Salut 

folosesc PGPnet 7.0.4 Road Warrior( w2k)  cu Frees/Wan 1.92 ( RedHat 7.1 - 2.4.16 ) 
In momentul cand ma conectez la IP-ul unde fac VPN-ul ( Secure GW ) totul merge ok 
...insa cand ma deconectez 
 scriptul "_updown" nu imi sterge ruta adaugata pe dev "ipsec0" astfel incat userul 
mobil nu mai poate accesa SGw ( serverul VPN) 
decit daca sterg manual acesta ruta.Ideea e ca trebuia ca scriptul "_updown" sa 
functioneze ..iar mie nu imi functioneaza .  

Ati lucrat cu asa ceva ?? In caz ca da dati-mi si mie va rog ceva idei ...

Multumesc
____________________________________________________________________
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.1.5    192.168.1.5   255.255.255     UHG .........................ipsec0
172.16.1.0      0.0.0.0         255.255.255.248 U     0      0        0 eth0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 eth1
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 ipsec0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         192.168.1.11    0.0.0.0         UG    0      0        0 eth1
________________________________________________________________________________
after that I delete the route : route del 192.168.1.5 gw 192.168.1.5 dev ipsec0 and 
all is OK !!!!
_____________________________________________________________________________________



I will show my configuration :

_________________________________________________________________________________________________________________
syslog
Tue Apr 16 16:16:40 EEST 2002
+ _________________________ version
+ ipsec --version
Linux FreeS/WAN 1.92
See `ipsec --copyright' for copyright information.
+ _________________________ proc/version
+ cat /proc/version
Linux version 2.4.16 (root@syslog) (gcc version 2.96 20000731 (Red Hat Linux 7.1 
2.96-81)) #1 SMP Mon Apr 15 12:24:11 EEST 200
2
+ _________________________ proc/net/ipsec_eroute
+ sort +1 /proc/net/ipsec_eroute
+ _________________________ proc/net/ipsec_spi
+ cat /proc/net/ipsec_spi
+ _________________________ proc/net/ipsec_spigrp
+ cat /proc/net/ipsec_spigrp
+ _________________________ netstart-rn
+ netstat -nr
Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
172.16.1.0      0.0.0.0         255.255.255.248 U        40 0          0 eth0
192.168.1.0     0.0.0.0         255.255.255.0   U        40 0          0 eth1
192.168.1.0     0.0.0.0         255.255.255.0   U        40 0          0 ipsec0
127.0.0.0       0.0.0.0         255.0.0.0       U        40 0          0 lo
0.0.0.0         192.168.1.11    0.0.0.0         UG       40 0          0 eth1
+ _________________________ proc/net/ipsec_tncfg
+ cat /proc/net/ipsec_tncfg
ipsec0 -> eth1 mtu=16260(1500) -> 1500
ipsec1 -> NULL mtu=0(0) -> 0
ipsec2 -> NULL mtu=0(0) -> 0
ipsec3 -> NULL mtu=0(0) -> 0
+ _________________________ proc/net/pf_key
+ cat /proc/net/pf_key
    sock   pid   socket     next     prev e n p sndbf    Flags     Type St
c60a60a0 20263 c48c33a0        0        0 0 0 2 65535 00000000        3  1
+ _________________________ proc/net/pf_key-star
+ cd /proc/net
+ egrep '^' pf_key_registered pf_key_supported
pf_key_registered:satype   socket   pid       sk
pf_key_registered:     2 c48c33a0 20263 c60a60a0
pf_key_registered:     3 c48c33a0 20263 c60a60a0
pf_key_registered:     9 c48c33a0 20263 c60a60a0
pf_key_registered:    10 c48c33a0 20263 c60a60a0
pf_key_supported:satype exttype alg_id ivlen minbits maxbits
pf_key_supported:     2      14      3     0     160     160
pf_key_supported:     2      14      2     0     128     128
pf_key_supported:     3      15      3   128     168     168
pf_key_supported:     3      14      3     0     160     160
pf_key_supported:     3      14      2     0     128     128
pf_key_supported:     9      15      1     0      32      32
pf_key_supported:    10      15      2     0       1       1
+ _________________________ proc/sys/net/ipsec-star
+ cd /proc/sys/net/ipsec
+ egrep '^' debug_ah debug_eroute debug_esp debug_ipcomp debug_netlink debug_pfkey 
+debug_radij debug_rcv debug_spi debug_tunn
l debug_verbose debug_xform icmp inbound_policy_check tos
debug_ah:0
debug_eroute:0
debug_esp:0
debug_ipcomp:0
debug_netlink:0
debug_pfkey:0
debug_radij:0
debug_rcv:0
debug_spi:0
debug_tunnel:0
debug_verbose:0
debug_xform:0
icmp:0
inbound_policy_check:1
tos:1
+ _________________________ ipsec/status
+ ipsec auto --status
000 interface ipsec0/eth1 192.168.1.4
000
000
+ _________________________ ifconfig-a
+ ifconfig -a
eth0      Link encap:Ethernet  HWaddr 00:A0:24:4A:6A:1E
          inet addr:172.16.1.1  Bcast:172.16.1.7  Mask:255.255.255.248
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100
          Interrupt:11 Base address:0x2400

