[Discuss] OpenSWAN VPN

Matthew Gillen me at mattgillen.net
Fri Jul 10 18:58:39 EDT 2015


Not familiar with OpenSWAN, but in OpenVPN sometimes you have to push
routes to the clients to force traffic through.

Does your routing table look right?

On 7/9/2015 10:44 AM, Matt Shields wrote:
> Does anyone have a working OpenSWAN config or can you see what the issue
> might be below?  Current test environment is two Amazon VPC's with a VPN
> server NAT'd behind firewall, UDP ports 500 & 4500 are being forwarded.
> I'm using the config below and it "seems" to connect, but can't ping/ssh to
> anything on either side.
> 
> DC1:
>  - External IP x.x.x.x
>  - Internal Subnet 10.10.0.0/16
> 
> DC2:
>  - External IP y.y.y.y
>  - Internal Subnet 192.168.0.0/24
> 
> #this config resides on DC1 vpn server
> config setup
>         # Debug-logging controls:  "none" for (almost) none, "all" for lots.
>         # klipsdebug=none
>         # plutodebug="control parsing"
>         # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
> #       interfaces=%defaultroute
>         klipsdebug=none
> #       nhelpers=0
>         plutodebug=none
>         plutostderrlog=/var/log/pluto.log
>         protostack=netkey
>         nat_traversal=yes
>         virtual_private=%v4:10.10.0.0/16,%v4:!192.168.0.0/24
>         oe=off
>         # Enable this if you see "failed to find any available worker"
>         # nhelpers=0
> #       forceencaps=yes
> conn dc1-to-dc2
>         auto=start
>         type=tunnel
> 
>         left=10.10.10.43
>         leftsourceip=x.x.x.x
>         leftsubnet=10.10.0.0/16
>         leftid=x.x.x.x
> 
>         right=y.y.y.y
>         rightsubnet=192.168.0.0/24
>         rightid=y.y.y.y
> 
>         #phase 1 encryption-integrity-DiffieHellman
>         keyexchange=ike
>         ike=3des-md5-modp1024,aes256-sha1-modp1024
>         ikelifetime=86400s
>         authby=secret #use presharedkey
>         rekey=yes  #should we rekey when key lifetime is about to expire
> 
>         #phase 2 encryption-pfsgroup
>         phase2=esp #esp for encryption | ah for authentication only
>         phase2alg=3des-md5;modp1024
>         pfs=no
>         forceencaps=yes
> 
> #this config resides on DC2 vpn server
> config setup
>         # Debug-logging controls:  "none" for (almost) none, "all" for lots.
>         # klipsdebug=none
>         # plutodebug="control parsing"
>         # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
> #       interfaces=%defaultroute
>         klipsdebug=none
> #       nhelpers=0
>         plutodebug=none
>         plutostderrlog=/var/log/pluto.log
>         protostack=netkey
>         nat_traversal=yes
>         virtual_private=%v4:192.168.0.0/24,%v4:!10.10.0.0/16
>         oe=off
>         # Enable this if you see "failed to find any available worker"
>         # nhelpers=0
> #       forceencaps=yes
> conn dc2-to-dc1
>         auto=start
>         type=tunnel
> 
>         left=192.168.0.22
>         leftsourceip=y.y.y.y
>         leftsubnet=192.168.0.0/24
>         leftid=y.y.y.y
> 
>         right=x.x.x.x
>         rightsubnet=10.10.0.0/16
>         rightid=x.x.x.x
> 
>         #phase 1 encryption-integrity-DiffieHellman
>         keyexchange=ike
>         ike=3des-md5-modp1024,aes256-sha1-modp1024
>         ikelifetime=86400s
>         authby=secret #use presharedkey
>         rekey=yes  #should we rekey when key lifetime is about to expire
> 
>         #phase 2 encryption-pfsgroup
>         phase2=esp #esp for encryption | ah for authentication only
>         phase2alg=3des-md5;modp1024
>         pfs=no
>         forceencaps=yes
> 
> Matt
> _______________________________________________
> Discuss mailing list
> Discuss at blu.org
> http://lists.blu.org/mailman/listinfo/discuss
> 




More information about the Discuss mailing list