-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello Luka,

What other rules do you have in the POSTROUTING chain? If any other rule 
removes the packets from the chain, then they don't reach the MASQUERADE rule 
and hence
won't get masqueraded.

The rule basicly says: If the traffic is going out on the eth0 interface and 
the source is 10.0.0.0/24 and the destination ist 0.0.0.0/0, then masquerade it.
Masquerade basicly means NAT, but it will replace the source IP of the traffic 
based on the interface it's going out.
No, the parameters that are displayed in the first couple of columns are just 
filters that restrict traffic going to the target.
For further clarification, I recomment you read the manpage for iptables and 
iptables-extensions (if the latter exists on your system. It does on Arch 
Linux.).
For your setup, I recomment you ommit -o eth0 and INSERT, and not APPEND the 
rule to the chain.
Example: iptables -I POSTROUTING 1 -s 10.0.0.0/24 -j MASQUERADE

Regards
Noel Kuntze

On 10.11.2013 16:31, Luka wrote:
>
> Hi Noel.
>
> Still no luck.
>
> I’ve added masquerade, following line is added to nat iptable:
>
> Chain POSTROUTING (policy ACCEPT 2500 packets, 221K bytes)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
> …
>
> 4        0     0 MASQUERADE  all  --  *      eth0    10.0.0.0/24 
> <http://10.0.0.0/24>          0.0.0.0/0 <http://0.0.0.0/0>
>
>
> What exactly does this masquerade record means ? Probably that all packets 
> from 10.0.0.0/24 <http://10.0.0.0/24> network that have any(0.0.0.0) 
> destination will get IP address of eth0 device ?
>
> But eth0 is device with external IP of server (86.58.x.x) (see ifconfig 
> output below), should I use br0 device here (the one with local IP of router) 
> ?
>
>
> Ok, if I sum up my situation:
>
> CLIENT(iPhone):
>
> - I can connect to IPsec(strongswan)
>
> - gets virtual IP Address: 10.0.0.2
>
>
> SERVER (strongswan v5.0.4, on my router, Linux 2.6.22.19):
>
> - local IP: 192.168.2.1
>
> - external IP 86.58.x.x
>
> ipsec statusall:
>
> Virtual IP pools (size/online/offline):
>
>   10.0.0.2 <http://10.0.0.2>: 1/1/0
>
> Listening IP addresses:
>
>   86.58.x.x
>
>   192.168.2.1
>
>
> Security Associations (1 up, 0 connecting):
>
>          ios[2]: ESTABLISHED 19 seconds ago, 86.58.x.x[C=SI, O=Lupo, 
> CN=86.58.x.x]…46.123.x.x[C=SI, O=Lupo, CN=clientLupo]
>
>          ios[2]: Remote XAuth identity: lupo
>
>          ios[2]: IKEv1 SPIs: cd789eae5d666586_i 638f1ca174f85726_r*, public 
> key reauthentication in 2 hours
>
>          ios[2]: IKE proposal: 
> AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
>
>          ios{1}:  INSTALLED, TUNNEL, ESP SPIs: c7f2d740_i 0829cc4a_o
>
>          ios{1}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 
> 45 minutes
>
>          ios{1}:   0.0.0.0/0 <http://0.0.0.0/0> === 10.0.0.2/32 
> <http://10.0.0.2/32>
>
>
> iptables:
>
> This entries are added to FORWARD chain after I connect to server:
>
>
> Chain FORWARD (policy DROP 0 packets, 0 bytes)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
> 1        0     0 ACCEPT     all  --  eth0   *       10.0.0.2             
> 0.0.0.0/0 <http://0.0.0.0/0>           policy match dir in pol ipsec reqid 2 
> proto 50
>
> 2        0     0 ACCEPT     all  --  *      eth0    0.0.0.0/0 
> <http://0.0.0.0/0>            10.0.0.2            policy match dir out pol 
> ipsec reqid 2 proto 50
>
>
> iptables(nat table):
>
> Chain PREROUTING (policy ACCEPT 4188 packets, 599K bytes)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
> 1        1    60 ACCEPT     tcp  --  *      *       0.0.0.0/0 
