On Tue, 31 Oct 2017, Paul Tran wrote:

VTI interfaces and ST interface on the srx set to IPs on the 192.168.10.0/24 
network

I have users sitting on 10.8.0.0/24 that I am trying to have use this tunnel 
that are connected off of the CENTOS box.

Ifconfig
vti201: flags=209<UP,POINTOPOINT,RUNNING,NOARP>  mtu 8981
        inet 192.168.10.2  netmask 255.255.255.0  destination 192.168.10.1
        tunnel   txqueuelen 1  (IPIP Tunnel)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  colliconn SRX

Can you also show: ip tun

It would need to have a "key" entry matching the mark number in your
config (5)

IPSECON.CONF config
  authby=secret
  #aggressive=no
  #type=tunnel
  left=172.31.140.0
   leftid=34.204.126.142
  right=102.167.4.2
  auto=start
  mark=5/0xfffffff
  keyingtries=%forever
  rightsubnet=0.0.0.0/24
  leftsubnet=10.8.0.0/24
  ike=aes-sha1;modp1536
  phase2=esp
  phase2alg=aes256-sha1;modp1536
  vti-interface=vti201
  vti-routing=yes
  leftvti=192.168.10.2/24

This looks fine.


ip -s xfrm policy

src 10.8.0.0/24 dst 0.0.0.0/24 uid 0
        dir out action allow index 625 priority 2344 ptype main share any flag  
(0x00000000)
        lifetime config:
          limit: soft (INF)(bytes), hard (INF)(bytes)
          limit: soft (INF)(packets), hard (INF)(packets)
          expire add: soft 0(sec), hard 0(sec)
          expire use: soft 0(sec), hard 0(sec)
        lifetime current:
          0(bytes), 0(packets)
          add 2017-10-31 12:22:43 use -
        mark 5/0xfffffff

Looks okay too.

So I'm not sure what is going on. It might not be mark related? Check
"ipsec verify" for errors, eg rp_filter settings or ip_forwarding
settings?

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to