| Hi, The ipsec up command doesn't seem to work with ike v2 so i've reverted to ike v1. when i use ipsec up on the AWS host the packets don't reach 50.56.121.20. If I instead use ipsec up from the 50.56.121.20 host, the packets do reach the AWS firewall but the following message is logged: May 9 13:04:23 ip-10-5-51-242 pluto[29702]: packet from 50.56.121.20:500: initial Main Mode message received on 10.5.51.242:500 but no connection has been authorized with policy=PS K what does this mean? Our config files are attached |
{\rtf1\ansi\ansicpg1252\cocoartf1038\cocoasubrtf350
{\fonttbl\f0\fswiss\fcharset0 Helvetica;}
{\colortbl;\red255\green255\blue255;}
\paperw11900\paperh16840\margl1440\margr1440\vieww9000\viewh8400\viewkind0
\pard\tx566\tx1133\tx1700\tx2267\tx2834\tx3401\tx3968\tx4535\tx5102\tx5669\tx6236\tx6803\ql\qnatural\pardirnatural\f0\fs24 \cf0 # /etc/ipsec.secrets - strongSwan IPsec:q!\ @ip-10-5-51-242 %any : PSK "Rel1439@RCM#123"}
{\rtf1\ansi\ansicpg1252\cocoartf1038\cocoasubrtf350
{\fonttbl\f0\fswiss\fcharset0 Helvetica;}
{\colortbl;\red255\green255\blue255;}
\paperw11900\paperh16840\margl1440\margr1440\vieww9000\viewh8400\viewkind0
\pard\tx566\tx1133\tx1700\tx2267\tx2834\tx3401\tx3968\tx4535\tx5102\tx5669\tx6236\tx6803\ql\qnatural\pardirnatural
\f0\fs24 \cf0 # /etc/ipsec.conf - strongSwan IPsec configuration file\
\
config setup\
plutodebug=all\
charonstart=no\
nat_traversal=yes\
\
conn %default\
ikelifetime=1440m\
keylife=1m\
rekeymargin=3m\
keyingtries=1\
keyexchange=ikev1\
authby=secret\
pfs=no\
\
\
conn net-net\
ike=3des-md5-modp1024,3des-md5-modp1024\
esp=3des-md5,3des-md5\
leftid=@ip-10-5-51-242\
leftsourceip=10.5.51.61\
left=46.51.193.228\
leftsubnet=10.5.0.0/16\
leftfirewall=yes\
right=50.56.121.20\
rightsubnet=10.181.32.0/19\
rightid=@TestNP\
auto=add\
ubuntu@ip-10-5-51-61:~$ \
\
\
!!!!!!!!!! ipsec.secrets follows!!!!!!!!\
\
# /etc/ipsec.secrets - strongSwan IPsec:q!\
46.51.193.145 %any : PSK "Rel1439@RCM#123"}{\rtf1\ansi\ansicpg1252\cocoartf1038\cocoasubrtf350
{\fonttbl\f0\fswiss\fcharset0 Helvetica;}
{\colortbl;\red255\green255\blue255;}
\paperw11900\paperh16840\margl1440\margr1440\vieww9000\viewh8400\viewkind0
\pard\tx566\tx1133\tx1700\tx2267\tx2834\tx3401\tx3968\tx4535\tx5102\tx5669\tx6236\tx6803\ql\qnatural\pardirnatural
\f0\fs24 \cf0 # /etc/ipsec.secrets - strongSwan IPsec:q!\
@TestNP %any : PSK "Rel1439@RCM#123"}{\rtf1\ansi\ansicpg1252\cocoartf1038\cocoasubrtf350
{\fonttbl\f0\fswiss\fcharset0 Helvetica;}
{\colortbl;\red255\green255\blue255;}
\paperw11900\paperh16840\margl1440\margr1440\vieww9000\viewh8400\viewkind0
\pard\tx566\tx1133\tx1700\tx2267\tx2834\tx3401\tx3968\tx4535\tx5102\tx5669\tx6236\tx6803\ql\qnatural\pardirnatural
\f0\fs24 \cf0 # /etc/ipsec.conf - strongSwan IPsec configuration file\
\
config setup\
plutodebug=all\
charonstart=no\
nat_traversal=yes\
\
conn %default\
ikelifetime=1440m\
keylife=1m\
rekeymargin=3m\
keyingtries=1\
keyexchange=ikev1\
authby=secret\
pfs=no\
\
\
conn net-net\
ike=3des-md5-modp1024,3des-md5-modp1024\
esp=3des-md5,3des-md5\
leftid=@TestNP\
left=50.56.121.20\
leftsubnet=10.181.32.0/19\
leftfirewall=yes\
leftsourceip=10.181.52.82\
right=46.51.193.228\
rightsubnet=10.5.0.0/16\
rightid=@ip-10-5-51-242\
auto=add}On 28 Apr 2011, at 14:06, neil payne wrote:
|
_______________________________________________ Users mailing list [email protected] https://lists.strongswan.org/mailman/listinfo/users