> <http://0.0.0.0/0>            0.0.0.0/0 <http://0.0.0.0/0>           tcp 
> dpt:1194
>
> 2      305 54089 VSERVER    all  --  *      *       0.0.0.0/0 
> <http://0.0.0.0/0>            86.58.x.x      
>
>
> Chain POSTROUTING (policy ACCEPT 2500 packets, 221K bytes)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
> 1        0     0 MASQUERADE  all  --  *      tun11   192.168.2.0/24 
> <http://192.168.2.0/24>       0.0.0.0/0 <http://0.0.0.0/0>          
>
> 2      731 46984 MASQUERADE  all  --  *      eth0   !86.58.x.x            
> 0.0.0.0/0 <http://0.0.0.0/0>          
>
> 3        0     0 MASQUERADE  all  --  *      *       0.0.0.0/0 
> <http://0.0.0.0/0>            0.0.0.0/0 <http://0.0.0.0/0>           MARK 
> match 0xd001
>
> 4        0     0 MASQUERADE  all  --  *      eth0    10.0.0.0/24 
> <http://10.0.0.0/24>          0.0.0.0/0 <http://0.0.0.0/0>          
>
>
> Chain OUTPUT (policy ACCEPT 2489 packets, 220K bytes)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
>
> Chain LOCALSRV (0 references)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
>
> Chain VSERVER (1 references)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
> 1        1   123 DNAT       tcp  --  *      *       0.0.0.0/0 
> <http://0.0.0.0/0>            0.0.0.0/0 <http://0.0.0.0/0>           tcp 
> dpt:1184 to:192.168.2.100:1194 <http://192.168.2.100:1194>
>
> 2        0     0 DNAT       udp  --  *      *       0.0.0.0/0 
> <http://0.0.0.0/0>            0.0.0.0/0 <http://0.0.0.0/0>           udp 
> dpt:1184 to:192.168.2.100:1194 <http://192.168.2.100:1194>
>
> 3      304 53966 VUPNP      all  --  *      *       0.0.0.0/0 
> <http://0.0.0.0/0>            0.0.0.0/0 <http://0.0.0.0/0>          
>
>
> Chain VUPNP (1 references)
>
> num   pkts bytes target     prot opt in     out     source               
> destination        
>
>
> Chain YADNS (0 references)
>
> num   pkts bytes target     prot opt in     out     source               
> destination
>
>
>
> ifconfig:
>
> br0        Link encap:Ethernet  HWaddr 30:85:A9:E6:EF:A0 
>
>            inet addr:192.168.2.1  Bcast:192.168.2.255  Mask:255.255.255.0
>
>            UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>
>            RX packets:20577 errors:0 dropped:0 overruns:0 frame:0
>
>            TX packets:16212 errors:0 dropped:0 overruns:0 carrier:0
>
>            collisions:0 txqueuelen:0
>
>            RX bytes:7597057 (7.2 MiB)  TX bytes:2892960 (2.7 MiB)
>
>
> eth0       Link encap:Ethernet  HWaddr 30:85:A9:E6:EF:A0 
>
>            inet addr:86.58.x.x  Bcast:86.58.y.y  Mask:255.255.255.0
>
>            UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>
>            RX packets:665392 errors:0 dropped:0 overruns:0 frame:0
>
>            TX packets:1473423 errors:0 dropped:0 overruns:0 carrier:0
>
>            collisions:0 txqueuelen:1000
>
>            RX bytes:83612848 (79.7 MiB)  TX bytes:1996770618 (1.8 GiB)
>
>            Interrupt:4 Base address:0x2000
>
> ...
>
> btw, should tunnel, that is created by strongswan, appear in this ifconfig 
> list ?
>
>
> I’m probably missing another piece of puzzle.
>
> Is there any other log file except strongswan log, that should I examine ?
>
>
> Thanks
>
> Luka
>
>
>
> On Sun, Nov 10, 2013 at 3:38 PM, Noel Kuntze <n...@familie-kuntze.de 
> <mailto:n...@familie-kuntze.de>> wrote:
>
>
> Sorry, it is "iptables -A POSTROUTING -t nat -s 10.0.0.0/24 
> <http://10.0.0.0/24> -o eth0 -j MASQUERADE"
> On 10.11.2013 15:05, Noel Kuntze wrote:
>
> > Hello Luka,
>
> > You need to masquerade the traffic from your iPhone to the LAN or the 
> > internet.
