Hi, I'm able to connect and get the "tunnel enabled" message using Shrew 2.1.5 with:
Windows 7 Home Premium 64 bit NETGEAR ProSafe VPN Firewall FVS338 firmware: 3.0.5-24 I've configured using the Netgear router example. However, there's no network after connecting. I get this error message in the DNS trace log: 10/04/13 16:24:50 !! : get_fwd - failed to obtain local interface 10/04/13 16:24:50 !! : no arp entry for dst : 192.168.0.1 Full trace logs are found below. Any thoughts? Thanks, Gary DNS trace log: 10/04/13 16:13:14 ## : DNS Transparent Proxy Daemon, ver 2.1.5 10/04/13 16:13:14 ## : Copyright 2009 Shrew Soft Inc. 10/04/13 16:13:14 ii : ipc server process thread begin ... 10/04/13 16:13:14 ii : network process thread begin ... 10/04/13 16:13:14 ii : opened vflt device 10/04/13 16:24:50 !! : get_fwd - failed to obtain local interface 10/04/13 16:24:50 !! : no arp entry for dst : 192.168.0.1 IPSec trace log shows this message: 10/04/13 16:24:54 ii : added sa divert rule for 45.56.209.106->192.168.1.104 IKE Service trace log; 10/04/13 16:13:14 ## : IKE Daemon, ver 2.1.5 10/04/13 16:13:14 ## : Copyright 2009 Shrew Soft Inc. 10/04/13 16:13:14 ## : This product linked OpenSSL 0.9.8h 28 May 2008 10/04/13 16:13:14 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log' 10/04/13 16:13:14 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap' 10/04/13 16:13:14 ii : rebuilding vnet device list ... 10/04/13 16:13:14 ii : device ROOT\VNET\0000 disabled 10/04/13 16:13:14 ii : device ROOT\VNET\0001 disabled 10/04/13 16:13:14 ii : pfkey process thread begin ... 10/04/13 16:13:14 !! : unable to connect to pfkey interface 10/04/13 16:13:14 ii : network process thread begin ... 10/04/13 16:13:14 ii : ipc server process thread begin ... 10/04/13 16:16:11 ii : ipc client process thread begin ... 10/04/13 16:16:11 <A : peer config add message 10/04/13 16:16:11 <A : proposal config message 10/04/13 16:16:11 <A : proposal config message 10/04/13 16:16:11 <A : client config message 10/04/13 16:16:11 <A : xauth username message 10/04/13 16:16:11 <A : xauth password message 10/04/13 16:16:11 <A : local id 'client.domain.com' message 10/04/13 16:16:11 <A : preshared key message 10/04/13 16:16:11 <A : remote resource message 10/04/13 16:16:11 <A : peer tunnel enable message 10/04/13 16:16:11 ii : local supports XAUTH 10/04/13 16:16:11 ii : local supports nat-t ( draft v00 ) 10/04/13 16:16:11 ii : local supports nat-t ( draft v01 ) 10/04/13 16:16:11 ii : local supports nat-t ( draft v02 ) 10/04/13 16:16:11 ii : local supports nat-t ( draft v03 ) 10/04/13 16:16:11 ii : local supports nat-t ( rfc ) 10/04/13 16:16:11 ii : local supports FRAGMENTATION 10/04/13 16:16:11 ii : local is SHREW SOFT compatible 10/04/13 16:16:11 ii : local is NETSCREEN compatible 10/04/13 16:16:11 ii : local is SIDEWINDER compatible 10/04/13 16:16:11 ii : local is CISCO UNITY compatible 10/04/13 16:16:11 >= : cookies 2f08528a54fb6d8c:0000000000000000 10/04/13 16:16:11 >= : message 00000000 10/04/13 16:16:12 ii : processing phase1 packet ( 420 bytes ) 10/04/13 16:16:12 =< : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:12 =< : message 00000000 10/04/13 16:16:12 ii : matched isakmp proposal #1 transform #14 10/04/13 16:16:12 ii : - transform = ike 10/04/13 16:16:12 ii : - cipher type = 3des 10/04/13 16:16:12 ii : - key length = default 10/04/13 16:16:12 ii : - hash type = sha1 10/04/13 16:16:12 ii : - dh group = modp-1024 10/04/13 16:16:12 ii : - auth type = xauth-initiator-psk 10/04/13 16:16:12 ii : - life seconds = 86400 10/04/13 16:16:12 ii : - life kbytes = 0 10/04/13 16:16:12 ii : phase1 id match ( natt prevents ip match ) 10/04/13 16:16:12 ii : received = ipv4-host 45.56.209.106 10/04/13 16:16:12 ii : peer is CISCO UNITY compatible 10/04/13 16:16:12 ii : peer is IPSEC-TOOLS compatible 10/04/13 16:16:12 ii : peer supports nat-t ( draft v02 ) 10/04/13 16:16:12 ii : nat discovery - local address is translated 10/04/13 16:16:12 ii : switching to src nat-t udp port 4500 10/04/13 