Hello,

I am trying to set up strongSwan 4.3.6, like below network.

172.22.1.0/24 - 192.168.1.6 ... 192.168.1.7 - 192.168.32.0/24

Here 192.168.1.6 is Ubuntu 12.04 and 192.168.1.7 is Linux based 
Gateway(Linux kernel 2.6.33.5). I must use strongSwan 4.3.6 ikev1 
by Gateway ristrictions.

Responder is Gateway, and Initiator is Ubuntu. I can get connection
but it is not encapsulated.

My setting and connection time pluto.log is shown below.

Please let me know what is wrong.

===================================================================
ipsec.conf 192.168.1.6
===================================================================
config setup
         plutostderrlog=/var/log/pluto.log
         plutodebug=control
         nat_traversal=yes

# Add connections here.

conn %default
        ikelifetime=60m
        keylife=20m
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev1
        authby=secret
        esp=3des-sha1
        ike=3des-sha

conn test
        type=tunnel
        left=192.168.1.6
        leftsubnet=172.22.1.0/24
        leftnexthop=%defaultroute       
        leftfirewall=yes
        right=192.168.1.7
        rightsubnet=192.168.32.0/24
        auto=start

===================================================================
ipsec.conf 192.168.1.7
===================================================================
config  setup
        plutostderrlog=/var/log/pluto.log
        plutodebug=control
        nat_traversal=yes

conn %default
        ikelifetime=60m
        keylife=20m
        rekeymargin=3m
        keyingtries=1
        keyexchange=ikev1
        authby=secret
        esp=3des-sha1
        ike=3des-sha
        
conn test
        type=tunnel
        leftsubnet=192.168.32.0/24
        left=192.168.1.7
        leftnexthop=%defaultroute
        leftfirewall=yes
        right=192.168.1.6
        rightsubnet=172.22.1.0/24
        auto=add

