Hi, I tried to migrate our Openswan VPN (2.6.21) to Strongswan VPN (4.5.1) on our CentOS 5 server. Openswan package is from official CentOS repository (openswan-2.6.21-5.el5_6.4), Strongswan package have been built from this spec file: http://developer.intra2net.com/git/?p=strongswan-rpm;a=blob_plain;f=strongswan.spec;hb=e2bb0076fce6d44ee80cff4b20d90a0eee1fa689
I slightly modified configuration for IKEv1 keying, ipsec.conf looks like: config setup charonstart=no plutodebug="control" conn %default keyexchange=ikev1 authby=secret conn CONN type=tunnel left=A.A.A.A leftsubnet=192.168.52.0/24 right=B.B.B.B rightsubnet=10.10.0.0/16 auto=start auth=esp ikelifetime=28800s keylife=3600s compress=no ike=3des-sha1-modp1024 esp=3des-sha1 pfs=yes dpddelay=30 dpdtimeout=120 dpdaction=restart Both ISAKMP and IPsec SA were succesfully established, ip xfrm policy output was the same as output from Openswan. But... In tcpdump, I saw incoming ESP traffic from B.B.B.B, but no ESP traffic from our address A.A.A.A. Ping to 10.10.255.1 returned no response, so I think that policies were in place (with turned off VPN, ping returned "host unreachable" from far away gateway). I added "iptables -I FORWARD -j ACCEPT" rule to iptables to rule out problem with firewall. Do you have any idea what can be wrong? Thanks, Regards, Pavel Arnost
_______________________________________________ Users mailing list Users@lists.strongswan.org https://lists.strongswan.org/mailman/listinfo/users