Hi,
For a few day's I'm trying to get a VPN connection using ipsec from work (freebsd box using racoon) and my sme 5.5 machine.
We managed to setup the tunnel, but I'm still not able to ping the inside network on both side's
I need some help/info please
My logfile says : (and check the last 4 lines)
Feb 28 00:42:03 border kernel: klips_debug:ipsec_makeroute: succeeded, I think...
Feb 28 00:42:03 border kernel: klips_debug:pfkey_x_addflow_parse: makeroute call successful.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build: error=0
Feb 28 00:42:03 border kernel: klips_debug:pfkey_safe_build:success.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_upmsg: allocating 176 bytes...
Feb 28 00:42:03 border kernel: klips_debug:pfkey_upmsg: ...allocated at c8e19180.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_x_addflow_parse: sending up x_addflow reply message for satype=9(IPIP) (proto=4) to socket=d178a3b0 succeeded.
Feb 28 00:42:03 border kernel: klips_debug:pfkey_x_addflow_parse: extr->tdb cleaned up and freed.
Feb 28 00:42:03 border ipsec__plutorun: 104 "gbi-test" #1: STATE_MAIN_I1: initiate
Feb 28 00:42:03 border ipsec__plutorun: 003 "gbi-test" #1: ignoring Vendor ID payload
Feb 28 00:42:03 border ipsec__plutorun: 106 "gbi-test" #1: STATE_MAIN_I2: sent MI2, expecting MR2
Feb 28 00:42:03 border ipsec__plutorun: 003 "gbi-test" #1: ignoring Vendor ID payload
Feb 28 00:42:03 border ipsec__plutorun: 108 "gbi-test" #1: STATE_MAIN_I3: sent MI3, expecting MR3
Feb 28 00:42:03 border ipsec__plutorun: 004 "gbi-test" #1: STATE_MAIN_I4: ISAKMP SA established
Feb 28 00:42:03 border ipsec__plutorun: 112 "gbi-test" #2: STATE_QUICK_I1: initiate
Feb 28 00:42:03 border ipsec__plutorun: 004 "gbi-test" #2: STATE_QUICK_I2: sent QI2, IPsec SA established
Feb 28 00:42:08 border kernel: klips_debug:ipsec_tunnel_neigh_setup:
Feb 28 00:42:08 border kernel: klips_debug:ipsec_tunnel_start_xmit: >>> skb->len=84 hard_header_len:0
Feb 28 00:42:08 border kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:10347 frag_off:0 ttl:64 proto:1 (ICMP) chk:30771 saddr:213.84.248.139 daddr:10.104.1.195 type:code=8:0
Feb 28 00:42:08 border kernel: klips_debug:ipsec_findroute: 213.84.248.139->10.104.1.195
Feb 28 00:42:08 border kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Feb 28 00:42:08 border kernel: klips_debug:rj_match: ** try to match a leaf, t=0xcd54eda0
Feb 28 00:42:08 border kernel: klips_debug:rj_match: *** start searching up the tree, t=0xcd54eda0
Feb 28 00:42:08 border kernel: klips_debug:rj_match: **** t=0xcd54edb8
Feb 28 00:42:08 border kernel: klips_debug:rj_match: **** t=0xd3eb5ae0
Feb 28 00:42:08 border kernel: klips_debug:rj_match: ***** cp2=0xd7fc9df8 cp3=0xc18d1990
Feb 28 00:42:08 border kernel: klips_debug:rj_match: ***** not found.
Feb 28 00:42:08 border kernel: klips_debug:ipsec_tunnel_start_xmit: checking for local udp/500 IKE packet saddr=d554f88b, er=00000000, daddr=a6801c3, er_dst=0, proto=1 sport=0 dport=0
Feb 28 00:42:08 border kernel: klips_debug:ipsec_tunnel_start_xmit: Original head,tailroom: 16,28
Feb 28 00:42:08 border kernel: klips_debug:ipsec_tunnel_start_xmit: shunt SA of DROP or no eroute: dropping.
Feb 28 00:42:09 border kernel: klips_debug:ipsec_tunnel_start_xmit: >>> skb->len=84 hard_header_len:0
Feb 28 00:42:09 border kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:10351 frag_off:0 ttl:64 proto:1 (ICMP) chk:30767 saddr:213.84.248.139 daddr:10.104.1.195 type:code=8:0
Feb 28 00:42:09 border kernel: klips_debug:ipsec_findroute: 213.84.248.139->10.104.1.195
Feb 28 00:42:09 border kernel: klips_debug:rj_match: * See if we match exactly as a host destination
Feb 28 00:42:09 border kernel: klips_debug:rj_match: ** try to match a leaf, t=0xcd54eda0
Feb 28 00:42:09 border kernel: klips_debug:rj_match: *** start searching up the tree, t=0xcd54eda0
Feb 28 00:42:09 border kernel: klips_debug:rj_match: **** t=0xcd54edb8
Feb 28 00:42:09 border kernel: klips_debug:rj_match: **** t=0xd3eb5ae0
Feb 28 00:42:09 border kernel: klips_debug:rj_match: ***** cp2=0xd7fc9df8 cp3=0xc18d1990
Feb 28 00:42:09 border kernel: klips_debug:rj_match: ***** not found.
Feb 28 00:42:09 border kernel: klips_debug:ipsec_tunnel_start_xmit: checking for local udp/500 IKE packet saddr=d554f88b, er=00000000, daddr=a6801c3, er_dst=0, proto=1 sport=0 dport=0
Feb 28 00:42:09 border kernel: klips_debug:ipsec_tunnel_start_xmit: Original head,tailroom: 16,28
Feb 28 00:42:09 border kernel: klips_debug:ipsec_tunnel_start_xmit: shunt SA of DROP or no eroute: dropping.
Feb 28 00:42:10 border kernel: klips_debug:ipsec_tunnel_start_xmit: >>> skb->len=84 hard_header_len:0
Feb 28 00:42:10 border kernel: klips_debug: IP: ihl:20 ver:4 tos:0 tlen:84 id:10353 frag_off:0 ttl:64 proto:1 (ICMP) chk:30765 saddr:213.84.248.139 daddr:10.104.1.195 type:code=8:0