===================================================================
pluto.log 192.168.1.6
===================================================================
Starting IKEv1 pluto daemon (strongSwan 4.3.6) THREADS VENDORID
loaded plugins: aes des sha1 sha2 md5 random x509 pubkey pkcs1 pgp dnskey pem 
hmac gmp 
| inserting event EVENT_REINIT_SECRET, timeout in 3600 seconds
  including NAT-Traversal patch (Version 0.6c)
| xauth module: using default get_secret() function
| xauth module: using default verify_secret() function
Using Linux 2.6 IPsec interface code
loading ca certificates from '/usr/local/etc/ipsec.d/cacerts'
loading aa certificates from '/usr/local/etc/ipsec.d/aacerts'
loading ocsp certificates from '/usr/local/etc/ipsec.d/ocspcerts'
Changing to directory '/usr/local/etc/ipsec.d/crls'
loading attribute certificates from '/usr/local/etc/ipsec.d/acerts'
| inserting event EVENT_LOG_DAILY, timeout in 69358 seconds
| next event EVENT_REINIT_SECRET in 3600 seconds
| 
| *received whack message
listening for IKE messages
| found lo with address 127.0.0.1
| found eth0 with address 172.22.1.42
| found eth1 with address 192.168.1.6
adding interface eth1/eth1 192.168.1.6:500
adding interface eth1/eth1 192.168.1.6:4500
adding interface eth0/eth0 172.22.1.42:500
adding interface eth0/eth0 172.22.1.42:4500
adding interface lo/lo 127.0.0.1:500
adding interface lo/lo 127.0.0.1:4500
| found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
adding interface lo/lo ::1:500
loading secrets from "/usr/local/etc/ipsec.secrets"
  loaded shared key for 192.168.1.7 192.168.1.6 
| next event EVENT_REINIT_SECRET in 3600 seconds
| 
| *received whack message
| from whack: got --esp=3des-sha1
| esp proposal: 3DES_CBC/HMAC_SHA1, 
| from whack: got --ike=3des-sha
| ike proposal: 3DES_CBC/HMAC_SHA1/MODP_1536, 3DES_CBC/HMAC_SHA1/MODP_1024, 
added connection description "test"
| 
172.22.1.0/24===192.168.1.6[192.168.1.6]---172.22.1.254...192.168.1.7[192.168.1.7]===192.168.32.0/24
| ike_life: 3600s; ipsec_life: 1200s; rekey_margin: 180s; rekey_fuzz: 100%; 
keyingtries: 1; policy: PSK+ENCRYPT+TUNNEL+PFS
| next event EVENT_REINIT_SECRET in 3600 seconds
| 
| *received whack message
| creating state object #1 at 0x85ca648
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  00 00 00 00  00 00 00 00
| peer:  c0 a8 01 07
| state hash entry 8
| inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #1
| Queuing pending Quick Mode with 192.168.1.7 "test"
"test" #1: initiating Main Mode
| ike proposal: 3DES_CBC/HMAC_SHA1/MODP_1536, 3DES_CBC/HMAC_SHA1/MODP_1024, 
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
| next event EVENT_RETRANSMIT in 10 seconds for #1
| 
| *received 172 bytes from 192.168.1.7:500 on eth1
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| state object not found
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  00 00 00 00  00 00 00 00
| peer:  c0 a8 01 07
| state hash entry 8
| state object #1 found, in STATE_MAIN_I1
"test" #1: ignoring Vendor ID payload [strongSwan]
"test" #1: ignoring Vendor ID payload [Cisco-Unity]
"test" #1: received Vendor ID payload [XAUTH]
"test" #1: received Vendor ID payload [Dead Peer Detection]
"test" #1: received Vendor ID payload [RFC 3947]
"test" #1: enabling possible NAT-traversal with method 3
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  00 00 00 00  00 00 00 00
| peer:  c0 a8 01 07
| state hash entry 8
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
| next event EVENT_RETRANSMIT in 10 seconds for #1
| 
| *received 292 bytes from 192.168.1.7:500 on eth1
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| state object #1 found, in STATE_MAIN_I2
"test" #1: NAT-Traversal: Result using RFC 3947: no NAT detected
| inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20 seconds
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
| next event EVENT_RETRANSMIT in 10 seconds for #1
| 
| *received 68 bytes from 192.168.1.7:500 on eth1
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| state object #1 found, in STATE_MAIN_I3
"test" #1: Peer ID is ID_IPV4_ADDR: '192.168.1.7'
| peer CA:      %none
| required CA:  %none
| inserting event EVENT_SA_REPLACE, timeout in 3269 seconds for #1
"test" #1: ISAKMP SA established
| unqueuing pending Quick Mode with 192.168.1.7 "test"
| duplicating state object #1
| creating state object #2 at 0x85cc8e0
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #2
"test" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
| esp proposal: 3DES_CBC/HMAC_SHA1, 
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #2
| next event EVENT_RETRANSMIT in 10 seconds for #2
| 
| *received 356 bytes from 192.168.1.7:500 on eth1
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| state object #2 found, in STATE_QUICK_I1