eth1      Link encap:Ethernet  HWaddr 00:A0:24:4A:5C:8D
          inet addr:192.168.1.4  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:438833 errors:0 dropped:0 overruns:0 frame:0
          TX packets:85104 errors:0 dropped:0 overruns:0 carrier:0
          collisions:93 txqueuelen:100
          Interrupt:11 Base address:0x2080

eth2      Link encap:Ethernet  HWaddr 00:60:97:37:49:75
          BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100
          Interrupt:5 Base address:0x220

ipsec0    Link encap:Ethernet  HWaddr 00:A0:24:4A:5C:8D
          inet addr:192.168.1.4  Mask:255.255.255.0
          UP RUNNING NOARP  MTU:16260  Metric:1
          RX packets:255 errors:0 dropped:168 overruns:0 frame:0
          TX packets:94 errors:0 dropped:370 overruns:0 carrier:0
          collisions:0 txqueuelen:10

ipsec1    Link encap:IPIP Tunnel  HWaddr
          inet addr:172.16.1.2  Mask:255.255.255.248
          NOARP  MTU:0  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:10

ipsec2    Link encap:IPIP Tunnel  HWaddr
          NOARP  MTU:0  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:10

ipsec3    Link encap:IPIP Tunnel  HWaddr
          NOARP  MTU:0  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:10

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:5924 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5924 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0

+ _________________________ ipsec/directory
+ ipsec --directory
/usr/local/lib/ipsec
+ _________________________ hostname/fqdn
+ hostname --fqdn
syslog
+ _________________________ hostname/ipaddress
+ hostname --ip-address
127.0.0.1
+ _________________________ uptime
+ uptime
  4:16pm  up 20:40,  4 users,  load average: 0.07, 0.06, 0.01
+ _________________________ ps
+ ps alxw
Warning: /boot/System.map has an incorrect kernel version.
+ egrep -i 'ppid|pluto|ipsec|klips'
  F   UID   PID  PPID PRI  NI   VSZ  RSS WCHAN  STAT TTY        TIME COMMAND
040     0 20261     1   9   0  1936  916 wait4  S    pts/4      0:00 /bin/sh 
/usr/local/lib/ipsec/_plutorun --debug none --uni
queids
040     0 20262 20261   9   0  1936  916 wait4  S    pts/4      0:00 /bin/sh 
/usr/local/lib/ipsec/_plutorun --debug none --uni
queids
100     0 20263 20262   9   0  1820  728 do_sel S    pts/4      0:00 
/usr/local/lib/ipsec/pluto --nofork --debug-none --unique
ids
000     0 20264 20261   8   0  1928  916 pipe_w S    pts/4      0:00 /bin/sh 
/usr/local/lib/ipsec/_plutoload --load %search --
start
000     0 20265     1   9   0  1348  516 pipe_w S    pts/4      0:00 logger -p 
daemon.error -t ipsec__plutorun
000     0 20492 19762   9   0  2120  988 wait4  S    pts/4      0:00 /bin/sh 
/usr/local/sbin/ipsec barf
000     0 20494 20492  10   0  2140 1028 wait4  S    pts/4      0:00 /bin/sh 
/usr/local/lib/ipsec/barf
000     0 20534 20494  10   0  1452  540 pipe_w S    pts/4      0:00 egrep -i 
ppid|pluto|ipsec|klips
+ _________________________ ipsec/showdefaults
+ ipsec showdefaults
#dr: no default route
# no default route
# no default route
+ _________________________ ipsec/conf
+ ipsec _include /etc/ipsec.conf
+ ipsec _keycensor

