On 10/18/2012 11:15 PM, Krzysiek Nowak wrote:
> That would be IPSec
>
> ii : ## : VPN Connect, ver 2.2.0
> ## : Copyright 2009 Shrew Soft Inc.
> ## : press the <h> key for help
>  >> : config loaded for site 'remote'
>  >> : attached to key daemon ...
>  >> : peer configured
>  >> : iskamp proposal configured
>  >> : esp proposal configured
>  >> : client configured
> << : enter xauth username : username
> << : enter xauth password : password
>
>  >> : local id configured
>  >> : remote id configured
>  >> : server cert configured
> ii : bringing up tunnel ...
>  >> : network device configured
> ii : tunnel enabled
> ii : current connection satus
>   - : tunnel state      = connected
>   - : IPsec SAs in use  = 12
>   - : IPsec SAs dead    = 0
>   - : IPsec SAs failed  = 0
>   - : transport used    = NAT-T v02 / IKE | ESP
>   - : ike fragmenataion = disabled
>   - : dead peer detect  = disabled
>

Okay. There has to be something more than just IPSEC since a plain IPSEC 
tunnel doesn't use a tap device. I think it is time that you sent me the 
output  of 'shorewall dump', produced while the tunnel is up.

Thanks,
-Tom
-- 
Tom Eastep        \ When I die, I want to go like my Grandfather who
Shoreline,         \ died peacefully in his sleep. Not screaming like
Washington, USA     \ all of the passengers in his car
http://shorewall.net \________________________________________________

------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_sfd2d_oct
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to