On Sun, 13 Feb 2011 10:55:07 -0800, Daniel Mentz
<[email protected]> wrote:
> On 02/13/2011 08:49 AM, Rene Bartsch wrote:
>> After removing "leftfirewall=yes" from ipsec.conf and adding the
incoming
>> FORWARD rule created by "leftfirewall=yes" to the INPUT chain manually,
>> it
>> seems to work.
> 
> That's strange. Can you save the output of "iptables-save" in both cases

> and run a diff against both files to see what's the difference?
> 

I've attached the output of "ip -4 a", iptables-save of working and
non-working setup and a diff.



xxx.xxx.xxx.20:  eth0    primary   public IP of Ubuntu 10.04.2 LTS server
xxx.xxx.xxx.102: eth0:0  secondary public IP of Ubuntu 10.04.2 LTS server
(IPSec connection)
192.168.176.1:   dummy0  Test for virtual servers

eth0: 1000Base-T internet-uplink
eth1: unused


Fritzbox config (default: aggressive mode and NAT-T enabled):


vpncfg {

        connections {

                enabled = yes;

                conn_type = conntype_lan;

                name = "xxx.xxx.xxx.102";

                always_renew = no;

                reject_not_encrypted = no;

                dont_filter_netbios = yes;

                localip = 0.0.0.0;

                local_virtualip = 0.0.0.0;

                remoteip = xxx.xxx.xxx.102;

                remote_virtualip = 0.0.0.0;

                localid {

                        fqdn = "xxx.dnsalias.net";

                }

                remoteid {

                        ipaddr = xxx.xxx.xxx.102;

                }

                mode = phase1_mode_idp;

                phase1ss = "all/all/all";

                keytype = connkeytype_pre_shared;

                key = "xxxxxxxxxxxxxxxxxxxx";

                cert_do_server_auth = no;

                use_nat_t = no;

                use_xauth = no;

                use_cfgmode = no;

                phase2localid {

                        ipnet {

                                ipaddr = 192.168.177.0;

                                mask = 255.255.255.0;

                        }

                }

                phase2remoteid {

                        ipnet {

                                ipaddr = 192.168.176.0;

                                mask = 255.255.255.0;

                        }

                }

                phase2ss = "esp-all-all/ah-none/comp-all/pfs";

                accesslist = "permit ip any 192.168.176.0 255.255.255.0";

        }

        ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500",

                            "udp 0.0.0.0:4500 0.0.0.0:4500";

}



Best regards,

Renne
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc prio state UNKNOWN 
    inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc prio state UP qlen 
1000
    inet xxx.xxx.xxx.20/24 brd xxx.xxx.xxx.255 scope global eth0
    inet xxx.xxx.xxx.102/24 brd xxx.xxx.xxx.255 scope global secondary eth0:0
4: dummy0: <BROADCAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc prio state UNKNOWN 
    inet 192.168.176.1/24 brd 192.168.176.255 scope global dummy0
xxx.xxx.xxx.20:  eth0   primary   public IP of Ubuntu 10.04.2 LTS server
xxx.xxx.xxx.102: eth0   secondary public IP of Ubuntu 10.04.2 LTS server (IPSec connection)
192.168.176.1:   dummy0 Test for virtual servers