#< /etc/ipsec.conf 1
config setup
        interfaces="ipsec0=eth1"
        klipsdebug=none
        plutodebug=none
        plutoload=%search
        plutostart=%search
        uniqueids=yes
conn %default
        keyingtries=1
        authby=secret

conn rw_pgp-syslog
     left=192.168.1.4
     leftsubnet=172.16.1.0/29
     right=0.0.0.0
     rightxthop=
     rightsubnet=
     leftupdown=/root/freeswan-1.92/utils/_updown
     pfs=yes
     type=tunnel
     keyingtries=1
     keyexchange=ike
     authby=secret
     auto=add
+ _________________________ ipsec/secrets
+ ipsec _include /etc/ipsec.secrets
+ ipsec _secretcensor

#< /etc/ipsec.secrets 1
192.168.1.4 0.0.0.0: PSK "[sums to dd02...]"
+ _________________________ ipsec/ls-dir
+ ls -l /usr/local/lib/ipsec
total 3020
-rwxr-xr-x    1 root     root        11064 Apr 10 11:34 _confread
-rwxr-xr-x    1 root     root        11064 Apr  9 17:48 _confread.old
-rwxr-xr-x    1 root     root         2163 Apr 10 11:34 _include
-rwxr-xr-x    1 root     root         2163 Apr  9 17:48 _include.old
-rwxr-xr-x    1 root     root         1383 Apr 10 11:34 _keycensor
-rwxr-xr-x    1 root     root         1383 Apr  9 17:48 _keycensor.old
-rwxr-xr-x    1 root     root         3495 Apr 10 11:34 _plutoload
-rwxr-xr-x    1 root     root         3495 Apr  9 17:48 _plutoload.old
-rwxr-xr-x    1 root     root         3500 Apr 10 11:34 _plutorun
-rwxr-xr-x    1 root     root         3500 Apr  9 17:48 _plutorun.old
-rwxr-xr-x    1 root     root         7150 Apr 10 11:34 _realsetup
-rwxr-xr-x    1 root     root         7150 Apr  9 17:48 _realsetup.old
-rwxr-xr-x    1 root     root         1904 Apr 10 11:34 _secretcensor
-rwxr-xr-x    1 root     root         1904 Apr  9 17:48 _secretcensor.old
-rwxr-xr-x    1 root     root         5905 Apr 10 11:34 _startklips
-rwxr-xr-x    1 root     root         5905 Apr  9 17:48 _startklips.old
-rwxr-xr-x    1 root     root         3548 Apr 16 10:17 _updown
-rwxr-xr-x    1 root     root         5174 Apr  9 17:48 _updown.old
-rwxr-xr-x    1 root     root        10707 Apr 10 11:34 auto
-rwxr-xr-x    1 root     root        10707 Apr  9 17:48 auto.old
-rwxr-xr-x    1 root     root         6426 Apr 10 11:34 barf
-rwxr-xr-x    1 root     root         6426 Apr  9 17:48 barf.old
-rwxr-xr-x    1 root     root       212866 Apr 10 11:34 eroute
-rwxr-xr-x    1 root     root         2846 Apr 10 11:34 ipsec
-rwxr-xr-x    1 root     root         2846 Apr  9 17:48 ipsec.old
-rwxr-xr-x    1 root     root       149044 Apr 10 11:34 klipsdebug
-rwxr-xr-x    1 root     root         2437 Apr 10 11:34 look
-rwxr-xr-x    1 root     root         2437 Apr  9 17:48 look.old
-rwxr-xr-x    1 root     root        16172 Apr 10 11:34 manual
-rwxr-xr-x    1 root     root        16172 Apr  9 17:48 manual.old
-rwxr-xr-x    1 root     root         1227 Apr 10 11:34 newhostkey
-rwxr-xr-x    1 root     root         1227 Apr  9 17:48 newhostkey.old
-rwxr-xr-x    1 root     root       746763 Apr 10 11:34 pluto
-rwxr-xr-x    1 root     root       746771 Apr  9 17:48 pluto.old
-rwxr-xr-x    1 root     root        39472 Apr 10 11:34 ranbits
-rwxr-xr-x    1 root     root        39476 Apr  9 17:48 ranbits.old
-rwxr-xr-x    1 root     root        56703 Apr 10 11:34 rsasigkey
-rwxr-xr-x    1 root     root        56707 Apr  9 17:48 rsasigkey.old
lrwxrwxrwx    1 root     root           22 Apr 10 11:34 setup -> /etc/rc.d/init.d/ipsec
-rwxr-xr-x    1 root     root         1041 Apr 10 11:34 showdefaults
-rwxr-xr-x    1 root     root         1041 Apr  9 17:48 showdefaults.old
-rwxr-xr-x    1 root     root         3484 Apr 10 11:34 showhostkey
-rwxr-xr-x    1 root     root         3484 Apr  9 17:48 showhostkey.old
-rwxr-xr-x    1 root     root       233490 Apr 10 11:34 spi
-rwxr-xr-x    1 root     root       189996 Apr 10 11:34 spigrp
-rwxr-xr-x    1 root     root        68087 Apr 10 11:34 tncfg
-rwxr-xr-x    1 root     root       127718 Apr 10 11:34 whack
-rwxr-xr-x    1 root     root       127726 Apr  9 17:48 whack.old
+ _________________________ ipsec/updowns
++ ls /usr/local/lib/ipsec
++ egrep updown
+ cat /usr/local/lib/ipsec/_updown
#! /bin/sh
# default updown script
# Copyright (C) 2000, 2001  D. Hugh Redelmeier, Henry Spencer
#
# This program is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by the
# Free Software Foundation; either version 2 of the License, or (at your
# option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
# or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
# for more details.
#
# RCSID $Id: _updown,v 1.17 2001/08/15 14:37:17 henry Exp $



