Tibbs, Richard wrote:

Well, the win2000pro machine is up to service pack 4, and the ipsec
section of the Bering user's guide says it needs at least service pack
2..  I will check microsquish for any missing patches.

It is "not possible" to move my win2000 machine across the router,
because I am at work. And I suspect the routing issue is the key here. There seems to be no syntax in the ipsec.conf file :-( as there is in
the shorewall files :-) -- thanks very much to whoever did that.
I googled for ipsec and found the ipsec man page, but the link to
ipsec.conf is broken.
Went to freeswan.org, but couldn't find much there on ipsec.conf itself.


Can anyone point me to syntax to replace the interfaces=%defaultroute
parameter?
Can I just say interfaces=<win2khost IP addr> ?
Thanks in advance >>> Rick.

I've got slightly dated versions (1.91 and earlier) online at my site...it's not the exact version used with Bering, but most details still apply verbatim (the newer versions are usually supersets of the older config file formats):


http://lrp2.steinkuehler.net/Packages/man/IPSec1.91/index.html
http://lrp2.steinkuehler.net/Packages/man/IPSec1.91/manpage.d/ipsec.conf.5.html

Looks like either explicitly specifying the IP and next hop settings, or using %direct for nexthop should work with directly connected box...

PS:
I think the defaultroute issue may solve this because, "while you were
out" I tried another tack:
Chad Carr's setup was to route ALL traffic through the FW, so since I am
only interested in contacting the internal subnet 192.168.10.0/24, I
changed the endpoints in the Outbound -> destination ip from Any to specific subnet above, and
Inbound -> source ip from Any to specifig subnet above.


Now, I still get 100% packet loss: ======================== cmd window.. ================
C:\>ping 192.168.10.13


Pinging 192.168.10.13 with 32 bytes of data:

Negotiating IP Security.
Negotiating IP Security.
Negotiating IP Security.
Negotiating IP Security.

Ping statistics for 192.168.10.13:
    Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum =  0ms, Average =  0ms
========================== cmd window output ==============

The auth.log appears to have lost the problem with "cannot respond to
IPsec SA request because no connection is known for
0.0.0.0/0===137.45.192.69...137.45.192.86" Here is a snip:


Jul 13 13:49:48 firewall pluto[5895]: packet from 137.45.192.86:500:
ignoring Ve
ndor ID payload [MS NT5 ISAKMPOAKLEY 00000002]
Jul 13 13:49:48 firewall pluto[5895]: "road-warrior"[4] 137.45.192.86
#6: respon
ding to Main Mode from unknown peer 137.45.192.86
Jul 13 13:49:48 firewall pluto[5895]: "road-warrior"[4] 137.45.192.86
#6: Main m
ode peer ID is ID_IPV4_ADDR: '137.45.192.86'
Jul 13 13:49:48 firewall pluto[5895]: "road-warrior"[4] 137.45.192.86
#6: sent M
R3, ISAKMP SA established
Jul 13 13:49:48 firewall pluto[5895]: "road-warrior"[4] 137.45.192.86
#7: respon
ding to Quick Mode
Jul 13 13:49:48 firewall pluto[5895]: "road-warrior"[4] 137.45.192.86
#7: IPsec
SA established

When the SA is established but no data gets through, it's time to make sure you're allowing protocol 50 (ESP) and/or 51 (AH) thorugh your firewall (or using NAT traversal which uses UDP port 500 for all traffic, not just keying exchanges).


--
Charles Steinkuehler
[EMAIL PROTECTED]


-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 - digital self defense, top technical experts, no vendor pitches, unmatched networking opportunities. Visit www.blackhat.com
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to