eth0: 1000Base-T internet-uplink
eth1: unused


# Generated by iptables-save v1.4.4 on Sun Feb 13 20:53:08 2011
*mangle
:PREROUTING ACCEPT [1033337:88572817]
:INPUT ACCEPT [1030464:88159548]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1088515:1531960932]
:POSTROUTING ACCEPT [1088515:1531960932]
-A POSTROUTING -o lo -p icmp -m comment --comment "Traffic-shaping Interface: lo  Type: ICMP" -j CLASSIFY --set-class 0001:0001 
-A POSTROUTING -o lo -p tcp -m comment --comment "Traffic-shaping Interface: lo  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0001:0003 
-A POSTROUTING -o lo -m comment --comment "Traffic-shaping Interface: lo  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0001:0004 
-A POSTROUTING -o eth0 -p icmp -m comment --comment "Traffic-shaping Interface: eth0  Type: ICMP" -j CLASSIFY --set-class 0002:0001 
-A POSTROUTING -o eth0 -p tcp -m comment --comment "Traffic-shaping Interface: eth0  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0002:0003 
-A POSTROUTING -o eth0 -m comment --comment "Traffic-shaping Interface: eth0  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0002:0004 
-A POSTROUTING -o eth1 -p icmp -m comment --comment "Traffic-shaping Interface: eth1  Type: ICMP" -j CLASSIFY --set-class 0003:0001 
-A POSTROUTING -o eth1 -p tcp -m comment --comment "Traffic-shaping Interface: eth1  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0003:0003 
-A POSTROUTING -o eth1 -m comment --comment "Traffic-shaping Interface: eth1  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0003:0004 
-A POSTROUTING -o dummy0 -p icmp -m comment --comment "Traffic-shaping Interface: dummy0  Type: ICMP" -j CLASSIFY --set-class 0004:0001 
-A POSTROUTING -o dummy0 -p tcp -m comment --comment "Traffic-shaping Interface: dummy0  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0004:0003 
-A POSTROUTING -o dummy0 -m comment --comment "Traffic-shaping Interface: dummy0  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0004:0004 
COMMIT
# Completed on Sun Feb 13 20:53:08 2011
# Generated by iptables-save v1.4.4 on Sun Feb 13 20:53:08 2011
*filter
:INPUT DROP [960:109842]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [1088513:1531960805]
-A INPUT -i lo -m comment --comment "ACCEPT loopback device" -j ACCEPT 
-A INPUT -i dummy0 -m comment --comment "ACCEPT dummy0 device" -j ACCEPT 
-A INPUT -m state --state RELATED,ESTABLISHED -m comment --comment "ACCEPT existing connections" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 0 -m comment --comment "ACCEPT ICMP echo-reply" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 8 -m comment --comment "ACCEPT ICMP echo-request" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 11 -m comment --comment "ACCEPT ICMP time-exceeded" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 4 -m comment --comment "ACCEPT ICMP source-quench" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 3/3 -m comment --comment "ACCEPT ICMP port-unreachable" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 12 -m comment --comment "ACCEPT ICMP parameter-problem" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 3/4 -m comment --comment "ACCEPT ICMP fragmentation-needed" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 3 -m comment --comment "ACCEPT ICMP destination-unreachable" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.102/32 -p esp -m comment --comment "ACCEPT IPSec ESP" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.102/32 -m policy --dir in --pol ipsec -m comment --comment "ACCEPT IPSec secured packets" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.102/32 -p udp -m udp --dport 500 -m comment --comment "ACCEPT IPSec IKE" -j ACCEPT 
-A INPUT -s 192.168.177.0/24 -d 192.168.176.0/24 -m policy --dir in --pol ipsec --reqid 16385 --proto esp -m comment --comment "ACCEPT IPSec secured packets" -j ACCEPT 
-A INPUT -m state --state NEW -m recent --set --name DEFAULT --rsource -m comment --comment "Store connection requests" 
-A INPUT -d xxx.xxx.xxx.102/32 -p tcp -m tcp --dport 22 -m state --state NEW -m recent --update --seconds 240 --hitcount 10 --name DEFAULT --rsource -m comment --comment "DROP SSH Brute-Force-Attacks" -j DROP 
-A INPUT -d xxx.xxx.xxx.102/32 -p tcp -m tcp --dport 22 -m state --state NEW -m comment --comment "ACCEPT SSH connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 21 -m state --state NEW -m comment --comment "ACCEPT FTP connections" -j ACCEPT 
-A INPUT -p tcp -m tcp --dport 25 -m state --state NEW -m comment --comment "ACCEPT SMTP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p udp -m udp --dport 53 -m state --state NEW -m comment --comment "ACCEPT DNS UDP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 53 -m state --state NEW -m comment --comment "ACCEPT DNS TCP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 80 -m state --state NEW -m comment --comment "ACCEPT HTTP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 443 -m state --state NEW -m comment --comment "ACCEPT HTTPS connections" -j ACCEPT 
COMMIT
# Completed on Sun Feb 13 20:53:08 2011


# ipsec.conf - strongSwan IPsec configuration file

# basic configuration

config setup
	#plutodebug=all
	plutodebug="control"
	# crlcheckinterval=600
	# strictcrlpolicy=yes
	# cachecrls=yes
	nat_traversal=no
	charonstart=yes
	plutostart=yes