16:16:12 ii : switching to dst nat-t udp port 4500 10/04/13 16:16:12 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:12 >= : message 00000000 10/04/13 16:16:12 ii : phase1 sa established 10/04/13 16:16:12 ii : 45.56.209.106:4500 <-> 192.168.1.104:4500 10/04/13 16:16:12 ii : 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:12 ii : sending peer INITIAL-CONTACT notification 10/04/13 16:16:12 ii : - 192.168.1.104:4500 -> 45.56.209.106:4500 10/04/13 16:16:12 ii : - isakmp spi = 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:12 ii : - data size 0 10/04/13 16:16:12 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:12 >= : message a13bd21c 10/04/13 16:16:13 ii : processing config packet ( 76 bytes ) 10/04/13 16:16:13 =< : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:13 =< : message b00fd17c 10/04/13 16:16:13 ii : - xauth authentication type 10/04/13 16:16:13 ii : - xauth username 10/04/13 16:16:13 ii : - xauth password 10/04/13 16:16:13 ii : received basic xauth request - 10/04/13 16:16:13 ii : - standard xauth username 10/04/13 16:16:13 ii : - standard xauth password 10/04/13 16:16:13 ii : sending xauth response for gary 10/04/13 16:16:13 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:13 >= : message b00fd17c 10/04/13 16:16:13 ii : processing config packet ( 68 bytes ) 10/04/13 16:16:13 =< : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:13 =< : message da7182bd 10/04/13 16:16:13 ii : received xauth result - 10/04/13 16:16:13 ii : user gary authentication succeeded 10/04/13 16:16:13 ii : sending xauth acknowledge 10/04/13 16:16:13 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:13 >= : message da7182bd 10/04/13 16:16:13 ii : building config attribute list 10/04/13 16:16:13 ii : sending config pull request 10/04/13 16:16:13 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:13 >= : message 21ed5828 10/04/13 16:16:13 ii : processing config packet ( 84 bytes ) 10/04/13 16:16:13 =< : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:13 =< : message 21ed5828 10/04/13 16:16:13 ii : received config pull response 10/04/13 16:16:13 !! : invalid private netmask, defaulting to class c 10/04/13 16:16:13 ii : waiting for vnet to arrive ... 10/04/13 16:16:14 !! : VNET adapter MTU defaulted to 1500. 10/04/13 16:16:14 ii : creating IPSEC INBOUND policy ANY:192.168.0.0/24:* -> ANY:192.168.0.240:* 10/04/13 16:16:14 ii : creating IPSEC OUTBOUND policy ANY:192.168.0.240:* -> ANY:192.168.0.0/24:* 10/04/13 16:16:19 !! : failed to create IPSEC policy route for 192.168.0.0/24 10/04/13 16:16:19 ii : split DNS bypassed ( no split domains defined ) 10/04/13 16:16:19 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:19 >= : message cc444724 10/04/13 16:16:20 ii : processing phase2 packet ( 156 bytes ) 10/04/13 16:16:20 =< : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:20 =< : message cc444724 10/04/13 16:16:20 ii : matched ipsec-esp proposal #1 transform #2 10/04/13 16:16:20 ii : - transform = esp-3des 10/04/13 16:16:20 ii : - key length = default 10/04/13 16:16:20 ii : - encap mode = udp-tunnel ( draft ) 10/04/13 16:16:20 ii : - msg auth = hmac-sha 10/04/13 16:16:20 ii : - pfs dh group = none 10/04/13 16:16:20 ii : - life seconds = 3600 10/04/13 16:16:20 ii : - life kbytes = 0 10/04/13 16:16:20 ii : phase2 ids accepted 10/04/13 16:16:20 ii : - loc ANY:192.168.0.240:* -> ANY:192.168.0.0/24:* 10/04/13 16:16:20 ii : - rmt ANY:192.168.0.0/24:* -> ANY:192.168.0.240:* 10/04/13 16:16:20 ii : phase2 sa established 10/04/13 16:16:20 ii : 192.168.1.104:4500 <-> 45.56.209.106:4500 10/04/13 16:16:20 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:16:20 >= : message cc444724 10/04/13 16:17:03 <A : peer tunnel disable message 10/04/13 16:17:03 ii : removing IPSEC INBOUND policy ANY:192.168.0.0/24:* -> ANY:192.168.0.240:* 10/04/13 16:17:03 ii : removing IPSEC OUTBOUND policy ANY:192.168.0.240:* -> ANY:192.168.0.0/24:* 10/04/13 16:17:04 DB : removing tunnel config references 10/04/13 16:17:04 DB : removing tunnel phase2 