Hi again,

Please forgot, the tunnel was established with the network activity and not automatically as I´m thinking.

Last question: The IPSec tunnel uses compression?



System logs:

Mar 30 14:15:36 racoon: INFO: IPsec-SA established: ESP/Tunnel 200.xx.93.210[0]->201.xxx.20.10[0] spi=211026278(0xc940166) Mar 30 14:15:36 racoon: INFO: IPsec-SA established: ESP/Tunnel 201.xxx.20.10[0]->200.xx.93.210[0] spi=41172309(0x2743d55) Mar 30 14:15:35 racoon: INFO: respond new phase 2 negotiation: 200.xx.93.210[500]<=>201.xxx.20.10[500] Mar 30 14:15:35 racoon: INFO: ISAKMP-SA established 200.xx.93.210[500]-201.xxx.20.10[500] spi:c37181d85b7fa623:2716c4c16889f544 Mar 30 14:15:35 racoon: NOTIFY: couldn't find the proper pskey, try to get one by the peer's address.
Mar 30 14:15:35         racoon: INFO: received Vendor ID: DPD
Mar 30 14:15:35         racoon: INFO: begin Aggressive mode.
Mar 30 14:15:35 racoon: INFO: respond new phase 1 negotiation: 200.xx.93.210[500]<=>201.xxx.20.10[500]


--
Diego

----- Original Message -----
From: "Diego Morato" <[EMAIL PROTECTED]>
To: "Support PfSense" <support@pfsense.com>
Sent: Friday, March 30, 2007 2:09 PM
Subject: [pfSense Support] IPSec connection problem

Hi,

I have two pfsense and trying to do a IPsec tunnel, however I´m having no sucess. The two points have static IP´s and first I used the default options of the webgui. After I´m followed this doc: http://doc.m0n0.ch/handbook/ipsec-tunnels.html.
   Is there something that need to be allowed in the Firewall: Rules?

System:

1.0.1-SNAPSHOT-03-15-2007
built on Fri Mar 23 05:07:13 EDT 2007

IPsec logs:

Mar 30 13:57:05 racoon: WARNING: setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument Mar 30 13:57:05 racoon: INFO: 201.xxx.20.10[500] used as isakmp port (fd=21) Mar 30 13:57:05 racoon: INFO: fe80::204:acff:fe39:aabf%fxp0[500] used as isakmp port (fd=20) Mar 30 13:57:05 racoon: WARNING: setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument Mar 30 13:57:05 racoon: INFO: 192.xxx.1.71[500] used as isakmp port (fd=19) Mar 30 13:57:05 racoon: INFO: fe80::201:3ff:fec1:9736%xl0[500] used as isakmp port (fd=18) Mar 30 13:57:05 racoon: WARNING: setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument Mar 30 13:57:05 racoon: INFO: 200.xxx.4.75[500] used as isakmp port (fd=17) Mar 30 13:57:05 racoon: INFO: fe80::210:5aff:fea7:c137%xl1[500] used as isakmp port (fd=16) Mar 30 13:57:05 racoon: WARNING: setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 30 13:57:05 racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=15)
Mar 30 13:57:05 racoon: INFO: ::1[500] used as isakmp port (fd=14)
Mar 30 13:57:05 racoon: INFO: fe80::1%lo0[500] used as isakmp port (fd=13)
Mar 30 13:57:05 racoon: INFO: @(#)This product linked OpenSSL 0.9.7e-p1 25 Oct 2004 (http://www.openssl.org/) Mar 30 13:57:05 racoon: INFO: @(#)ipsec-tools 0.6.6 (http://ipsec-tools.sourceforge.net)


Thanks

--
Diego



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to