# Add connections here.

# Sample VPN connections

conn frankfurt-giessen
    left=xxx.xxx.xxx.102
    leftsubnet=192.168.176.0/24
    #leftfirewall=yes
    #
    ike=aes128-sha-modp1024
    esp=aes128-sha1
    #
    right=xxx.dnsalias.net
    [email protected]
    rightsubnet=192.168.177.0/24
    #
    ikelifetime=4h
    keylife=1h
    #
    authby=secret
    auto=route

include /var/lib/strongswan/ipsec.conf.inc
xxx.xxx.xxx.20:  eth0   primary   public IP of Ubuntu 10.04.2 LTS server
xxx.xxx.xxx.102: eth0   secondary public IP of Ubuntu 10.04.2 LTS server (IPSec connection)
192.168.176.1:   dummy0 Test for virtual servers

eth0: 1000Base-T internet-uplink
eth1: unused


# Generated by iptables-save v1.4.4 on Sun Feb 13 21:08:03 2011
*mangle
:PREROUTING ACCEPT [1043039:89521051]
:INPUT ACCEPT [1039944:89073990]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1096710:1532915142]
:POSTROUTING ACCEPT [1096710:1532915142]
-A POSTROUTING -o lo -p icmp -m comment --comment "Traffic-shaping Interface: lo  Type: ICMP" -j CLASSIFY --set-class 0001:0001 
-A POSTROUTING -o lo -p tcp -m comment --comment "Traffic-shaping Interface: lo  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0001:0003 
-A POSTROUTING -o lo -m comment --comment "Traffic-shaping Interface: lo  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0001:0004 
-A POSTROUTING -o eth0 -p icmp -m comment --comment "Traffic-shaping Interface: eth0  Type: ICMP" -j CLASSIFY --set-class 0002:0001 
-A POSTROUTING -o eth0 -p tcp -m comment --comment "Traffic-shaping Interface: eth0  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0002:0003 
-A POSTROUTING -o eth0 -m comment --comment "Traffic-shaping Interface: eth0  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0002:0004 
-A POSTROUTING -o eth1 -p icmp -m comment --comment "Traffic-shaping Interface: eth1  Type: ICMP" -j CLASSIFY --set-class 0003:0001 
-A POSTROUTING -o eth1 -p tcp -m comment --comment "Traffic-shaping Interface: eth1  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0003:0003 
-A POSTROUTING -o eth1 -m comment --comment "Traffic-shaping Interface: eth1  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0003:0004 
-A POSTROUTING -o dummy0 -p icmp -m comment --comment "Traffic-shaping Interface: dummy0  Type: ICMP" -j CLASSIFY --set-class 0004:0001 
-A POSTROUTING -o dummy0 -p tcp -m comment --comment "Traffic-shaping Interface: dummy0  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY --set-class 0004:0003 
-A POSTROUTING -o dummy0 -m comment --comment "Traffic-shaping Interface: dummy0  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0004:0004 
COMMIT
# Completed on Sun Feb 13 21:08:03 2011
# Generated by iptables-save v1.4.4 on Sun Feb 13 21:08:03 2011
*filter
:INPUT DROP [7:420]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [69:19830]
-A INPUT -i lo -m comment --comment "ACCEPT loopback device" -j ACCEPT 
-A INPUT -i dummy0 -m comment --comment "ACCEPT dummy0 device" -j ACCEPT 
-A INPUT -m state --state RELATED,ESTABLISHED -m comment --comment "ACCEPT existing connections" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 0 -m comment --comment "ACCEPT ICMP echo-reply" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 8 -m comment --comment "ACCEPT ICMP echo-request" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 11 -m comment --comment "ACCEPT ICMP time-exceeded" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 4 -m comment --comment "ACCEPT ICMP source-quench" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 3/3 -m comment --comment "ACCEPT ICMP port-unreachable" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 12 -m comment --comment "ACCEPT ICMP parameter-problem" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 3/4 -m comment --comment "ACCEPT ICMP fragmentation-needed" -j ACCEPT 
-A INPUT -p icmp -m icmp --icmp-type 3 -m comment --comment "ACCEPT ICMP destination-unreachable" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.102/32 -p esp -m comment --comment "ACCEPT IPSec ESP" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.102/32 -m policy --dir in --pol ipsec -m comment --comment "ACCEPT IPSec secured packets" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.102/32 -p udp -m udp --dport 500 -m comment --comment "ACCEPT IPSec IKE" -j ACCEPT 
-A INPUT -m state --state NEW -m recent --set --name DEFAULT --rsource -m comment --comment "Store connection requests" 
-A INPUT -d xxx.xxx.xxx.102/32 -p tcp -m tcp --dport 22 -m state --state NEW -m recent --update --seconds 240 --hitcount 10 --name DEFAULT --rsource -m comment --comment "DROP SSH Brute-Force-Attacks" -j DROP 
-A INPUT -d xxx.xxx.xxx.102/32 -p tcp -m tcp --dport 22 -m state --state NEW -m comment --comment "ACCEPT SSH connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 21 -m state --state NEW -m comment --comment "ACCEPT FTP connections" -j ACCEPT 
-A INPUT -p tcp -m tcp --dport 25 -m state --state NEW -m comment --comment "ACCEPT SMTP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p udp -m udp --dport 53 -m state --state NEW -m comment --comment "ACCEPT DNS UDP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 53 -m state --state NEW -m comment --comment "ACCEPT DNS TCP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 80 -m state --state NEW -m comment --comment "ACCEPT HTTP connections" -j ACCEPT 
-A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 443 -m state --state NEW -m comment --comment "ACCEPT HTTPS connections" -j ACCEPT 
-A FORWARD -s 192.168.177.0/24 -d 192.168.176.0/24 -i eth0:0 -m policy --dir in --pol ipsec --reqid 16385 --proto esp -j ACCEPT 
-A FORWARD -s 192.168.176.0/24 -d 192.168.177.0/24 -o eth0:0 -m policy --dir out --pol ipsec --reqid 16385 --proto esp -j ACCEPT 
COMMIT
# Completed on Sun Feb 13 21:08:03 2011


