, but the other side
won't.

Running "ipsec auto --status" and "route -n" for the good side give the
detail below.

Note that for the good side, the line containing the word "policy" shows
the interface as ppp0 erouted, but that the otherone shows eth1 unrouted.
The eth1 is correct, but I just cannot work out how to get the routing
table set up.

# ipsec auto --status
000 interface ipsec0/ppp0 144.137.43.76
000
000 "WD_WN":
192.168.43.0/24===144.137.43.76[@atelwn.atel.com.au]---172.31.22.24...
000 "WD_WN": ...202.129.91.245[@atelwd.atel.com.au]===192.168.42.0/24
000 "WD_WN":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0
000 "WD_WN":   policy: RSASIG+ENCRYPT+COMPRESS+TUNNEL+PFS; interface:
ppp0; erouted
000 "WD_WN":   newest ISAKMP SA: #1; newest IPsec SA: #2; eroute owner: #2
000
000 #2: "WD_WN" STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 28043s; newest IPSEC; eroute owner
000 #2: "WD_WN" [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED]
000 #1: "WD_WN" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in
2601s; newest ISAKMP


# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use
Iface
172.31.22.24    0.0.0.0         255.255.255.255 UH    0      0        0
ppp0
172.31.22.24    0.0.0.0         255.255.255.255 UH    0      0        0
ipsec0
203.17.235.125  0.0.0.0         255.255.255.255 UH    0      0        0
ppp1
10.0.0.0        0.0.0.0         255.255.255.0   U     0      0        0
eth1
192.168.42.0    172.31.22.24    255.255.255.0   UG    0      0        0
ipsec0
192.168.43.0    0.0.0.0         255.255.255.0   U     0      0        0
eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         172.31.22.24    0.0.0.0         UG    0      0        0
ppp0



but for the bad side the details are:

# ipsec auto --status
000 interface ipsec0/eth1 202.129.91.245
000
000 "WD_WN" instance:
192.168.42.0/24===202.129.91.245[@atelwd.atel.com.au]---172.24.158.129...
000 "WD_WN" instance:
...144.137.43.76[@atelwn.atel.com.au]===192.168.43.0/24
000 "WD_WN" instance:   ike_life: 3600s; ipsec_life: 28800s; rekey_margin:
540s; rekey_fuzz: 100%; keyingtries: 1
000 "WD_WN" instance:   policy: RSASIG+ENCRYPT+COMPRESS+TUNNEL+PFS;
interface: eth1; unrouted
000 "WD_WN" instance:   newest ISAKMP SA: #1; newest IPsec SA: #0; eroute
owner: #0
000 "WD_WN":
192.168.42.0/24===202.129.91.245[@atelwd.atel.com.au]---172.24.158.129...
000 "WD_WN": ...%any[@atelwn.atel.com.au]===192.168.43.0/24
000 "WD_WN":   ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 1
000 "WD_WN":   policy: RSASIG+ENCRYPT+COMPRESS+TUNNEL+PFS; interface:
eth1; unrouted
000 "WD_WN":   newest ISAKMP SA: #0; newest IPsec SA: #0; eroute owner: #0
000
000 #2: "WD_WN":144.137.43.76 STATE_QUICK_R1 (sent QR1, inbound IPsec SA
installed, expecting QI2); EVENT_RETRANSMIT in 16s
000 #1: "WD_WN":144.137.43.76 STATE_MAIN_R3 (sent MR3, ISAKMP SA
established); EVENT_SA_REPLACE in 3316s; newest ISAKMP


# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use
Iface
202.129.91.246  0.0.0.0         255.255.255.255 UH    0      0        0
eth0
172.24.158.129  0.0.0.0         255.255.255.255 UH    0      0        0
eth1
139.130.60.65   0.0.0.0         255.255.255.255 UH    0      0        0
ppp0
203.44.224.112  0.0.0.0         255.255.255.252 U     0      0        0
eth0
202.129.91.244  0.0.0.0         255.255.255.252 U     0      0        0
eth1
202.129.91.244  0.0.0.0         255.255.255.252 U     0      0        0
ipsec0
192.168.42.0    0.0.0.0         255.255.255.0   U     0      0        0
eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         172.24.158.129  0.0.0.0         UG    0      0        0
eth1


-- 
Howard.
LANNet Computing Associates - Your Linux people
Contact detail at http://www.lannetlinux.com
 "I believe that forgiving them [terrorists] is God's function.
 Our job is simply to arrange the meeting."
   - General "Storm'n" Norman Schwartzkopf

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to