| our client is subnet 172.22.1.0/24
| our client protocol/port is 0/0
| peer client is subnet 192.168.32.0/24
| peer client protocol/port is 0/0
| kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
| install_ipsec_sa() for #2: inbound and outbound
| route owner of "test" unrouted: NULL; eroute owner: NULL
| add inbound eroute 192.168.32.0/24:0 -> 172.22.1.0/24:0 => 
[email protected]:0
| sr for #2: unrouted
| route owner of "test" unrouted: NULL; eroute owner: NULL
| eroute_connection add eroute 172.22.1.0/24:0 -> 192.168.32.0/24:0 => 
[email protected]:0
| executing up-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='up-client' 
PLUTO_CONNECTION='test' PLUTO_NEXT_HOP='172.22.1.254' PLUTO_INTERFACE='eth1' 
PLUTO_REQID='16385' PLUTO_ME='192.168.1.6' PLUTO_MY_ID='192.168.1.6' 
PLUTO_MY_CLIENT='172.22.1.0/24' PLUTO_MY_CLIENT_NET='172.22.1.0' 
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' 
PLUTO_PEER='192.168.1.7' PLUTO_PEER_ID='192.168.1.7' 
PLUTO_PEER_CLIENT='192.168.32.0/24' PLUTO_PEER_CLIENT_NET='192.168.32.0' 
PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' 
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' ipsec _updown iptables
| route_and_eroute: firewall_notified: true
| executing prepare-client: 2>&1 PLUTO_VERSION='1.1' 
PLUTO_VERB='prepare-client' PLUTO_CONNECTION='test' 
PLUTO_NEXT_HOP='172.22.1.254' PLUTO_INTERFACE='eth1' PLUTO_REQID='16385' 
PLUTO_ME='192.168.1.6' PLUTO_MY_ID='192.168.1.6' 
PLUTO_MY_CLIENT='172.22.1.0/24' PLUTO_MY_CLIENT_NET='172.22.1.0' 
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' 
PLUTO_PEER='192.168.1.7' PLUTO_PEER_ID='192.168.1.7' 
PLUTO_PEER_CLIENT='192.168.32.0/24' PLUTO_PEER_CLIENT_NET='192.168.32.0' 
PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' 
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' ipsec _updown iptables
| executing route-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='route-client' 
PLUTO_CONNECTION='test' PLUTO_NEXT_HOP='172.22.1.254' PLUTO_INTERFACE='eth1' 
PLUTO_REQID='16385' PLUTO_ME='192.168.1.6' PLUTO_MY_ID='192.168.1.6' 
PLUTO_MY_CLIENT='172.22.1.0/24' PLUTO_MY_CLIENT_NET='172.22.1.0' 
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' 
PLUTO_PEER='192.168.1.7' PLUTO_PEER_ID='192.168.1.7' 
PLUTO_PEER_CLIENT='192.168.32.0/24' PLUTO_PEER_CLIENT_NET='192.168.32.0' 
PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' 
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' ipsec _updown iptables
| route_and_eroute: instance "test", setting eroute_owner 
{spd=0x85c9c54,sr=0x85c9c54} to #2 (was #0) (newest_ipsec_sa=#0)
| inserting event EVENT_SA_REPLACE, timeout in 950 seconds for #2
"test" #2: sent QI2, IPsec SA established {ESP=>0x97e0be80 <0x64f28598}
| next event EVENT_NAT_T_KEEPALIVE in 20 seconds
| 
| *received whack message
shutting down
forgetting secrets
"test": deleting connection
"test" #2: deleting state (STATE_QUICK_I2)
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| executing down-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='down-client' 
PLUTO_CONNECTION='test' PLUTO_NEXT_HOP='172.22.1.254' PLUTO_INTERFACE='eth1' 
PLUTO_REQID='16385' PLUTO_ME='192.168.1.6' PLUTO_MY_ID='192.168.1.6' 
PLUTO_MY_CLIENT='172.22.1.0/24' PLUTO_MY_CLIENT_NET='172.22.1.0' 
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' 
PLUTO_PEER='192.168.1.7' PLUTO_PEER_ID='192.168.1.7' 
PLUTO_PEER_CLIENT='192.168.32.0/24' PLUTO_PEER_CLIENT_NET='192.168.32.0' 
PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' 
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' ipsec _updown iptables
| replace with shunt eroute 192.168.32.0/24:0 -> 172.22.1.0/24:0 => 
[email protected]:0
| eroute_connection replace with shunt eroute 172.22.1.0/24:0 -> 
192.168.32.0/24:0 => %trap:0
| delete inbound eroute 192.168.32.0/24:0 -> 172.22.1.0/24:0 => 
[email protected]:0
"test" #1: deleting state (STATE_MAIN_I4)
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 07
| state hash entry 13
| delete eroute 192.168.32.0/24:0 -> 172.22.1.0/24:0 => [email protected]:0
| eroute_connection delete eroute 172.22.1.0/24:0 -> 192.168.32.0/24:0 => 
[email protected]:0
| route owner of "test" unrouted: NULL
| executing unroute-client: 2>&1 PLUTO_VERSION='1.1' 
PLUTO_VERB='unroute-client' PLUTO_CONNECTION='test' 
PLUTO_NEXT_HOP='172.22.1.254' PLUTO_INTERFACE='eth1' PLUTO_REQID='16385' 
PLUTO_ME='192.168.1.6' PLUTO_MY_ID='192.168.1.6' 
PLUTO_MY_CLIENT='172.22.1.0/24' PLUTO_MY_CLIENT_NET='172.22.1.0' 
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' 
PLUTO_PEER='192.168.1.7' PLUTO_PEER_ID='192.168.1.7' 
PLUTO_PEER_CLIENT='192.168.32.0/24' PLUTO_PEER_CLIENT_NET='192.168.32.0' 
PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' 
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' ipsec _updown iptables


