Sponsored Content
Full Discussion: VPN IPSec Openswan
Special Forums IP Networking VPN IPSec Openswan Post 302909177 by ivancd on Tuesday 15th of July 2014 06:11:24 AM
Old 07-15-2014
VPN IPSec Openswan

Hi all,

I have installed Openswan and configured IPSec and works perfect, but for some unknown reasons it stop working. I see that the tunnels are up and established. The route to the destination are added. Everything by the book seems to be ok. But somehow when i start to ping the other side ( private ip ) the packet for that tunnel trying to go out from the interface that have public ip. And for the other tunnel they are not going anyway. All this is on a linux machine CentOS, with eth0 - public ip address, eth0:0 and eth0:1 are private for the tunnels. Can someone help me out here because i need this thing to work ( it's a production ) and i have lost a whole week.

Thanks in advanced !
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

IPSec - VPN using shared key

Hello! I have some trouble trying to configure a VPN with two gateways. One of them uses IPSec with a single key, 256bits length, specified in /etc/ipsec.secrets. As FreeSwan manual page says, if i put esp=3des-md5-96, will be used a "64bit IV key (internally generated), a 192bit 3des ekey and a... (3 Replies)
Discussion started by: eNTer
3 Replies

2. IP Networking

IPSec VPN Routing

Hello, I'm trying to setup a gateway VPN between two routers across an unsecured network between two local networks. The routers are both linux and I'm using the ipsec tools, racoon and setkey. So far hosts from either local net can successfully ping hosts on the other local net without issue. ... (0 Replies)
Discussion started by: salukibob
0 Replies

3. BSD

Problem on IPSec

Hi, this is my first post...:p Hello Admin :) Can I have an ask for something with my configuration ? I have finished some kind of the tutorial to build ipsec site to site, and the "step" has finished completely. I have a simulation with a local design topology with two PC's (FreeBSD ... (0 Replies)
Discussion started by: aulia
0 Replies

4. UNIX for Advanced & Expert Users

Ipsec implementation

How can i implement Ipsec between two machines in linux_ ubuntu? any link?? suggestion?? (0 Replies)
Discussion started by: elinaz
0 Replies

5. Cybersecurity

IPSEC

hello, after configuration ipsec in ip4 I can not ping between client and server whereas I had success ping before configuration! I also generate different key for AH and ESP as i have shown below. what is my problem and what should i do to have ping and test the configuration? code: ... (0 Replies)
Discussion started by: elinaz
0 Replies

6. AIX

Allow port range using IPsec?

Hi Guys, Please could you tell me if it is possible to have a single rule/filter to allow a certain port range instead of a separate rule for each port? I'm sure it must be possible but I am unable to find the syntax. Thanks Chris (4 Replies)
Discussion started by: chrisstevens
4 Replies

7. IP Networking

IPSec Openswan Site to Site VPN - Big Pain

Hi @all, I try to connect 2 LANs with IPSec/Openswan LAN 1: 192.168.0.0/24 LAN 2: 192.168.1.0/24 This is my Config: conn HomeVPN # # Left security gateway, subnet behind it, nexthop toward right. left=192.168.1.29 ... (1 Reply)
Discussion started by: bahnhasser83
1 Replies

8. IP Networking

Openswan with Cisco ASA

Hi all, I need this as soon as possible to solve it or at least to find out what is the problem. I have configured IPSec tunnels with Openswan and Cisco ASA, i have established a connection and the ping was fine, but after some time there is request time out from both sites. I don't have ASA... (0 Replies)
Discussion started by: ivancd
0 Replies

9. IP Networking

Best tool to monitor VPN IPSEC Tunneling

We are using cyberoam device, VPN IPSEC tunnel is going of frequently even the traffic is throug. Please suggest what may be the cause for the above mentioned issue. Also suggest a best tool to monitor the same VPN IPSEC tunnel connectivity. (4 Replies)
Discussion started by: marunmeera
4 Replies
IFCFG-TUNNEL(5) 					       Network configuration						   IFCFG-TUNNEL(5)

