RED tcpdump output:
cat /tmp/tcpdump.log | grep ESP
13:20:37.795130 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? oakley-quick[E]
13:20:37.944141 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? oakley-quick[E]
13:20:38.091078 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? oakley-quick[E]
13:20:51.544420 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:51.631910 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:51.684359 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:51.712082 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:51.729090 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:51.767064 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:51.772018 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:51.897217 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:20:52.002662 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others ? inf[E]
13:21:01.532021 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:21:11.709750 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:21:31.859271 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:23:21.963069 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident[E]
13:23:22.046752 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident[E]
13:23:22.168218 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:23:22.440587 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R oakley-quick[E]
13:23:22.622770 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:23:32.857717 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:23:32.910278 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident
13:23:33.107328 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:23:33.149968 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident
13:23:33.272857 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident[E]
13:23:33.273139 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident[E]
13:23:33.506959 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:23:33.645808 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R oakley-quick[E]
13:23:33.798234 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:24:58.169342 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:24:58.170001 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:24:58.180619 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:24:58.290224 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:24:58.337283 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I inf[E]
13:24:58.360755 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I inf[E]
13:24:58.495345 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:25:08.614580 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:25:18.755690 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:25:38.774390 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:27:53.928110 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident[E]
13:27:54.010098 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident[E]
13:27:54.132972 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:27:54.402197 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R oakley-quick[E]
13:27:54.576001 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:29:23.648294 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:29:23.720663 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:29:23.747362 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I inf[E]
13:29:33.755075 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:29:43.940855 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:30:03.955384 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:33:32.549351 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident[E]
13:33:32.646332 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident[E]
13:33:32.770124 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:33:33.020016 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R oakley-quick[E]
13:33:33.216916 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:33:50.342322 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I inf[E]
13:33:50.402856 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I inf[E]
13:33:50.449530 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:33:50.649064 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R inf[E]
13:34:01.699136 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:34:01.755442 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident
13:34:02.056607 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:34:02.099292 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident
13:34:12.098243 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident
13:34:12.115971 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident
13:34:12.208864 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 I ident[E]
13:34:12.221128 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 1 R ident[E]
13:34:12.454657 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
13:34:12.590779 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others R oakley-quick[E]
13:34:12.849814 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-nat-t:
NONESP-encap: isakmp: phase 2/others I oakley-quick[E]
--
Best Regards
Walid Aweiwi
Systems Engineer
Network Department
Bisan Systems Ltd.
Tel +97222985941 ext 202
Fax +97222985942
Mobile +972599673507
http://www.bisan.com
http://www.bisan.ps
---------- Original Message -----------
From: "Walid Aweiwi" <walid-5LNP/***@public.gmane.org>
To: Daniel Mentz <danielml+mailinglists.strongswan-***@public.gmane.org>
Cc: users-3+4lAyCyj6DkhV4RL1hkzWD2FQJk+8+***@public.gmane.org
Sent: Fri, 2 Jan 2009 13:18:30 +0200
Subject: Re: [strongSwan] Problem with ikev1 net2net-psk, both VPN servers are behind NAT
Post by Walid AweiwiHi Daniel,
ip route list
192.168.100.0/24 dev eth0 proto kernel scope link src 192.168.100.100
192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.254
169.254.0.0/16 dev eth0 scope link
default via 192.168.2.1 dev eth0
ipsec status
erouted; eroute owner: #4
000 "net-net": newest ISAKMP SA: #3; newest IPsec SA: #4;
000
000 #2: "net-net" STATE_QUICK_I2 (sent QI2, IPsec SA established);
(ISAKMP SA established); EVENT_SA_REPLACE in 3136s 000 #4: "net-net"
STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 871s; newest IPSEC;
ISAKMP SA established); EVENT_SA_REPLACE in 3271s; newest ISAKMP 000
ip xfrm policy
src ::/0 dst ::/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src ::/0 dst ::/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
ip xfrm state
src 213.6.10.244 dst 192.168.2.254
proto esp spi 0xc5b532b7 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x5c0a3d0f315b36ad2210bbabfe90202ea27a9012
enc aes 0xaee1287ed6439f8f7f06e9608a3bc044
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 213.6.10.244 dst 192.168.2.254
proto esp spi 0x700349d6 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x127407c58db393cffcbfdea180fa8d5018bac1d4
enc aes 0xa477d0b7b8393a8ccd643f43a4f379d6
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.168.2.254 dst 213.6.10.244
proto esp spi 0xc13228b8 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x9ca5f62b66e851411b0e7304533f510d2ed81f55
enc aes 0xfe00b0f04372a74c1f8a0fd5e732e8ce
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
src 192.168.2.254 dst 213.6.10.244
proto esp spi 0xa1da8e02 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x8fee90346508a1cf1e4a3fc7f194ec1563223eb6
enc aes 0x99188eda96220f3faad60b9bd6bbf717
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
ip route list
192.168.14.0/24 dev eth0 proto kernel scope link src 192.168.14.1
192.168.25.0/24 dev eth0 proto kernel scope link src 192.168.25.25
169.254.0.0/16 dev eth0 scope link
default via 192.168.14.254 dev eth0
ipsec status
erouted; eroute owner: #4
000 "net-net": newest ISAKMP SA: #1; newest IPsec SA: #4;
000
000 #4: "net-net" STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 488s; newest IPSEC; eroute owner 000 #4: "net-net"
tunnel 000 #1: "net-net" STATE_MAIN_I4 (ISAKMP SA established);
EVENT_SA_REPLACE in 3011s; newest ISAKMP 000 #3: "net-net" STATE_QUICK_R2
(IPsec SA established); EVENT_SA_REPLACE in 727s 000 #3: "net-net"
tunnel 000 #2: "net-net" STATE_MAIN_R3 (sent MR3, ISAKMP SA established);
EVENT_SA_REPLACE in 3126s 000
src ::/0 dst ::/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir in priority 0
src ::/0 dst ::/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 0.0.0.0/0 dst 0.0.0.0/0
dir out priority 0
src 192.168.14.1 dst 82.102.240.47
proto esp spi 0xc5b532b7 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x5c0a3d0f315b36ad2210bbabfe90202ea27a9012
enc aes 0xaee1287ed6439f8f7f06e9608a3bc044
encap type espinudp sport 4500 dport 10171 addr 0.0.0.0
src 192.168.14.1 dst 82.102.240.47
proto esp spi 0x700349d6 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x127407c58db393cffcbfdea180fa8d5018bac1d4
enc aes 0xa477d0b7b8393a8ccd643f43a4f379d6
encap type espinudp sport 4500 dport 10171 addr 0.0.0.0
src 82.102.240.47 dst 192.168.14.1
proto esp spi 0xc13228b8 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x9ca5f62b66e851411b0e7304533f510d2ed81f55
enc aes 0xfe00b0f04372a74c1f8a0fd5e732e8ce
encap type espinudp sport 10171 dport 4500 addr 0.0.0.0
src 82.102.240.47 dst 192.168.14.1
proto esp spi 0xa1da8e02 reqid 16385 mode tunnel
replay-window 32
auth sha1 0x8fee90346508a1cf1e4a3fc7f194ec1563223eb6
enc aes 0x99188eda96220f3faad60b9bd6bbf717
encap type espinudp sport 10171 dport 4500 addr 0.0.0.0
the tcpdump logs on RED.
tcpdump -i eth0 not port ssh and not port domain and not arp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
13:15:32.213144 IP 192.168.2.254.iax > 192.168.14.14.iax: UDP, length 12
13:15:32.815520 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from
00:13:ce:e1:90:39 (oui Unknown), length: 300
13:15:32.822317 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from
00:13:ce:e1:90:39 (oui Unknown), length: 326
13:15:33.214593 IP 192.168.2.254.iax > 192.168.14.14.iax: UDP, length 12
13:15:35.696800 IP 192.168.2.100 > IGMP.MCAST.NET: igmp v3 report, 1 group record(s)
13:15:35.733188 IP 192.168.2.100.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): REGISTRATION; REQUEST; BROADCAST
13:15:41.256312 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:41.256475 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:42.005718 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:42.005887 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:42.756095 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:42.756299 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:43.505142 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:44.255700 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:45.005950 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:15:45.575554 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-
nat-t: isakmp-nat-keep-alive
13:15:46.607604 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-
nat-t: isakmp-nat-keep-alive
13:15:52.214772 IP 192.168.2.254.iax > 192.168.14.14.iax: UDP, length 12
13:15:53.216956 IP 192.168.2.254.iax > 192.168.14.14.iax: UDP, length 12
13:16:00.755893 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:00.756295 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:01.505012 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:01.505198 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:02.255106 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:02.255466 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:03.004167 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:03.753917 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:04.505081 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:05.263502 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:05.592182 IP a10-244.adsl.paltel.net.ipsec-nat-t > 192.168.2.254.ipsec-
nat-t: isakmp-nat-keep-alive
13:16:06.012609 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:06.747796 IP 192.168.2.254.ipsec-nat-t > a10-244.adsl.paltel.net.ipsec-
nat-t: isakmp-nat-keep-alive
13:16:06.761678 IP 192.168.2.101.netbios-ns > 192.168.2.255.netbios-ns: NBT
UDP PACKET(137): QUERY; REQUEST; BROADCAST
13:16:12.218682 IP 192.168.2.254.iax > 192.168.14.14.iax: UDP, length 12
13:16:12.971620 IP 192.168.2.254 > 192.168.25.25: ICMP echo request, id 36124,
seq 1, length 64
13:16:13.220735 IP 192.168.2.254.iax > 192.168.14.14.iax: UDP, length 12
13:16:13.971711 IP 192.168.2.254 > 192.168.25.25: ICMP echo request, id 36124,
seq 2, length 64
13:16:14.972435 IP 192.168.2.254 > 192.168.25.25: ICMP echo request, id
--
Best Regards
Walid Aweiwi
Systems Engineer
Network Department
Bisan Systems Ltd.
Tel +97222985941 ext 202
Fax +97222985942
Mobile +972599673507
http://www.bisan.com
http://www.bisan.ps
---------- Original Message -----------
Sent: Fri, 02 Jan 2009 10:26:08 +0100
Subject: Re: [strongSwan] Problem with ikev1 net2net-psk, both VPN servers are behind NAT
Post by Daniel MentzPost by Walid Aweiwibut my problem is no route nor ping from RED server to BLUE.
Hi Walid,
could you please provide us with the output of the command
ip route list
It should contain something like
192.168.25.0/24 dev ppp0 scope link src 192.168.100.100
The outlook will look differently on your machine because you're
probably using an ethernet link instead of PPP.
The output of "ipsec status" looks very promising.
What's the exact output of the ping command? Does it say "no route to
host" or is it just not getting any reply (100% packet loss) ?
Please run tcpdump on the external interfaces of RED and BLUE in order
to see if those boxes transmit ESP packets or just unencrypted ICMP packets.
For the sake of completeness you could also include the output of the
ip xfrm state
ip xfrm policy
Regards,
Daniel
*************
This message has been scanned for viruses and dangerous content by Bisan
Systems Ltd MailScanner, and is believed to be clean.Bisan Systems Ltd does
not represent that any attachment is free from computer viruses or
defects and the user assumes all responsibility for any loss, damage or
consequence resulting directly or indirectly from the use of any
attachment. The information contained in any email does not necessarily
reflect the views of Bisan systems or any other related entities or persons.
------- End of Original Message -------
_______________________________________________
Users mailing list
https://lists.strongswan.org/mailman/listinfo/users
*************
This message has been scanned for viruses and dangerous content by Bisan
Systems Ltd MailScanner, and is believed to be clean.Bisan Systems Ltd does
not represent that any attachment is free from computer viruses or
defects and the user assumes all responsibility for any loss, damage or
consequence resulting directly or indirectly from the use of any
attachment. The information contained in any email does not necessarily
reflect the views of Bisan systems or any other related entities or persons.
------- End of Original Message -------