# CAUTION:  Installing a new version of FreeS/WAN will install a new
# copy of this script, wiping out any custom changes you make.  If
# you need changes, make a copy of this under another name, and customize
# that, and use the (left/right)updown parameters in ipsec.conf to make
# FreeS/WAN use yours instead of this default one.



# check interface version
case "$PLUTO_VERSION" in
1.[0])  # Older Pluto?!?  Play it safe, script may be using new features.
        echo "$0: obsolete interface version \`$PLUTO_VERSION'," >&2
        echo "$0:       called by obsolete Pluto?" >&2
        exit 2
        ;;
1.*)    ;;
*)      echo "$0: unknown interface version \`$PLUTO_VERSION'" >&2
        exit 2
        ;;
esac

# check parameter(s)
case "$*" in
'')     ;;
ipfwadm)        # caused by (left/right)firewall=yes; for default script only
        ;;
*)      echo "$0: unknown parameter \`$1'" >&2
        exit 2
        ;;
esac

 # utility functions for route manipulation
# Meddling with this stuff should not be necessary and requires great care.
uproute() {
#       route add -net $PLUTO_PEER_CLIENT_NET netmask $PLUTO_PEER_CLIENT_MASK \
#               dev $PLUTO_INTERFACE gw $PLUTO_NEXT_HOP
        route add -net $PLUTO_PEER_CLIENT_NET netmask $PLUTO_PEER_CLIENT_MASK \
                dev $PLUTO_INTERFACE gw $LOCAL_WORK_ADDRESS
}
downroute() {
#       route del -net $PLUTO_PEER_CLIENT_NET netmask $PLUTO_PEER_CLIENT_MASK \
#               dev $PLUTO_INTERFACE gw $PLUTO_NEXT_HOP
        route del -net $PLUTO_PEER_CLIENT_NET netmask $PLUTO_PEER_CLIENT_MASK \
                dev $PLUTO_INTERFACE gw $LOCAL_WORK_ADDRESS
}

route-host:*|route-client:*)
        # connection to me or my client subnet being routed
        uproute
        ;;
unroute-host:*|unroute-client:*)
        # connection to me or my client subnet being unrouted
        downroute
        ;;
up-host:*)
        # connection to me coming up
        # If you are doing a custom version, firewall commands go here.
        ;;
down-host:*)
        # connection to me going down
        # If you are doing a custom version, firewall commands go here.
        ;;
up-client:)
        # connection to my client subnet coming up
        # If you are doing a custom version, firewall commands go here.
        ;;
down-client:)
        # connection to my client subnet going down
        # If you are doing a custom version, firewall commands go here.
        ;;
up-client)
        # connection to client subnet, through forwarding firewall, coming up
        ipchains -I forward -j ACCEPT -b \
                -s $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
                -d $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK
        ;;
down-client)
        # connection to client subnet, through forwarding firewall, going down
        ipchains -D forward -j ACCEPT -b \
                -s $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
                -d $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK

