[Swan] 3.1 rpm package
Paul Wouters
pwouters at redhat.com
Sat Mar 16 21:00:47 EET 2013
On Sat, 16 Mar 2013, Nick Howitt wrote:
> I have installed it and with identical configs to openswan all I get in my logs is:
> Mar 16 11:43:59 server pluto[10870]: packet from 88.104.26.203:500: received Vendor ID payload [Dead Peer Detection]
> Mar 16 11:43:59 server pluto[10870]: packet from 88.104.26.203:500: received Vendor ID payload [RFC 3947]
> Mar 16 11:43:59 server pluto[10870]: packet from 88.104.26.203:500: ignoring Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-03]
> Mar 16 11:43:59 server pluto[10870]: packet from 88.104.26.203:500: ignoring Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-02_n]
> Mar 16 11:43:59 server pluto[10870]: packet from 88.104.26.203:500: ignoring Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-02]
> Mar 16 11:43:59 server pluto[10870]: packet from 88.104.26.203:500: received Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-00]
> Mar 16 11:43:59 server pluto[10870]: packet from 88.104.26.203:500: initial Main Mode message received on
> 82.19.147.85:500 but no connection has been authorized with policy=PSK
Did your connection load at all?
> # Tunnels defined in separate files
> #----------------------------------
>
> include /etc/ipsec.d/ipsec.*.conf
Note older SElinux policies broke using include files. If you don't have
the latest selinux policy package, and selinux is running in enforcing
mode, this might cause your include files to not be used.
> One of the sub files, /etc/ipsec.d/ipsec.unmanaged.MumIn.conf, is:
> conn MumIn
What's the output of: ipsec auto --add MumIn
and: ipsec auto --up MumIn
Paul
More information about the Swan
mailing list