# ipsec.conf - strongSwan IPsec configuration file

# basic configuration

config setup
	#plutodebug=all
	plutodebug="control"
	# crlcheckinterval=600
	# strictcrlpolicy=yes
	# cachecrls=yes
	nat_traversal=no
	charonstart=yes
	plutostart=yes

# Add connections here.

# Sample VPN connections

conn frankfurt-giessen
    left=xxx.xxx.xxx.102
    leftsubnet=192.168.176.0/24
    leftfirewall=yes
    #
    ike=aes128-sha-modp1024
    esp=aes128-sha1
    #
    right=xxx.dnsalias.net
    [email protected]
    rightsubnet=192.168.177.0/24
    #
    ikelifetime=4h
    keylife=1h
    #
    authby=secret
    auto=route

include /var/lib/strongswan/ipsec.conf.inc
--- iptables.save.working       2011-02-13 21:18:55.312905234 +0100
+++ iptables.save.not-working   2011-02-13 21:23:31.475403173 +0100
@@ -7,13 +7,13 @@
 eth1: unused
 
 
-# Generated by iptables-save v1.4.4 on Sun Feb 13 20:53:08 2011
+# Generated by iptables-save v1.4.4 on Sun Feb 13 21:08:03 2011
 *mangle
-:PREROUTING ACCEPT [1033337:88572817]
-:INPUT ACCEPT [1030464:88159548]
+:PREROUTING ACCEPT [1043039:89521051]
+:INPUT ACCEPT [1039944:89073990]
 :FORWARD ACCEPT [0:0]
-:OUTPUT ACCEPT [1088515:1531960932]
-:POSTROUTING ACCEPT [1088515:1531960932]
+:OUTPUT ACCEPT [1096710:1532915142]
+:POSTROUTING ACCEPT [1096710:1532915142]
 -A POSTROUTING -o lo -p icmp -m comment --comment "Traffic-shaping Interface: 
lo  Type: ICMP" -j CLASSIFY --set-class 0001:0001 
 -A POSTROUTING -o lo -p tcp -m comment --comment "Traffic-shaping Interface: 
lo  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j CLASSIFY 
--set-class 0001:0003 
 -A POSTROUTING -o lo -m comment --comment "Traffic-shaping Interface: lo  
Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 0001:0004 
@@ -27,12 +27,12 @@
 -A POSTROUTING -o dummy0 -p tcp -m comment --comment "Traffic-shaping 
Interface: dummy0  Type: TCP ACK" -m tcp --tcp-flags FIN,SYN,RST,ACK ACK -j 
CLASSIFY --set-class 0004:0003 
 -A POSTROUTING -o dummy0 -m comment --comment "Traffic-shaping Interface: 
dummy0  Type: Small packets" -m length --length 0:64 -j CLASSIFY --set-class 
0004:0004 
 COMMIT
-# Completed on Sun Feb 13 20:53:08 2011
-# Generated by iptables-save v1.4.4 on Sun Feb 13 20:53:08 2011
+# Completed on Sun Feb 13 21:08:03 2011
+# Generated by iptables-save v1.4.4 on Sun Feb 13 21:08:03 2011
 *filter
-:INPUT DROP [960:109842]
+:INPUT DROP [7:420]
 :FORWARD DROP [0:0]
