> А покажите что у вас в это время выводят:
> setkey -DP

# setkey -DP
192.168.44.0/24[any] 192.168.58.0/24[any] any
        in ipsec
        esp/tunnel/10.7.0.12-10.7.0.41/unique:1
        created: Apr 28 11:18:06 2015  lastused: Apr 28 11:18:07 2015
        lifetime: 9223372036854775807(s) validtime: 0(s)
        spid=30 seq=1 pid=1163
        refcnt=1
192.168.58.0/24[any] 192.168.44.0/24[any] any
        out ipsec
        esp/tunnel/10.7.0.41-10.7.0.12/unique:1
        created: Apr 28 11:18:06 2015  lastused: Apr 28 11:18:06 2015
        lifetime: 9223372036854775807(s) validtime: 0(s)
        spid=29 seq=0 pid=1163
        refcnt=1


> setkey -D
# setkey -D
10.7.0.41 10.7.0.12
        esp mode=tunnel spi=3466152788(0xce994b54) reqid=1(0x00000001)
        E: 3des-cbc  bf9ec33d 53859abb 2a2087de 546f7227 ee5afb1e 2922bea7
        A: hmac-sha1  53c494bf 12d12838 9bd58ab4 4077ca67 d8f71d68
        seq=0x00000000 replay=4 flags=0x00000000 state=mature
        created: Apr 28 11:18:06 2015   current: Apr 28 11:18:42 2015
        diff: 36(s)     hard: 3600(s)   soft: 3258(s)
        last:                           hard: 0(s)      soft: 0(s)
        current: 0(bytes)       hard: 0(bytes)  soft: 0(bytes)
        allocated: 0    hard: 0 soft: 0
        sadb_seq=1 pid=1164 refcnt=1
10.7.0.12 10.7.0.41
        esp mode=tunnel spi=3231614895(0xc09e87af) reqid=1(0x00000001)
        E: 3des-cbc  532e220a 301a3006 96daf523 4e08ea9b 0ebfc8f8 5e0ea3ac
        A: hmac-sha1  2e100505 f55bfef6 413a191b d5dae343 563e06e8
        seq=0x00000001 replay=4 flags=0x00000000 state=mature
        created: Apr 28 11:18:06 2015   current: Apr 28 11:18:42 2015
        diff: 36(s)     hard: 3600(s)   soft: 3260(s)
        last: Apr 28 11:18:07 2015      hard: 0(s)      soft: 0(s)
        current: 84(bytes)      hard: 0(bytes)  soft: 0(bytes)
        allocated: 1    hard: 0 soft: 0
        sadb_seq=0 pid=1164 refcnt=1


> sysctl net.enc
# sysctl net.enc
net.enc.out.ipsec_bpf_mask: 3
net.enc.out.ipsec_filter_mask: 1
net.enc.in.ipsec_bpf_mask: 1
net.enc.in.ipsec_filter_mask: 1

> sysctl net.inet.ipsec.filtertunnel
# sysctl net.inet.ipsec.filtertunnel
net.inet.ipsec.filtertunnel: 0



Ответить