[Discuss] OpenSWAN VPN

Matt Shields matt at mattshields.org
Thu Jul 9 10:44:37 EDT 2015


Does anyone have a working OpenSWAN config or can you see what the issue
might be below?  Current test environment is two Amazon VPC's with a VPN
server NAT'd behind firewall, UDP ports 500 & 4500 are being forwarded.
I'm using the config below and it "seems" to connect, but can't ping/ssh to
anything on either side.

DC1:
 - External IP x.x.x.x
 - Internal Subnet 10.10.0.0/16

DC2:
 - External IP y.y.y.y
 - Internal Subnet 192.168.0.0/24

#this config resides on DC1 vpn server
config setup
        # Debug-logging controls:  "none" for (almost) none, "all" for lots.
        # klipsdebug=none
        # plutodebug="control parsing"
        # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
#       interfaces=%defaultroute
        klipsdebug=none
#       nhelpers=0
        plutodebug=none
        plutostderrlog=/var/log/pluto.log
        protostack=netkey
        nat_traversal=yes
        virtual_private=%v4:10.10.0.0/16,%v4:!192.168.0.0/24
        oe=off
        # Enable this if you see "failed to find any available worker"
        # nhelpers=0
#       forceencaps=yes
conn dc1-to-dc2
        auto=start
        type=tunnel

        left=10.10.10.43
        leftsourceip=x.x.x.x
        leftsubnet=10.10.0.0/16
        leftid=x.x.x.x

        right=y.y.y.y
        rightsubnet=192.168.0.0/24
        rightid=y.y.y.y

        #phase 1 encryption-integrity-DiffieHellman
        keyexchange=ike
        ike=3des-md5-modp1024,aes256-sha1-modp1024
        ikelifetime=86400s
        authby=secret #use presharedkey
        rekey=yes  #should we rekey when key lifetime is about to expire

        #phase 2 encryption-pfsgroup
        phase2=esp #esp for encryption | ah for authentication only
        phase2alg=3des-md5;modp1024
        pfs=no
        forceencaps=yes

#this config resides on DC2 vpn server
config setup
        # Debug-logging controls:  "none" for (almost) none, "all" for lots.
        # klipsdebug=none
        # plutodebug="control parsing"
        # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
#       interfaces=%defaultroute
        klipsdebug=none
#       nhelpers=0
        plutodebug=none
        plutostderrlog=/var/log/pluto.log
        protostack=netkey
        nat_traversal=yes
        virtual_private=%v4:192.168.0.0/24,%v4:!10.10.0.0/16
        oe=off
        # Enable this if you see "failed to find any available worker"
        # nhelpers=0
#       forceencaps=yes
conn dc2-to-dc1
        auto=start
        type=tunnel

        left=192.168.0.22
        leftsourceip=y.y.y.y
        leftsubnet=192.168.0.0/24
        leftid=y.y.y.y

        right=x.x.x.x
        rightsubnet=10.10.0.0/16
        rightid=x.x.x.x

        #phase 1 encryption-integrity-DiffieHellman
        keyexchange=ike
        ike=3des-md5-modp1024,aes256-sha1-modp1024
        ikelifetime=86400s
        authby=secret #use presharedkey
        rekey=yes  #should we rekey when key lifetime is about to expire

        #phase 2 encryption-pfsgroup
        phase2=esp #esp for encryption | ah for authentication only
        phase2alg=3des-md5;modp1024
        pfs=no
        forceencaps=yes

Matt



More information about the Discuss mailing list