NAME
ifcfg-tunnel - network tunnel interface configuration SYNOPSIS
/etc/sysconfig/network/ifcfg-gre* /etc/sysconfig/network/ifcfg-ipip* /etc/sysconfig/network/ifcfg-sit* /etc/sysconfig/network/ifcfg-tun* /etc/sysconfig/network/ifcfg-tap* Tunnel interfaces It is possible to create static IP tunnel interfaces for three different protocols: SIT IPv6 over IPv4 tunnel GRE universal IPv4 tunnel IPIP IPv4 over IPv4 tunnel Additionally, also creation of user space program driven tunnels using the universal TUN/TAP device driver is supported: TAP Ethernet tunnel interface TUN Point-to-Point IP tunnel interface Since there is not yet a YaST2 support for creating tunnels one must write appropriate config files by hand for now. VARIABLES
These variables can used in ip tunnel config files: TUNNEL Here you have to set the tunnel protocol. This may be "sit" for IPv6 over IPv4 tunnel, "gre" for universal IPv4 tunnel, "ipip" for IPv4 over IPv4 tunnel and "tap" or "tun" for the user space program driven tunnels. TUNNEL_LOCAL_IPADDR or TUNNEL_DEVICE The address of the local tunnel's end could be directly specified in TUNNEL_LOCAL_IPADDR variable. The address must be present on an existing interface of this host (the TUNNEL_DEVICE). If TUNNEL_LOCAL_IPADDR is empty the first ipv4 address from the interface given in the variable TUNNEL_DEVICE will be used. TUNNEL_REMOTE_IPADDR The address of the remote tunnel's end. TUNNEL_TTL Specify the Time To Life of the packet which carries the tunneled data. Usually it is set to 64 but in some circumstances you may want do use something else between 1 and 255. Special value is "inherit" in which case the TTL is copied from the inner (tunneled) packet. This is also the default if the TTL variable wasn't used. TUNNEL_OPTIONS Here you may set additional options for the command ip tunnel add TUNNEL_SET_PERSISTENT Create a persistent tun or tap interface. Default is "yes". Non-persistent tunnels are not supported yet. TUNNEL_SET_OWNER and TUNNEL_SET_GROUP Allows to set the owner and group (by name or UID/GID) for persistent tun/tap interfaces. Examples for tunnel configurations This are some generic examples for different tunnel types. Replace the shown addresses and interface names by your individual ones. As con- figuration names you may choose the interface names. GRE and IPIP tunnels Create a GRE tunnel between a local computer with IP address 192.168.1.2 and a remote computer with IP address 172.16.2.3. After the tunnel is created assign an IP address 10.20.30.40 to it's local end. Default filename: ifcfg-gre1 STARTMODE='onboot' BOOTPROTO='static' TUNNEL='gre' TUNNEL_LOCAL_IPADDR='192.168.1.2' TUNNEL_REMOTE_IPADDR='172.16.2.3' IPADDR='10.20.30.40' TUNNEL_TTL='64' IPIP tunnel is created in exactly the same way, except that the variable TUNNEL has to be set to "ipip" in this case. Use filename ifcfg-tunl1 in this case. SIT tunnels for IPv6 over IPv4 There are two modes in which SIT tunnels may operate: static and 6to4 To create a "static" tunnel one needs to know an IPv4 address of the remote end, while for a "6to4" tunnel the remote end is a "6to4 relay". These relays are usually public and could be reached either under their respective IPv4 address or under a unique IPv4 any- cast address 192.88.99.1 (as defined in RFC 3068). This typical config file for a 6to4 tunnel should fit most user's needs and the only required change is the external interface name. Default filename: ifcfg-sit1 STARTMODE='onboot' BOOTPROTO='6to4' TUNNEL='sit' TUNNEL_DEVICE='eth0' TUNNEL_TTL='64' Additionally you need to set some routes. Do that in a file called ifroute-<configname> with the same configname as in ifcfg-<con- figname>. Default filename: ifroute-sit1 It may look like this: 2000::/3 2002:c058:6301::1 - - - metric 1 The magic string 2002:c058:6301::1 is a 6to4 version of the anycast IPv4 address 192.88.99.1. To create a "static" tunnel with local IPv6 address 3ffe:ffff::1234/64 use a config file like this: Default filename: ifcfg-sit1 STARTMODE='onboot' BOOTPROTO='static' TUNNEL='sit' TUNNEL_LOCAL_IPADDR='192.168.1.2' TUNNEL_REMOTE_IPADDR='172.16.2.3' IPADDR='3ffe:ffff::1234/64' TUNNEL_TTL='64' Universal TUN/TAP tunnels The universal TUN/TAP kernel driver provides an interface for user space programs to operate a tunnel. There are two modes in which the interface can be created: TUN (a Point-to-Point interface using local and remote IP) or TAP (like normal ethernet interface, e.g. for use in bridges). The following configuration allows to create the interfaces persistently: ifcfg-tap0 STARTMODE='onboot' BOOTPROTO='static' TUNNEL='tap' # optionally: TUNNEL_SET_PERSISTENT='yes' TUNNEL_SET_OWNER='username' TUNNEL_SET_GROUP='groupname' ifcfg-tun0 STARTMODE='onboot' BOOTPROTO='static' TUNNEL='tun' # optionally: TUNNEL_SET_PERSISTENT='yes' TUNNEL_SET_OWNER='username' TUNNEL_SET_GROUP='groupname' The user space program can be started later, e.g. by the ifservices(5) mechanism. The TUNNEL_SET_OWNER and TUNNEL_SET_GROUP settings allow to run the user space program with an different UID/GID than 0 (root). When not specified, the user space program has to run with UID 0. Non-persistent tunnels (TUNNEL_SET_PERSISTENT=no), where the user space program (e.g. openvpn) is started directly in ifup, are not supported yet. BUGS
Please report bugs at <http://www.suse.de/feedback> AUTHOR
Christian Zoz <zoz@suse.de> -- ifup script Michal Svec <msvec@suse.cz> -- ifup script Bjoern Jacke -- ifup script Mads Martin Joergensen <mmj@suse.de> -- ifup manual page Michal Ludvig <mludvig@suse.cz> -- tunnel support SEE ALSO
ifcfg(5), ifup(8). sysconfig August 2004 IFCFG-TUNNEL(5)
All times are GMT -4. The time now is 07:52 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy