Hi Friends,

I have a Routing and Remote access server inside my LAN.
When I am inside the LAN I am able to successfully connect to the VPN server 
and obtainan IP.
My network is protected on shorewall firewall. I have made enough changes as 
directed in 
http://www.shorewall.net/VPNBasics.html#Zones but 
Jan 31 23:00:59 firewall kernel: Shorewall:wan2allROP:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16463 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:01:03 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16466 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:01:11 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16476 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:01:21 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16480 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:01:31 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16482 DF PROTO=TCP 
SPT=2546 DPT=1723 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 31 23:01:31 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16483 DF PROTO=TCP 
SPT=2546 DPT=1723 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 31 23:01:32 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16485 DF PROTO=TCP 
SPT=2546 DPT=1723 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 31 23:01:35 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16489 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:01:36 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16491 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:01:38 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16493 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:01:42 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16495 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 21:48:44 firewall kernel: Shorewall:lan2wan:ACCEPT:IN=eth0 OUT=eth1 
SRC=192.168.1.33 DST=219.65.161.252 LEN=275 TOS=0x0
0 PREC=0x00 TTL=127 ID=60622 PROTO=UDP SPT=137 DPT=137 LEN=255
Jan 31 23:01:50 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16530 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 21:54:16 firewall kernel: Shorewall:wan2allROP:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.
161.252 DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=62419 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:02:39 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=141 TOS=0x00 PREC=0x00 TTL=116 ID=16618 PROTO=UDP 
SPT=1701 DPT=1701 LEN=121
Jan 31 23:02:49 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16659 DF PROTO=TCP 
SPT=2550 DPT=1723 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 31 23:02:50 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16663 DF PROTO=TCP 
SPT=2550 DPT=1723 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 31 23:02:50 firewall kernel: Shorewall:all2all:ACCEPT:IN=eth1 OUT= 
MAC=00:14:85:ac:e5:ee:00:0f:e2:3e:23:99:08:00 SRC=219.65.161.252 
DST=202.53.13.170 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=16665 DF PROTO=TCP 
SPT=2550 DPT=1723 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 31 23:04:30 firewall kernel: Shorewall:fw2wan:ACCEPT:IN= OUT=eth1 
SRC=202.53.13.170 DST=67.15.187.219 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=58025 
DF PROTO=TCP SPT=52993 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 31 23:04:30 firewall kernel: Shorewall:fw2wan:ACCEPT:IN= OUT=eth1 
SRC=202.53.13.170 DST=67.15.187.219 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=63330 
DF PROTO=TCP SPT=52994 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0

Eventhough I have configured as directed above some or the other policy is 
making me drop packets on firewall..

Any help suggested is highly helpfull . I have tried directly port forwarding 
the port 1723 also.. but no use .. its connecting but packets are not going out 
of the network..

Surprisingly , another VPN client machine is successfully connecting to a VPN 
server..
Do VPN port numbers differ from VPN type to type (i mean vendor specific or 
opensource).. isnt there any standard protocol for VPNs..?

Thank you
Mahen


Reply via email to