        ;;
*)      echo "$0: unknown verb \`$PLUTO_VERB' or parameter \`$1'" >&2
        exit 1
        ;;
esac
+ cat /usr/local/lib/ipsec/_updown.old
#! /bin/sh
# default updown script
# Copyright (C) 2000, 2001  D. Hugh Redelmeier, Henry Spencer
#
# This program is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by the
# Free Software Foundation; either version 2 of the License, or (at your
# option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
# or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
:

# CAUTION:  Installing a new version of FreeS/WAN will install a new
# copy of this script, wiping out any custom changes you make.  If
# you need changes, make a copy of this under another name, and customize
# that, and use the (left/right)updown parameters in ipsec.conf to make
# FreeS/WAN use yours instead of this default one.



# check interface version
case "$PLUTO_VERSION" in
1.[0])  # Older Pluto?!?  Play it safe, script may be using new features.
        echo "$0: obsolete interface version \`$PLUTO_VERSION'," >&2
        echo "$0:       called by obsolete Pluto?" >&2
        exit 2
        ;;
1.*)    ;;
*)      echo "$0: unknown interface version \`$PLUTO_VERSION'" >&2
        exit 2
        ;;
esac

# check parameter(s)
case "$*" in
'')     ;;
ipfwadm)        # caused by (left/right)firewall=yes; for default script only
        ;;
*)      echo "$0: unknown parameter \`$1'" >&2
        exit 2
        ;;
esac

# utility functions for route manipulation
# Meddling with this stuff should not be necessary and requires great care.
uproute() {
        doroute add
}
downroute() {
        doroute del
}
doroute() {
        parms="-net $PLUTO_PEER_CLIENT_NET netmask $PLUTO_PEER_CLIENT_MASK"
        parms2="dev $PLUTO_INTERFACE gw $PLUTO_NEXT_HOP"
        case "$PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK" in
        "0.0.0.0/0.0.0.0")
                # horrible kludge for obscure routing bug with opportunistic
                it="route $1 -net 0.0.0.0 netmask 128.0.0.0 $parms2 &&"
                it="$it route $1 -net 128.0.0.0 netmask 128.0.0.0 $parms2"
                route $1 -net 0.0.0.0 netmask 128.0.0.0 $parms2 &&
                        route $1 -net 128.0.0.0 netmask 128.0.0.0 $parms2
                ;;
        *)      it="route $1 $parms $parms2"
                route $1 $parms $parms2
                ;;
        esac
        st=$?
        if test $st -ne 0
        then
                # route has already given its own cryptic message
                echo "$0: \`$it' failed" >&2
                if test " $1 $st" = " add 7"
                then
                        # another totally undocumented interface -- 7 and
                        # "SIOCADDRT: Network is unreachable" means that
                        # the gateway isn't reachable.
                        echo "$0: (incorrect or missing nexthop setting??)" >&2
                fi
        fi
        return $st
}



