On 10/14/06, J. Ryan Earl <[EMAIL PROTECTED]> wrote:
Well, I'm trying to route between a 10.2.3.0/24 and 192.168.2.0/24
network...  Is that not some part of this functionality?  I mean, is
there any reason to not have the kernel support this?

Not the point of my question.

Here's my Cisco crypto map:

Crypto Map "dynaconnections" 5 ipsec-isakmp
        Peer = 216.62.203.233
        access-list dynaconnections; 1 elements
        access-list dynaconnections line 1 permit ip 10.2.3.0
255.255.255.0 192.168.2.0 255.255.255.0 (hitcnt=2737218)
        Current peer: 216.62.203.233
        Security association lifetime: 4608000 kilobytes/28800 seconds
        PFS (Y/N): Y
        DH group:  group5
        Transform sets={ ESP-AES-256-SHA, }

Here's my access-list:

access-list dynaconnections line 1 permit ip 10.2.3.0 255.255.255.0
192.168.2.0 255.255.255.0 (hitcnt=2737218)

This is my ISAKMP policy:

isakmp key ******** address 216.62.203.233 netmask 255.255.255.255
isakmp identity address
isakmp policy 4 authentication pre-share
isakmp policy 4 encryption aes-256
isakmp policy 4 hash sha
isakmp policy 4 group 5
isakmp policy 4 lifetime 86400

That's the sum whole configuration on the Cisco side.  I'm not really
sure what I would change.  This is a network-to-network VPN tunnel.
Perhaps "IPSec NAT Traversal" support is required in the kernel for
this?  Is there anyway for me to install a test kernel?

Geee, sure wish people had tested IPSec NAT Traversal when we asked
for testers.  We got no positive (or negative) feedback and it was
pulled - too late in the release phase to leave it in for long.  I
don't know anything about the Cisco side of things, hopefully someone
else can help you get it configured.  But NAT-T on the Cisco side
certainly seems to be the source of your problems.

--Bill

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to