On 10/18/2012 11:15 PM, Krzysiek Nowak wrote:
>> That would be IPSec
>>
>> ii : ## : VPN Connect, ver 2.2.0
>> ## : Copyright 2009 Shrew Soft Inc.
>> ## : press the <h> key for help
>>  >> : config loaded for site 'remote'
>>  >> : attached to key daemon ...
>>  >> : peer configured
>>  >> : iskamp proposal configured
>>  >> : esp proposal configured
>>  >> : client configured
>> << : enter xauth username : username
>> << : enter xauth password : password
>>
>>  >> : local id configured
>>  >> : remote id configured
>>  >> : server cert configured
>> ii : bringing up tunnel ...
>>  >> : network device configured
>> ii : tunnel enabled
>> ii : current connection satus
>>   - : tunnel state      = connected
>>   - : IPsec SAs in use  = 12
>>   - : IPsec SAs dead    = 0
>>   - : IPsec SAs failed  = 0
>>   - : transport used    = NAT-T v02 / IKE | ESP
>>   - : ike fragmenataion = disabled
>>   - : dead peer detect  = disabled
>>
> Okay. There has to be something more than just IPSEC since a plain IPSEC 
> tunnel doesn't use a tap device. I think it is time that you sent me the 
> output  of 'shorewall dump', produced while the tunnel is up.
>
> Thanks,
> -Tom
OK sure. I will send it via separate email.

------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_sfd2d_oct
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to