> > You do this with either the MASQUERADE or the SNAT target in iptables.
> > Example: iptables -A FORWARD -t nat -s 10.0.0.0/24 <http://10.0.0.0/24> -o 
> > eth0 -j MASQUERADE
>
> > Regards
> > Noel Kuntze
>
> > On 10.11.2013 11:50, Luka wrote:
> > > Hi.
> > > I've found way to fix that error: "iptables: No chain/target/match by 
> > > that name" by executing command:
>
> > > insmod xt_policy
>
>
> > > Now when I connect, iPhone gets IP 10.0.0.2 and following policy is added 
> > > to FORWARD chain:
>
> > > Chain FORWARD (policy DROP 0 packets, 0 bytes)
>
> > > num   pkts bytes target     prot opt in     out     source               
> > > destination
>
> > > 1        0     0 ACCEPT     all  --  eth0   *       10.0.0.2             
> > > 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0>           policy match 
> > > dir in pol ipsec reqid 1 proto 50
>
> > > 2        0     0 ACCEPT     all  --  *      eth0    0.0.0.0/0 
> > > <http://0.0.0.0/0> <http://0.0.0.0/0>            10.0.0.2            
> > > policy match dir out pol ipsec reqid 1 proto 50
>
>
> > > I'm using config:
>
> > > conn %default
>
> > >         keyexchange=ikev1                                          Read 
> > > the manpage for it
>
> > >         authby=xauthrsasig
>
> > >         xauth=server
>
>
>
> > > #leftid = subject alt. name (v certifikatu)
>
> > > conn ios
>
> > >        left=%defaultroute
>
> > >        leftsubnet=0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >        leftcert=serverCert.pem
>
> > >        leftfirewall=yes
>
> > But I still can't access my LAN (192.168.2.0/24 <http://192.168.2.0/24>) or 
> > ping router 192.168.2.1 or ping phone virtual IP 10.0.0.2.
>
> > I've no idea what else should I try. I give up.
>
> > >        right=%any
>
> > >        rightsubnet=10.0.0.0/24 <http://10.0.0.0/24> <http://10.0.0.0/24>
>
> > >        rightsourceip=10.0.0.2
>
> > >        auto=add
>
> > >        rightcert=clientCert.pem
>
>
>
> > > But I still can't access my LAN (192.168.2.0/24 <http://192.168.2.0/24> 
> > > <http://192.168.2.0/24>) or ping router 192.168.2.1 or ping phone virtual 
> > > IP 10.0.0.2.
>
> > > I've no idea what else should I try. I give up.
>
>
> > > L
>
>
>
>
> > > On Thu, Nov 7, 2013 at 11:05 PM, Noel Kuntze <n...@familie-kuntze.de 
> > > <mailto:n...@familie-kuntze.de> <mailto:n...@familie-kuntze.de 
> > > <mailto:n...@familie-kuntze.de>>> wrote:
>
>
> > > Hello Luka,
>
> > > I actually meant the config which you created after I sent you that link 
> > > [1].
> > > I don't know exactly why there are retransmits happening, but in general, 
> > > the setup should work.
>
> > > [1] 
> > > http://wiki.strongswan.org/projects/strongswan/wiki/ForwardingAndSplitTunneling
>
> > > Regards
> > > Noel Kuntze
>
> > > On 07.11.2013 23:03, Luka wrote:
> > >> Ok I've switched back to following configuration and I can connect to 
> > >> VPN again (back to beginning, can connect but can't access LAN behind 
> > >> VPN):
>
> > >> conn %default
>
> > >>         keyexchange=ikev1
>
> > >>         authby=xauthrsasig
>
> > >>         xauth=server
>
>
>
> > >> conn ios
>
> > >>        left=86.xx.xx.x35
>
> > >>        leftcert=serverLupoCert.pem
>
> > >>        leftsubnet=192.168.2.0/24 <http://192.168.2.0/24> 
> > >> <http://192.168.2.0/24> <http://192.168.2.0/24>
>
> > >>        leftfirewall=yes
>
> > >>        right=%any
>
> > >>        rightsourceip=10.3.0.1
>
> > >>        auto=add
>
> > >>        rightcert=clientLupoCert.pem
>
>
> > >> Do I have to put server's WAN Ip address for "left" or local IP ?
