On 10/18/2012 11:15 PM, Krzysiek Nowak wrote: >> That would be IPSec >> >> ii : ## : VPN Connect, ver 2.2.0 >> ## : Copyright 2009 Shrew Soft Inc. >> ## : press the <h> key for help >> >> : config loaded for site 'remote' >> >> : attached to key daemon ... >> >> : peer configured >> >> : iskamp proposal configured >> >> : esp proposal configured >> >> : client configured >> << : enter xauth username : username >> << : enter xauth password : password >> >> >> : local id configured >> >> : remote id configured >> >> : server cert configured >> ii : bringing up tunnel ... >> >> : network device configured >> ii : tunnel enabled >> ii : current connection satus >> - : tunnel state = connected >> - : IPsec SAs in use = 12 >> - : IPsec SAs dead = 0 >> - : IPsec SAs failed = 0 >> - : transport used = NAT-T v02 / IKE | ESP >> - : ike fragmenataion = disabled >> - : dead peer detect = disabled >> > Okay. There has to be something more than just IPSEC since a plain IPSEC > tunnel doesn't use a tap device. I think it is time that you sent me the > output of 'shorewall dump', produced while the tunnel is up. > > Thanks, > -Tom OK sure. I will send it via separate email.
------------------------------------------------------------------------------ Everyone hates slow websites. So do we. Make your web apps faster with AppDynamics Download AppDynamics Lite for free today: http://p.sf.net/sfu/appdyn_sfd2d_oct _______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