# the big choice
case "$PLUTO_VERB:$1" in
prepare-host:*|prepare-client:*)
        # delete possibly-existing route (preliminary to adding a route)
        case "$PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK" in
        "0.0.0.0/0.0.0.0")
                # horrible kludge for obscure routing bug with opportunistic
                parms1="-net 0.0.0.0 netmask 128.0.0.0"
                parms2="-net 128.0.0.0 netmask 128.0.0.0"
                it="route del $parms1 2>&1 ; route del $parms2 2>&1"
                oops="`route del $parms1 2>&1 ; route del $parms2 2>&1`"
                ;;
        *)
                parms="-net $PLUTO_PEER_CLIENT_NET netmask $PLUTO_PEER_CLIENT_MASK"
                it="route del $parms 2>&1"
                oops="`route del $parms 2>&1`"
                ;;
        esac
        status="$?"
        if test " $oops" = " " -a " $status" != " 0"
        then
                oops="silent error, exit status $status"
        fi
        case "$oops" in
        'SIOCDELRT: No such process'*)
                # This is what route (currently -- not documented!) gives
                # for "could not find such a route".
                oops=
                status=0
                ;;
        esac
        if test " $oops" != " " -o " $status" != " 0"
        then
                echo "$0: \`$it' failed ($oops)" >&2
        fi
        exit $status
        ;;
route-host:*|route-client:*)
        # connection to me or my client subnet being routed
        uproute
        ;;
unroute-host:*|unroute-client:*)
        # connection to me or my client subnet being unrouted
        downroute
        ;;
up-host:*)
        # connection to me coming up
        # If you are doing a custom version, firewall commands go here.
        ;;
down-host:*)
        # connection to me going down
        # If you are doing a custom version, firewall commands go here.
        ;;
up-client:)
        # connection to my client subnet coming up
        # If you are doing a custom version, firewall commands go here.
        ;;
down-client:)
        # connection to my client subnet going down
        # If you are doing a custom version, firewall commands go here.
        ;;
up-client:ipfwadm)
        # connection to client subnet, with (left/right)firewall=yes, coming up
        # This is used only by the default updown script, not by your custom
        # ones, so do not mess with it; see CAUTION comment up at top.
        ipfwadm -F -i accept -b -S $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
                -D $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK
        ;;
down-client:ipfwadm)
        # connection to client subnet, with (left/right)firewall=yes, going down
        # This is used only by the default updown script, not by your custom
        # ones, so do not mess with it; see CAUTION comment up at top.
        ipfwadm -F -d accept -b -S $PLUTO_MY_CLIENT_NET/$PLUTO_MY_CLIENT_MASK \
                -D $PLUTO_PEER_CLIENT_NET/$PLUTO_PEER_CLIENT_MASK
        ;;
*)      echo "$0: unknown verb \`$PLUTO_VERB' or parameter \`$1'" >&2
        exit 1
        ;;
esac
+ _________________________ proc/net/dev
+ cat /proc/net/dev
Inter-|   Receive                                                |  Transmit
 face |bytes    packets errs drop fifo frame compressed multicast|bytes    packets 
errs drop fifo colls carrier compressed
    lo: 1232984    5924    0    0    0     0          0         0  1232984    5924    
0    0    0     0       0          0
ipsec0:    5220     255    0  168    0     0          0         0    13672      94    
0  370    0     0       0          0
ipsec1:       0       0    0    0    0     0          0         0        0       0    
0    0    0     0       0          0
ipsec2:       0       0    0    0    0     0          0         0        0       0    
0    0    0     0       0          0
ipsec3:       0       0    0    0    0     0          0         0        0       0    
0    0    0     0       0          0
:
  eth0:       0       0    0    0    0     0          0         0        0       0    
0    0    0     0       0          0
  eth1:162712442  441221    0    0    0     0          0         0  9217749   85507    
0    0    0    93       0          0
  eth2:       0       0    0    0    0     0          0         0        0       0    
0    0    0     0       0          0
+ _________________________ proc/net/route
+ cat /proc/net/route
Iface   Destination     Gateway         Flags   RefCnt  Use     Metric  Mask           
 MTU     Window  IRTT

eth0    000110AC        00000000        0001    0       0       0       F8FFFFFF       
 40      0       0

eth1    0001A8C0        00000000        0001    0       0       0       00FFFFFF       
 40      0       0

ipsec0  0001A8C0        00000000        0001    0       0       0       00FFFFFF       
 40      0       0

lo      0000007F        00000000        0001    0       0       0       000000FF       
 40      0       0

eth1    00000000        0B01A8C0        0003    0       0       0       00000000       
 40      0       0