references 10/04/13 16:17:04 ii : sending peer DELETE message 10/04/13 16:17:04 ii : - 192.168.1.104:4500 -> 45.56.209.106:4500 10/04/13 16:17:04 ii : - ipsec-esp spi = 0x85091999 10/04/13 16:17:04 ii : - data size 0 10/04/13 16:17:04 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:17:04 >= : message 024c0707 10/04/13 16:17:04 ii : phase2 removal before expire time 10/04/13 16:17:04 DB : removing tunnel phase1 references 10/04/13 16:17:04 ii : sending peer DELETE message 10/04/13 16:17:04 ii : - 192.168.1.104:4500 -> 45.56.209.106:4500 10/04/13 16:17:04 ii : - isakmp spi = 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:17:04 ii : - data size 0 10/04/13 16:17:04 >= : cookies 2f08528a54fb6d8c:a1763b865f848422 10/04/13 16:17:04 >= : message 02e71f4e 10/04/13 16:17:04 ii : phase1 removal before expire time 10/04/13 16:17:04 DB : removing all peer tunnel refrences 10/04/13 16:17:04 ii : ipc client process thread exit ... 10/04/13 16:24:47 ii : ipc client process thread begin ... 10/04/13 16:24:47 <A : peer config add message 10/04/13 16:24:48 <A : proposal config message 10/04/13 16:24:48 <A : proposal config message 10/04/13 16:24:48 <A : client config message 10/04/13 16:24:48 <A : xauth username message 10/04/13 16:24:48 <A : xauth password message 10/04/13 16:24:48 <A : local id 'client.domain.com' message 10/04/13 16:24:48 <A : preshared key message 10/04/13 16:24:48 <A : remote resource message 10/04/13 16:24:48 <A : peer tunnel enable message 10/04/13 16:24:48 ii : local supports XAUTH 10/04/13 16:24:48 ii : local supports nat-t ( draft v00 ) 10/04/13 16:24:48 ii : local supports nat-t ( draft v01 ) 10/04/13 16:24:48 ii : local supports nat-t ( draft v02 ) 10/04/13 16:24:48 ii : local supports nat-t ( draft v03 ) 10/04/13 16:24:48 ii : local supports nat-t ( rfc ) 10/04/13 16:24:48 ii : local supports FRAGMENTATION 10/04/13 16:24:48 ii : local is SHREW SOFT compatible 10/04/13 16:24:48 ii : local is NETSCREEN compatible 10/04/13 16:24:48 ii : local is SIDEWINDER compatible 10/04/13 16:24:48 ii : local is CISCO UNITY compatible 10/04/13 16:24:48 >= : cookies bf9da4033774838a:0000000000000000 10/04/13 16:24:48 >= : message 00000000 10/04/13 16:24:49 ii : processing phase1 packet ( 420 bytes ) 10/04/13 16:24:49 =< : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:49 =< : message 00000000 10/04/13 16:24:49 ii : matched isakmp proposal #1 transform #14 10/04/13 16:24:49 ii : - transform = ike 10/04/13 16:24:49 ii : - cipher type = 3des 10/04/13 16:24:49 ii : - key length = default 10/04/13 16:24:49 ii : - hash type = sha1 10/04/13 16:24:49 ii : - dh group = modp-1024 10/04/13 16:24:49 ii : - auth type = xauth-initiator-psk 10/04/13 16:24:49 ii : - life seconds = 86400 10/04/13 16:24:49 ii : - life kbytes = 0 10/04/13 16:24:49 ii : phase1 id match ( natt prevents ip match ) 10/04/13 16:24:49 ii : received = ipv4-host 45.56.209.106 10/04/13 16:24:49 ii : peer is CISCO UNITY compatible 10/04/13 16:24:49 ii : peer is IPSEC-TOOLS compatible 10/04/13 16:24:49 ii : peer supports nat-t ( draft v02 ) 10/04/13 16:24:49 ii : nat discovery - local address is translated 10/04/13 16:24:49 ii : switching to src nat-t udp port 4500 10/04/13 16:24:49 ii : switching to dst nat-t udp port 4500 10/04/13 16:24:49 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:49 >= : message 00000000 10/04/13 16:24:49 ii : phase1 sa established 10/04/13 16:24:49 ii : 45.56.209.106:4500 <-> 192.168.1.104:4500 10/04/13 16:24:49 ii : bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:49 ii : sending peer INITIAL-CONTACT notification 10/04/13 16:24:49 ii : - 192.168.1.104:4500 -> 45.56.209.106:4500 10/04/13 16:24:49 ii : - isakmp spi = bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:49 ii : - data size 0 10/04/13 16:24:49 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:49 >= : message ee492227 10/04/13 16:24:50 ii : processing config packet ( 76 bytes ) 10/04/13 16:24:50 =< : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:50 =< : message c0d069ef 