Thanx let me check. On Feb 6, 2008 4:09 PM, Marcos Aurelio Rodrigues <deigratia33@xxxxxxxxx> wrote: > Check if there are any firewall rules blocking the packets. > Try a different approach to test > > ping -I your_local_ip 192.168.100.202 > > your_local_Ip = Example 192.168.0.1 ip of your real interface > > > > -- > ======================================== > Marcos Aurelio Rodrigues (DEiGrAtiA-33) > <deigratia33@xxxxxxxxx> > CCNA, MCSO > Mirabilia laudo semprer, Dei > ======================================== > > > On Feb 4, 2008 11:25 AM, nilesh vaghela <nileshj.vaghela@xxxxxxxxx> wrote: > > > We have established ipsec connection between two network with live ip. > > > > As you can see below it says SA established. > > > > But I can not communicate between network or server even. > > > > Followings are the checkpoints. > > Any suggestions are welcom > > > > > > [root@server1 ~<999>]#route -n > > Kernel IP routing table > > Destination Gateway Genmask Flags Metric Ref Use > > Iface > > 192.168.100.0 200.64.85.1 255.255.255.0 UG 0 0 0 > > eth0 > > 192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 > > eth1 > > 219.64.85.0 0.0.0.0 255.255.255.0 U 0 0 0 > > eth0 > > 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 > > eth1 > > 0.0.0.0 200.64.85.1 0.0.0.0 UG 0 0 0 > > eth0 > > > > #traceroute 192.168.100.202 > > traceroute to 192.168.100.202 (192.168.100.202), 30 hops max, 40 byte > > packets > > 1 210.211.249.1.bb-static.vsnl.net.in (210.211.249.1) 24.965 ms > > 26.355 ms 27.420 ms > > 2 172.31.6.1 (172.31.6.1) 29.516 ms 30.131 ms 31.216 ms > > 3 203.200.225.253.static.vsnl.net.in (203.200.225.253) 32.303 ms > > 33.504 ms 34.446 ms > > 4 * * * > > 5 * * * > > 6 * * * > > > > This is what I want to established. > > > > > > 192.168.0.0/24===200.64.85.154---200.64.85.1...200.64.85.1---200.64.85.229===192.168.100.0/24 > > ; > > erouted; eroute owner: #2 > > > > > > [root@server1 ~]# ipsec auto --status > > 000 interface lo/lo ::1 > > 000 interface lo/lo 127.0.0.1 > > 000 interface lo/lo 127.0.0.1 > > 000 interface eth0/eth0 219.64.85.154 > > 000 interface eth0/eth0 219.64.85.154 > > 000 interface eth1/eth1 192.168.0.254 > > 000 interface eth1/eth1 192.168.0.254 > > 000 %myid = (none) > > 000 debug none > > 000 > > 000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64, > > keysizemax=64 > > 000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, > > keysizemin=192, keysizemax=192 > > 000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, > > keysizemin=40, keysizemax=448 > > 000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, > > keysizemin=0, keysizemax=0 > > 000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, > > keysizemin=128, keysizemax=256 > > 000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8, > > keysizemin=128, keysizemax=256 > > 000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8, > > keysizemin=128, keysizemax=256 > > 000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, > > keysizemin=128, keysizemax=128 > > 000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, > > keysizemin=160, keysizemax=160 > > 000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, > > keysizemin=256, keysizemax=256 > > 000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0, > > keysizemax=0 > > 000 > > 000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, > > keydeflen=192 > > 000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, > > keydeflen=128 > > 000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16 > > 000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20 > > 000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024 > > 000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536 > > 000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048 > > 000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072 > > 000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096 > > 000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144 > > 000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192 > > 000 > > 000 stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,0,0} > > trans={0,0,0} attrs={0,0,0} > > 000 > > 000 "net-to-net": > > > > 192.168.0.0/24===200.64.85.154---200.64.85.1...200.64.85.1---200.64.85.229===192.168.100.0/24 > > ; > > erouted; eroute owner: #2 > > 000 "net-to-net": srcip=unset; dstip=unset; srcup=ipsec _updown; > > dstup=ipsec _updown; > > 000 "net-to-net": ike_life: 3600s; ipsec_life: 28800s; rekey_margin: > > 540s; rekey_fuzz: 100%; keyingtries: 0 > > 000 "net-to-net": policy: PSK+ENCRYPT+TUNNEL+PFS+UP; prio: 24,24; > > interface: eth0; encap: esp; > > 000 "net-to-net": newest ISAKMP SA: #1; newest IPsec SA: #2; > > 000 "net-to-net": IKE algorithm newest: 3DES_CBC_192-MD5-MODP1536 > > 000 > > 000 #2: "net-to-net":500 STATE_QUICK_I2 (sent QI2, IPsec SA > > established); EVENT_SA_REPLACE in 27886s; newest IPSEC; eroute owner > > 000 #2: "net-to-net" esp.b90bb34b@xxxxxxxxxxxxx > > esp.d81ee274@xxxxxxxxxxxxx tun.0@xxxxxxxxxxxxx tun.0@xxxxxxxxxxxxx > > 000 #1: "net-to-net":500 STATE_MAIN_I4 (ISAKMP SA established); > > EVENT_SA_REPLACE in 2693s; newest ISAKMP; lastdpd=-1s(seq in:0 out:0) > > 000 > > > > > > [root@server1 ~]# service ipsec status > > IPsec running - pluto pid: 23062 > > pluto pid 23062 > > 1 tunnels up > > You have new mail in /var/spool/mail/root > > [root@server1 ~]# > > > > [root@server1 ~]# ipsec verify > > Checking your system to see if IPsec got installed and started correctly: > > Version check and ipsec on-path [OK] > > Linux Openswan Uopenswan-2.4.9-31.el5/K2.6.18-53.el5.028stab051.1 (netkey) > > Checking for IPsec support in kernel [OK] > > NETKEY detected, testing for disabled ICMP send_redirects [OK] > > NETKEY detected, testing for disabled ICMP accept_redirects [OK] > > Checking for RSA private key (/etc/ipsec.d/hostkey.secrets) [OK] > > Checking that pluto is running [OK] > > Two or more interfaces found, checking IP forwarding [OK] > > Checking NAT and MASQUERADEing > > Checking for 'ip' command [OK] > > Checking for 'iptables' command [OK] > > Opportunistic Encryption Support [DISABLED] > > [root@server1 ~]# > > > > > > -- > > Nilesh Vaghela > > ElectroMech > > Redhat Channel Partner and Training Partner > > 74, Nalanda Complex, Satellite Rd, Ahmedabad > > 25, The Emperor, Fatehgunj, Baroda. > > www.electromech.info > > > > -- > > redhat-list mailing list > > unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe > > https://www.redhat.com/mailman/listinfo/redhat-list > > > -- > redhat-list mailing list > unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe > https://www.redhat.com/mailman/listinfo/redhat-list > -- Nilesh Vaghela ElectroMech Redhat Channel Partner and Training Partner 74, Nalanda Complex, Satellite Rd, Ahmedabad 25, The Emperor, Fatehgunj, Baroda. www.electromech.info -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list