+ _________________________ proc/sys/net/ipv4/ip_forward
+ cat /proc/sys/net/ipv4/ip_forward
1
+ _________________________ uname-a
+ uname -a
Linux syslog 2.4.16 #1 SMP Mon Apr 15 12:24:11 EEST 2002 i686 unknown
+ _________________________ redhat-release
+ test -r /etc/redhat-release
+ cat /etc/redhat-release
Red Hat Linux release 7.1 (Seawolf)
+ _________________________ proc/net/ipsec_version
+ cat /proc/net/ipsec_version
FreeS/WAN version: 1.92
+ _________________________ iptables/list
+ iptables -L -v -n
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: init_module: Device or 
resource busy
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: insmod 
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o fa
iled
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed
Hint: insmod errors can be caused by incorrect module parameters, including invalid IO 
or IRQ parameters
iptables v1.2.1a: can't initialize iptables table `filter': iptables who? (do you need 
to insmod?)
Perhaps iptables or your kernel needs to be upgraded.
+ _________________________ ipchains/list
+ ipchains -L -v -n
Chain input (policy ACCEPT: 124592 packets, 15529115 bytes):
Chain forward (policy ACCEPT: 0 packets, 0 bytes):
Chain output (policy ACCEPT: 81618 packets, 8415812 bytes):
+ _________________________ ipfwadm/forward
+ ipfwadm -F -l -n -e
Chains are empty. (ie. ipfwadm has not been used on them).
+ _________________________ ipfwadm/input
+ ipfwadm -I -l -n -e
Chains are empty. (ie. ipfwadm has not been used on them).
+ _________________________ ipfwadm/output
+ ipfwadm -O -l -n -e
Chains are empty. (ie. ipfwadm has not been used on them).
+ iptables -t nat -L -v -n
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: init_module: Device or 
resource busy
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: insmod 
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o fa
iled
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed
Hint: insmod errors can be caused by incorrect module parameters, including invalid IO 
or IRQ parameters
iptables v1.2.1a: can't initialize iptables table `nat': iptables who? (do you need to 
insmod?)
Perhaps iptables or your kernel needs to be upgraded.
+ _________________________ ipchains/masq
+ ipchains -M -L -v -n
IP masquerading entries
+ _________________________ ipfwadm/masq
+ ipfwadm -M -l -n -e
IP masquerading entries
+ _________________________ iptables/mangle
+ iptables -t mangle -L -v -n
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: init_module: Device or 
resource busy
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: insmod 
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o fa
iled
/lib/modules/2.4.16/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed
Hint: insmod errors can be caused by incorrect module parameters, including invalid IO 
or IRQ parameters
iptables v1.2.1a: can't initialize iptables table `mangle': iptables who? (do you need 
to insmod?)
Perhaps iptables or your kernel needs to be upgraded.
+ _________________________ proc/modules
+ cat /proc/modules
3c509                   7216   0 (autoclean) (unused)
3c59x                  25920   2 (autoclean)
+ _________________________ proc/meminfo
+ cat /proc/meminfo
        total:    used:    free:  shared: buffers:  cached:
Mem:  129437696 120430592  9007104        0 12402688 68218880
Swap: 425738240  2138112 423600128
MemTotal:       126404 kB
MemFree:          8796 kB
MemShared:           0 kB
Buffers:         12112 kB
Cached:          65340 kB
SwapCached:       1280 kB
Active:          63288 kB
Inactive:        30756 kB
HighTotal:           0 kB
HighFree:            0 kB
LowTotal:       126404 kB
LowFree:          8796 kB
SwapTotal:      415760 kB