10/04/13 16:24:50 ii : - xauth authentication type 10/04/13 16:24:50 ii : - xauth username 10/04/13 16:24:50 ii : - xauth password 10/04/13 16:24:50 ii : received basic xauth request - 10/04/13 16:24:50 ii : - standard xauth username 10/04/13 16:24:50 ii : - standard xauth password 10/04/13 16:24:50 ii : sending xauth response for gary 10/04/13 16:24:50 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:50 >= : message c0d069ef 10/04/13 16:24:50 ii : processing config packet ( 68 bytes ) 10/04/13 16:24:50 =< : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:50 =< : message c861446b 10/04/13 16:24:50 ii : received xauth result - 10/04/13 16:24:50 ii : user gary authentication succeeded 10/04/13 16:24:50 ii : sending xauth acknowledge 10/04/13 16:24:50 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:50 >= : message c861446b 10/04/13 16:24:50 ii : building config attribute list 10/04/13 16:24:50 ii : sending config pull request 10/04/13 16:24:50 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:50 >= : message ed0485eb 10/04/13 16:24:50 ii : processing config packet ( 84 bytes ) 10/04/13 16:24:50 =< : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:50 =< : message ed0485eb 10/04/13 16:24:50 ii : received config pull response 10/04/13 16:24:50 !! : invalid private netmask, defaulting to class c 10/04/13 16:24:50 ii : creating IPSEC INBOUND policy ANY:192.168.0.0/24:* -> ANY:192.168.0.240:* 10/04/13 16:24:50 ii : creating IPSEC OUTBOUND policy ANY:192.168.0.240:* -> ANY:192.168.0.0/24:* 10/04/13 16:24:50 ii : created IPSEC policy route for 192.168.0.0/24 10/04/13 16:24:50 ii : split DNS bypassed ( no split domains defined ) 10/04/13 16:24:50 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:50 >= : message 5ae02808 10/04/13 16:24:54 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:54 >= : message 0eb44466 10/04/13 16:24:54 ii : processing phase2 packet ( 292 bytes ) 10/04/13 16:24:54 =< : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:54 =< : message 0eb44466 10/04/13 16:24:54 ii : matched ipsec-esp proposal #1 transform #1 10/04/13 16:24:54 ii : - transform = esp-3des 10/04/13 16:24:54 ii : - key length = default 10/04/13 16:24:54 ii : - encap mode = udp-tunnel ( draft ) 10/04/13 16:24:54 ii : - msg auth = hmac-sha 10/04/13 16:24:54 ii : - pfs dh group = modp-1024 10/04/13 16:24:54 ii : - life seconds = 3600 10/04/13 16:24:54 ii : - life kbytes = 0 10/04/13 16:24:54 ii : phase2 ids accepted 10/04/13 16:24:54 ii : - loc ANY:192.168.0.240:* -> ANY:192.168.0.0/24:* 10/04/13 16:24:54 ii : - rmt ANY:192.168.0.0/24:* -> ANY:192.168.0.240:* 10/04/13 16:24:54 ii : phase2 sa established 10/04/13 16:24:54 ii : 192.168.1.104:4500 <-> 66.66.666.106:4500 10/04/13 16:24:54 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:54 >= : message 0eb44466 10/04/13 16:24:55 -> : resend 1 phase2 packet(s) 192.168.1.104:4500 -> 66.66.666.106:4500 10/04/13 16:24:56 ii : processing phase2 packet ( 292 bytes ) 10/04/13 16:24:56 =< : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:56 =< : message 5ae02808 10/04/13 16:24:56 ii : matched ipsec-esp proposal #1 transform #1 10/04/13 16:24:56 ii : - transform = esp-3des 10/04/13 16:24:56 ii : - key length = default 10/04/13 16:24:56 ii : - encap mode = udp-tunnel ( draft ) 10/04/13 16:24:56 ii : - msg auth = hmac-sha 10/04/13 16:24:56 ii : - pfs dh group = modp-1024 10/04/13 16:24:56 ii : - life seconds = 3600 10/04/13 16:24:56 ii : - life kbytes = 0 10/04/13 16:24:56 ii : phase2 ids accepted 10/04/13 16:24:56 ii : - loc ANY:192.168.0.240:* -> ANY:192.168.0.0/24:* 10/04/13 16:24:56 ii : - rmt ANY:192.168.0.0/24:* -> ANY:192.168.0.240:* 10/04/13 16:24:56 ii : phase2 sa established 10/04/13 16:24:56 ii : 192.168.1.104:4500 <-> 66.66.666.106:4500 10/04/13 16:24:56 >= : cookies bf9da4033774838a:c17776b6f69438e9 10/04/13 16:24:56 >= : message 5ae02808 _______________________________________________ vpn-help mailing list [email protected] http://lists.shrew.net/mailman/listinfo/vpn-help
