[strongSwan] new to strongswan and couldn't establish a connection
Spacelee
fjctlzy at gmail.com
Wed Jan 19 16:34:58 CET 2011
this is the first time I try strongswan, and I couldn't establish a
connection, here is the configuration file :
server : centos 5.5 64 bit
strongswan : newest
client : mac os
ipsec.conf :
config setup
# crlcheckinterval=600
# strictcrlpolicy=yes
# cachecrls=yes
nat_traversal=yes
charonstart=yes
plutostart=yes
conn L2TP
authby=psk
pfs=no
rekey=no
type=tunnel
left=192.168.1.97
leftnexthop=%defaultroute
leftprotoport=17/1701
right=%any
rightprotoport=17/%any
rightsubnetwithin=0.0.0.0/0
auto=add
xl2tpd.conf
[global]
debug network = yes
debug tunnel = yes
[lns default]
ip range = 10.0.0.200-10.0.0.254
local ip = 10.0.0.1
require chap = yes
refuse pap = yes
require authentication = yes
name = NIELSPEEN.COM
ppp debug = yes
pppoptfile = /etc/ppp/options.xl2tpd
length bit = yes
options.xl2tpd
ipcp-accept-local
ipcp-accept-remote
ms-dns 8.8.8.8
noccp
auth
crtscts
idle 1800
mtu 1410
mru 1410
nodefaultroute
debug
lock
proxyarp
connect-delay 5000
ipsec.secrets
192.168.1.97 %any : PSK "testpsk"
and the /var/log/secure
Jan 19 23:31:18 localhost pluto[13051]: listening for IKE messages
Jan 19 23:31:18 localhost pluto[13051]: adding interface eth0/eth0
192.168.1.97:500
Jan 19 23:31:18 localhost pluto[13051]: adding interface eth0/eth0
192.168.1.97:4500
Jan 19 23:31:18 localhost pluto[13051]: adding interface lo/lo 127.0.0.1:500
Jan 19 23:31:18 localhost pluto[13051]: adding interface lo/lo
127.0.0.1:4500
Jan 19 23:31:18 localhost pluto[13051]: adding interface lo/lo ::1:500
Jan 19 23:31:18 localhost pluto[13051]: loading secrets from
"/etc/ipsec.secrets"
Jan 19 23:31:18 localhost pluto[13051]: loaded PSK secret for 192.168.1.97
%any
Jan 19 23:31:18 localhost ipsec_starter[13050]: charon (13069) started after
20 ms
Jan 19 23:31:18 localhost pluto[13051]: added connection description "L2TP"
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
received Vendor ID payload [RFC 3947]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
received Vendor ID payload [Dead Peer Detection]
Jan 19 23:31:25 localhost pluto[13051]: packet from 192.168.1.102:500:
initial Main Mode message received on 192.168.1.97:500 but no connection has
been authorized with policy=PSK
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
received Vendor ID payload [RFC 3947]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
received Vendor ID payload [Dead Peer Detection]
Jan 19 23:31:28 localhost pluto[13051]: packet from 192.168.1.102:500:
initial Main Mode message received on 192.168.1.97:500 but no connection has
been authorized with policy=PSK
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
received Vendor ID payload [RFC 3947]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
received Vendor ID payload [Dead Peer Detection]
Jan 19 23:31:31 localhost pluto[13051]: packet from 192.168.1.102:500:
initial Main Mode message received on 192.168.1.97:500 but no connection has
been authorized with policy=PSK
--
*Space Lee*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20110119/bde367ad/attachment.html>
More information about the Users
mailing list