On 10/18/2012 11:15 PM, Krzysiek Nowak wrote: > That would be IPSec > > ii : ## : VPN Connect, ver 2.2.0 > ## : Copyright 2009 Shrew Soft Inc. > ## : press the <h> key for help > >> : config loaded for site 'remote' > >> : attached to key daemon ... > >> : peer configured > >> : iskamp proposal configured > >> : esp proposal configured > >> : client configured > << : enter xauth username : username > << : enter xauth password : password > > >> : local id configured > >> : remote id configured > >> : server cert configured > ii : bringing up tunnel ... > >> : network device configured > ii : tunnel enabled > ii : current connection satus > - : tunnel state = connected > - : IPsec SAs in use = 12 > - : IPsec SAs dead = 0 > - : IPsec SAs failed = 0 > - : transport used = NAT-T v02 / IKE | ESP > - : ike fragmenataion = disabled > - : dead peer detect = disabled >
Okay. There has to be something more than just IPSEC since a plain IPSEC tunnel doesn't use a tap device. I think it is time that you sent me the output of 'shorewall dump', produced while the tunnel is up. Thanks, -Tom -- Tom Eastep \ When I die, I want to go like my Grandfather who Shoreline, \ died peacefully in his sleep. Not screaming like Washington, USA \ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ Everyone hates slow websites. So do we. Make your web apps faster with AppDynamics Download AppDynamics Lite for free today: http://p.sf.net/sfu/appdyn_sfd2d_oct _______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