-:OUTPUT ACCEPT [1088513:1531960805]
+:OUTPUT ACCEPT [69:19830]
 -A INPUT -i lo -m comment --comment "ACCEPT loopback device" -j ACCEPT 
 -A INPUT -i dummy0 -m comment --comment "ACCEPT dummy0 device" -j ACCEPT 
 -A INPUT -m state --state RELATED,ESTABLISHED -m comment --comment "ACCEPT 
existing connections" -j ACCEPT 
@@ -47,7 +47,6 @@
 -A INPUT -d xxx.xxx.xxx.102/32 -p esp -m comment --comment "ACCEPT IPSec ESP" 
-j ACCEPT 
 -A INPUT -d xxx.xxx.xxx.102/32 -m policy --dir in --pol ipsec -m comment 
--comment "ACCEPT IPSec secured packets" -j ACCEPT 
 -A INPUT -d xxx.xxx.xxx.102/32 -p udp -m udp --dport 500 -m comment --comment 
"ACCEPT IPSec IKE" -j ACCEPT 
--A INPUT -s 192.168.177.0/24 -d 192.168.176.0/24 -m policy --dir in --pol 
ipsec --reqid 16385 --proto esp -m comment --comment "ACCEPT IPSec secured 
packets" -j ACCEPT 
 -A INPUT -m state --state NEW -m recent --set --name DEFAULT --rsource -m 
comment --comment "Store connection requests" 
 -A INPUT -d xxx.xxx.xxx.102/32 -p tcp -m tcp --dport 22 -m state --state NEW 
-m recent --update --seconds 240 --hitcount 10 --name DEFAULT --rsource -m 
comment --comment "DROP SSH Brute-Force-Attacks" -j DROP 
 -A INPUT -d xxx.xxx.xxx.102/32 -p tcp -m tcp --dport 22 -m state --state NEW 
-m comment --comment "ACCEPT SSH connections" -j ACCEPT 
@@ -57,8 +56,10 @@
 -A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 53 -m state --state NEW -m 
comment --comment "ACCEPT DNS TCP connections" -j ACCEPT 
 -A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 80 -m state --state NEW -m 
comment --comment "ACCEPT HTTP connections" -j ACCEPT 
 -A INPUT -d xxx.xxx.xxx.20/32 -p tcp -m tcp --dport 443 -m state --state NEW 
-m comment --comment "ACCEPT HTTPS connections" -j ACCEPT 
+-A FORWARD -s 192.168.177.0/24 -d 192.168.176.0/24 -i eth0:0 -m policy --dir 
in --pol ipsec --reqid 16385 --proto esp -j ACCEPT 
+-A FORWARD -s 192.168.176.0/24 -d 192.168.177.0/24 -o eth0:0 -m policy --dir 
out --pol ipsec --reqid 16385 --proto esp -j ACCEPT 
 COMMIT
-# Completed on Sun Feb 13 20:53:08 2011
+# Completed on Sun Feb 13 21:08:03 2011
 
 
 # ipsec.conf - strongSwan IPsec configuration file
@@ -82,7 +83,7 @@
 conn frankfurt-giessen
     left=xxx.xxx.xxx.102
     leftsubnet=192.168.176.0/24
-    #leftfirewall=yes
+    leftfirewall=yes
     #
     ike=aes128-sha-modp1024
     esp=aes128-sha1
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to