>
> > >> Configuration is simmilar to this 
> > >> one:http://www.strongswan.org/uml/testresults/ikev1/xauth-id-rsa-config/index.html.
> > >> I've checked iptables -L command on that site 
> > >> <http://www.strongswan.org/uml/testresults/ikev1/xauth-id-rsa-config/moon.iptables>
> > >>  and compared it with mine.
> > >> It looks like mine is missing some forwarding rules.
> > >> Mine:
>
> > >> iptables -L -v -n --line-numbers
>
> > >> Chain INPUT (policy ACCEPT 109K packets, 9709K 
> > >> bytes)http://wiki.strongswan.org/projects/strongswan/wiki/ForwardingAndSplitTunneling
>
> > >> num   pkts bytes target     prot opt in     out     source               
> > >> destination
>
> > >> 1      236 31088 ACCEPT     esp  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >> 2        0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     udp dpt:4500
>
> > >> 3      196 68288 ACCEPT     udp  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     udp dpt:500
>
> > >> 4        0     0 ACCEPT     all  --  tun21  *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >> 5     1138  105K ACCEPT     tcp  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     tcp dpt:1194
>
> > >> 6        0     0 ACCEPT     all  --  tun11  *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
>
> > >> Chain FORWARD (policy DROP 0 packets, 0 bytes)
>
> > >> num   pkts bytes target     prot opt in     out     source               
> > >> destination
>
> > >> 1        0     0 ACCEPT     esp  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >> 2        0     0 ACCEPT     all  --  tun21  *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >> 3        5   344 ACCEPT     all  --  tun11  *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >> 4    22028 1928K ACCEPT     all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     state RELATED,ESTABLISHED
>
> > >> 5        0     0 logdrop    all  --  !br0   eth0    0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >> 6       28  1432 logdrop    all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     state INVALID
>
> > >> 7        0     0 ACCEPT     all  --  br0    br0     0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
> > >> 8     1344 80640 ACCEPT     all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     ctstate DNAT
>
> > >> 9    32811 2190K ACCEPT     all  --  br0    *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
>
> > >> Chain OUTPUT (policy ACCEPT 109K packets, 19M bytes)
>
> > >> num   pkts bytes target     prot opt in     out     source               
> > >> destination
>
> > >> 1        0     0 ACCEPT     esp  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
>
> > >> Chain FUPNP (0 references)
>
> > >> num   pkts bytes target     prot opt in     out     source               
> > >> destination
>
>
> > >> Chain PControls (0 references)
>
> > >> num   pkts bytes target     prot opt in     out     source               
> > >> destination
>
> > >> 1        0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
>
> > >> Chain logaccept (0 references)
>
> > >> num   pkts bytes target     prot opt in     out     source               
> > >> destination
>
> > >> 1        0     0 LOG        all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     state NEW LOG flags 7 level 4 prefix `ACCEPT '
>
> > >> 2        0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
>
> > >> Chain logdrop (2 references)
>
> > >> num   pkts bytes target     prot opt in     out     source               
> > >> destination
>
> > >> 1        0     0 LOG        all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>       
> > >>     state NEW LOG flags 7 level 4 prefix `DROP'
>
> > >> 2       28  1432 DROP       all  --  *      *       0.0.0.0/0 
> > >> <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>            
> > >> 0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
>
>
> > >> If I understand "leftfirewall=yes" command, it should put those rules 
> > >> into iptables.
>
> > >> I've checked charon log file and found this error:
>
> > >> cat strongswancharon.log | grep iptables
>
> > >> Nov  7 22:59:06 11[CFG]   leftupdown=ipsec _updown iptables
>
> > >> Nov  7 22:59:26 12[CHD] updown: iptables: No chain/target/match by that 
> > >> name
>
> > >> Nov  7 22:59:26 12[CHD] updown: iptables: No chain/target/match by that 
> > >> name
>
>
> > >> Am I missing some modules here or something ?
>
> > >> How can I get/log those commands for iptables, that strongswan executes ?
>
>
> > >> Thanks.