SwapFree:       413672 kB
+ _________________________ dev/ipsec-ls
+ ls -l '/dev/ipsec*'
ls: /dev/ipsec*: No such file or directory
+ _________________________ proc/net/ipsec-ls
+ ls -l /proc/net/ipsec_eroute /proc/net/ipsec_klipsdebug /proc/net/ipsec_spi 
+/proc/net/ipsec_spigrp /proc/net/ipsec_tncfg /pr
oc/net/ipsec_version
-r--r--r--    1 root     root            0 Apr 16 16:19 /proc/net/ipsec_eroute
-r--r--r--    1 root     root            0 Apr 16 16:19 /proc/net/ipsec_klipsdebug
-r--r--r--    1 root     root            0 Apr 16 16:19 /proc/net/ipsec_spi
-r--r--r--    1 root     root            0 Apr 16 16:19 /proc/net/ipsec_spigrp
-r--r--r--    1 root     root            0 Apr 16 16:19 /proc/net/ipsec_tncfg
-r--r--r--    1 root     root            0 Apr 16 16:19 /proc/net/ipsec_version
+ _________________________ usr/src/linux/.config
+ test -f /usr/src/linux/.config
+ egrep 'IP|NETLINK' /usr/src/linux/.config
# CONFIG_MWINCHIPC6 is not set
# CONFIG_MWINCHIP2 is not set
# CONFIG_MWINCHIP3D is not set
CONFIG_SYSVIPC=y
# CONFIG_MD_MULTIPATH is not set
CONFIG_NETLINK=y
# CONFIG_RTNETLINK is not set
# CONFIG_NETLINK_DEV is not set
CONFIG_IP_MULTICAST=y
# CONFIG_IP_ADVANCED_ROUTER is not set
# CONFIG_IP_PNP is not set
CONFIG_NET_IPIP=m
CONFIG_NET_IPGRE=m
CONFIG_NET_IPGRE_BROADCAST=y
# CONFIG_IP_MROUTE is not set
#   IP: Netfilter Configuration
CONFIG_IP_NF_CONNTRACK=m
CONFIG_IP_NF_FTP=m
# CONFIG_IP_NF_IRC is not set
CONFIG_IP_NF_IPTABLES=m
CONFIG_IP_NF_MATCH_LIMIT=m
CONFIG_IP_NF_MATCH_MAC=m
CONFIG_IP_NF_MATCH_MARK=m
CONFIG_IP_NF_MATCH_MULTIPORT=m
CONFIG_IP_NF_MATCH_TOS=m
CONFIG_IP_NF_MATCH_LENGTH=m
CONFIG_IP_NF_MATCH_TTL=m
CONFIG_IP_NF_MATCH_TCPMSS=m
CONFIG_IP_NF_MATCH_STATE=m
CONFIG_IP_NF_FILTER=m
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_NAT=m
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=m
CONFIG_IP_NF_TARGET_REDIRECT=m
CONFIG_IP_NF_NAT_FTP=m
CONFIG_IP_NF_MANGLE=m
CONFIG_IP_NF_TARGET_TOS=m
CONFIG_IP_NF_TARGET_MARK=m
CONFIG_IP_NF_TARGET_LOG=m
CONFIG_IP_NF_TARGET_TCPMSS=m
CONFIG_IP_NF_COMPAT_IPCHAINS=y
CONFIG_IP_NF_NAT_NEEDED=y
# CONFIG_IPX is not set
CONFIG_IPSEC=y
CONFIG_IPSEC_IPIP=y
CONFIG_IPSEC_AH=y
CONFIG_IPSEC_AUTH_HMAC_MD5=y
CONFIG_IPSEC_AUTH_HMAC_SHA1=y
CONFIG_IPSEC_ESP=y
CONFIG_IPSEC_ENC_3DES=y
CONFIG_IPSEC_IPCOMP=y
CONFIG_IPSEC_DEBUG=y
# CONFIG_IDEDMA_PCI_WIP is not set
# CONFIG_IDE_CHIPSETS is not set
# CONFIG_TULIP is not set
# CONFIG_PLIP is not set
# CONFIG_SLIP is not set
+ _________________________ kern.debug
+ test -f /var/log/kern.debug
+ _________________________ klog
+ sed -n '1262,$p' /var/log/messages
+ egrep -i 'ipsec|klips|pluto'
+ cat
Apr 16 15:48:44 syslog ipsec_setup: Starting FreeS/WAN IPsec 1.92...
Apr 16 15:48:44 syslog ipsec_setup: KLIPS debug `none'
Apr 16 15:48:45 syslog ipsec_setup: KLIPS ipsec0 on eth1 192.168.1.4/255.255.255.0 
broadcast 192.168.1.255
Apr 16 15:48:45 syslog ipsec_setup: ...FreeS/WAN IPsec started
Apr 16 15:48:46 syslog ipsec__plutorun: ipsec_auto: fatal error in "rw_pgp-syslog": 
(/etc/ipsec.conf, line 16) unknown paramet
er name "rightxthop"
+ _________________________ plog
+ sed -n '23,$p' /var/log/secure
+ egrep -i pluto
+ cat
Apr 16 15:48:45 syslog Pluto[20263]: Starting Pluto (FreeS/WAN Version 1.92)
Apr 16 15:48:46 syslog Pluto[20263]: listening for IKE messages
Apr 16 15:48:46 syslog Pluto[20263]: adding interface ipsec0/eth1 192.168.1.4
Apr 16 15:48:46 syslog Pluto[20263]: loading secrets from "/etc/ipsec.secrets"
+ _________________________ date
+ date
Tue Apr 16 16:20:43 EEST 2002



 




---
Pentru dezabonare, trimiteti mail la 
[EMAIL PROTECTED] cu subiectul 'unsubscribe rlug'.
REGULI, arhive si alte informatii: http://www.lug.ro/mlist/


Raspunde prin e-mail lui