===================================================================
pluto.log 192.168.1.7
===================================================================
| *received 264 bytes from 192.168.1.6:500 on eth0
packet from 192.168.1.6:500: ignoring Vendor ID payload [strongSwan]
packet from 192.168.1.6:500: received Vendor ID payload [XAUTH]
packet from 192.168.1.6:500: received Vendor ID payload [Dead Peer Detection]
packet from 192.168.1.6:500: received Vendor ID payload [RFC 3947]
packet from 192.168.1.6:500: ignoring Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03]
packet from 192.168.1.6:500: ignoring Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02]
packet from 192.168.1.6:500: ignoring Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n]
packet from 192.168.1.6:500: ignoring Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00]
| preparse_isakmp_policy: peer requests PSK authentication
| creating state object #8 at 0x91690
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #8
"test" #8: responding to Main Mode
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #8
| next event EVENT_RETRANSMIT in 10 seconds for #8
| 
| *received 292 bytes from 192.168.1.6:500 on eth0
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object #8 found, in STATE_MAIN_R1
"test" #8: NAT-Traversal: Result using RFC 3947: no NAT detected
| inserting event EVENT_NAT_T_KEEPALIVE, timeout in 20 seconds
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #8
| next event EVENT_RETRANSMIT in 10 seconds for #8
| 
| *received 68 bytes from 192.168.1.6:500 on eth0
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object #8 found, in STATE_MAIN_R2
"test" #8: Peer ID is ID_IPV4_ADDR: '192.168.1.6'
| peer CA:      %none
| current connection is a full match -- no need to look further
| offered CA:   %none
| inserting event (12), timeout in 20 seconds for #8
| inserting event EVENT_SA_REPLACE, timeout in 3510 seconds for #8
"test" #8: sent MR3, ISAKMP SA established
| next event EVENT_NAT_T_KEEPALIVE in 20 seconds
| 
| *received 356 bytes from 192.168.1.6:500 on eth0
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object not found
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object #8 found, in STATE_MAIN_R3
| peer client is subnet 172.22.1.0/24
| peer client protocol/port is 0/0
| our client is subnet 192.168.32.0/24
| our client protocol/port is 0/0
| duplicating state object #8
| creating state object #9 at 0x92668
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #9
"test" #9: responding to Quick Mode
| kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
| route owner of "test" prospective erouted: self
| install_inbound_ipsec_sa() checking if we can route
| route owner of "test" prospective erouted: self; eroute owner: self
| add inbound eroute 172.22.1.0/24:0 -> 192.168.32.0/24:0 => 
[email protected]:0
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #9
| next event EVENT_RETRANSMIT in 10 seconds for #9
| 
| *received 52 bytes from 192.168.1.6:500 on eth0
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object #9 found, in STATE_QUICK_R1
| install_ipsec_sa() for #9: outbound only
| route owner of "test" prospective erouted: self; eroute owner: self
| sr for #9: prospective erouted
| route owner of "test" prospective erouted: self; eroute owner: self
| eroute_connection replace eroute 192.168.32.0/24:0 -> 172.22.1.0/24:0 => 
[email protected]:0
| executing up-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='up-client' 
PLUTO_CONNECTION='test' PLUTO_NEXT_HOP='192.168.1.6' PLUTO_INTERFACE='eth0' 
PLUTO_REQID='16385' PLUTO_ME='192.168.1.7' PLUTO_MY_ID='192.168.1.7' 
PLUTO_MY_CLIENT='192.168.32.0/24' PLUTO_MY_CLIENT_NET='192.168.32.0' 
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' 
PLUTO_PEER='192.168.1.6' PLUTO_PEER_ID='192.168.1.6' 
PLUTO_PEER_CLIENT='172.22.1.0/24' PLUTO_PEER_CLIENT_NET='172.22.1.0' 
PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' 
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' ipsec _updown iptables
| route_and_eroute: firewall_notified: true
| route_and_eroute: instance "test", setting eroute_owner 
{spd=0x8f55c,sr=0x8f55c} to #9 (was #0) (newest_ipsec_sa=#0)
| inserting event EVENT_SA_REPLACE, timeout in 1110 seconds for #9
"test" #9: IPsec SA established {ESP=>0x64f28598 <0x97e0be80}
| next event EVENT_NAT_T_KEEPALIVE in 20 seconds
| 
| *received 68 bytes from 192.168.1.6:500 on eth0
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object #8 found, in STATE_MAIN_R3
"test" #8: received Delete SA(0x64f28598) payload: deleting IPSEC State #9
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| executing down-client: 2>&1 PLUTO_VERSION='1.1' PLUTO_VERB='down-client' 
PLUTO_CONNECTION='test' PLUTO_NEXT_HOP='192.168.1.6' PLUTO_INTERFACE='eth0' 
PLUTO_REQID='16385' PLUTO_ME='192.168.1.7' PLUTO_MY_ID='192.168.1.7' 
PLUTO_MY_CLIENT='192.168.32.0/24' PLUTO_MY_CLIENT_NET='192.168.32.0' 
PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' 
PLUTO_PEER='192.168.1.6' PLUTO_PEER_ID='192.168.1.6' 
PLUTO_PEER_CLIENT='172.22.1.0/24' PLUTO_PEER_CLIENT_NET='172.22.1.0' 
PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' 
PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' ipsec _updown iptables
| replace with shunt eroute 172.22.1.0/24:0 -> 192.168.32.0/24:0 => 
[email protected]:0
| eroute_connection replace with shunt eroute 192.168.32.0/24:0 -> 
172.22.1.0/24:0 => %trap:0
| delete inbound eroute 172.22.1.0/24:0 -> 192.168.32.0/24:0 => 
[email protected]:0
| next event EVENT_NAT_T_KEEPALIVE in 10 seconds
| 
| *received 84 bytes from 192.168.1.6:500 on eth0
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object #8 found, in STATE_MAIN_R3
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| state object #8 found, in STATE_MAIN_R3
"test" #8: received Delete SA payload: deleting ISAKMP State #8
| event (1075548268) to be deleted not found
| ICOOKIE:  fa 68 13 d6  3a b1 be 62
| RCOOKIE:  b6 74 1a 1d  d6 41 bf 60
| peer:  c0 a8 01 06
| state hash entry 12
| next event EVENT_NAT_T_KEEPALIVE in 10 seconds

--
Thanks,
kotaro



_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to