>
>
>
> > >> On Thu, Nov 7, 2013 at 6:25 PM, Noel Kuntze <n...@familie-kuntze.de 
> > >> <mailto:n...@familie-kuntze.de> <mailto:n...@familie-kuntze.de 
> > >> <mailto:n...@familie-kuntze.de>> <mailto:n...@familie-kuntze.de 
> > >> <mailto:n...@familie-kuntze.de> <mailto:n...@familie-kuntze.de 
> > >> <mailto:n...@familie-kuntze.de>>>> wrote:
>
>
> > >> Hello Luka,
>
> > >> Your former configuration worked just fine. The problem was with the 
> > >> network or similiar. It had nothing to do with strongSwan.
>
> > >> Regards
> > >> Noel Kuntze
>
> > >> On 07.11.2013 10:51, Luka wrote:
> > >>> Now I've tried to load modules by hand. I've added following line to 
> > >>> strongswan.conf:
> > >>> load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 
> > >>> revocation hmac xcbc stroke kernel-netlink socket-default updown 
> > >>> resolve attr farp xauth-generic
>
> > >>> And if I check charon logs, it looks like it connects and then 
> > >>> immediately disconnects from vpn.
> > >>> Here are interesting lines from log file, (I connect with iphone and 
> > >>> get "Negotiation with the VPN server failed":
>
> > >>> ...
> > >>> Nov  7 10:31:12 14[CFG]   id '<server.wan.ip>' not confirmed by 
> > >>> certificate, defaulting to 'C=SI, O=Hlupo, CN=clientLupo'
> > >>> ...
> > >>> Nov  7 10:31:12 14[CFG]   id '%any' not confirmed by certificate, 
> > >>> defaulting to 'C=SI, O=Hlupo, CN=<server.wan.ip>'
> > >>> ...
> > >>> Nov  7 10:31:12 14[CFG] left is other host, swapping ends
> > >>> ...
> > >>> Nov  7 10:13:55 04[IKE] IKE_SA (unnamed)[1] state change: CREATED => 
> > >>> CONNECTING
> > >>> ...
> > >>> Nov  7 10:13:56 05[IKE] remote host is behind NAT
> > >>> ...
> > >>> Nov  7 10:13:57 11[IKE] XAuth authentication of 'lupo' successful
> > >>> ...
> > >>> Nov  7 10:13:57 12[IKE] IKE_SA ios[1] state change: CONNECTING => 
> > >>> ESTABLISHED
> > >>> ...
> > >>> Nov  7 10:13:57 12[IKE] peer requested virtual IP %any
> > >>> Nov  7 10:13:57 12[IKE] no virtual IP found for %any requested by 'lupo'
> > >>> ...
> > >>> Nov  7 10:14:13 05[ENC] parsing HASH_V1 payload finished
> > >>> Nov  7 10:14:13 05[ENC] parsing DELETE_V1 payload, 40 bytes left
> > >>> ...
> > >>> Nov  7 10:14:13 05[ENC] parsing DELETE_V1 payload finished
> > >>> ...
> > >>> Nov  7 10:14:13 05[IKE] IKE_SA ios[1] state change: ESTABLISHED => 
> > >>> DELETING
> > >>> Nov  7 10:14:13 05[MGR] checkin and destroy IKE_SA ios[1]
> > >>> Nov  7 10:14:13 05[IKE] IKE_SA ios[1] state change: DELETING => 
> > >>> DESTROYING
> > >>> Nov  7 10:14:13 05[MGR] check-in and destroy of IKE_SA successful
> > >>> Nov  7 10:14:13 02[NET] waiting for data on sockets
> > >>> Nov  7 10:14:25 15[JOB] got event, queuing job for execution
> > >>> Nov  7 10:14:25 15[JOB] next event in 9732s 760ms, waiting
> > >>> Nov  7 10:14:25 06[MGR] checkout IKE_SA
>
> > >>> Should I put something else instead of "right=%any" ?
>
>
>
>
>
>
>
>
>
> > _______________________________________________
> > Users mailing list
> > Users@lists.strongswan.org <mailto:Users@lists.strongswan.org>
> > https://lists.strongswan.org/mailman/listinfo/users
>
>
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=uJPU
-----END PGP SIGNATURE-----


_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to