It is currently Wed Sep 18, 2019 6:55 am

All times are UTC [ DST ]




Post new topic Reply to topic  [ 5 posts ] 
Author Message
 Post subject: Windows PC Client
PostPosted: Sat Oct 02, 2010 2:05 am 

Joined: Fri Oct 01, 2010 1:28 pm
Posts: 9
Per my previous posts this morning, I believe I was able to get things going, with the establishing of an l2tp connection on the same host as the server.

However, I am now attempting to get a connection established between a windows PC client and the server on the same local subnet. The l2tp server IP address is 192.168.0.198 and the windows client has an IP address of 192.168.0.199.

I start the l2tpd server with
Quote:
sudo openl2tpd -f -D all


I try to set up the server through the use of l2tpconfig. I save the config params to /etc/openl2tpd.conf. Here's the data in the file:
Code:
# system

# peer profiles
peer profile create profile_name=office
peer profile modify profile_name=office \
   tunnel_profile_name=default \
   peer_ipaddr=192.168.0.199 \
   netmask=255.255.255.255 \

peer profile modify profile_name=default \
   peer_ipaddr=192.168.0.199 \
   netmask=255.255.255.255 \


# tunnel profiles
tunnel profile modify profile_name=default \
   auth_mode=none \
   trace_flags=4294967295 \


# session profiles

# ppp profiles

# locally created tunnels and sessions




But, the console output from the l2tpd process is only as follows:

Code:
mike@mike-laptop:~$ sudo openl2tpd -f -D all
Start, trace_flags=00000000 (debug enabled)
OpenL2TP V1.7, (c) Copyright 2004-2010 Katalix Systems Ltd.
Loading plugin /usr/lib/openl2tp/ppp_unix.so, version V1.5
Using config file: /etc/openl2tpd.conf


I see no other output. When I try to connect with the Windows client, I see no activity on the server. I see that port 1701 is in use with netstat -anu

Code:
Proto Recv-Q Send-Q Local Address           Foreign Address         State     
udp        0      0 0.0.0.0:2049            0.0.0.0:*                         
udp        0      0 0.0.0.0:1701            0.0.0.0:*                         
udp        0      0 0.0.0.0:46760           0.0.0.0:*                         
udp        0      0 0.0.0.0:38322           0.0.0.0:*                         
udp        0      0 0.0.0.0:57922           0.0.0.0:*                         
udp        0      0 0.0.0.0:68              0.0.0.0:*                         
udp        0      0 0.0.0.0:69              0.0.0.0:*                         
udp        0      0 0.0.0.0:864             0.0.0.0:*                         
udp        0      0 0.0.0.0:867             0.0.0.0:*                         
udp        0      0 0.0.0.0:5353            0.0.0.0:*                         
udp        0      0 0.0.0.0:111             0.0.0.0:*                         
udp        0      0 0.0.0.0:49010           0.0.0.0:*     


I've read through the docs, but I must be missing something. I would have thought that if there was nothing at all in the l2tpd.conf and the l2tpd daemon was running, then the client would be able to connect without an issue, as the default behavior would allow for this. I'm sure I'm doing a few things incorrectly, and I'm hoping someone can give me the "ducks and bunnies" version to get started.

Thanks in advance. Hope someone can help.

Mike


Top
 Profile  
 
 Post subject: Re: Windows PC Client
PostPosted: Sat Oct 02, 2010 1:54 pm 

Joined: Fri Oct 01, 2010 1:28 pm
Posts: 9
I added iptables rules,

-A INPUT -p 50 -j ACCEPT
-A INPUT -p udp -d 192.168.0.198 --dport 500 -j ACCEPT
-A INPUT -p udp -d 192.168.0.198 --dport 4500 -j ACCEPT
-A INPUT -m policy --dir in --pol ipsec -p udp --dport 1701 -j ACCEPT
-A FORWARD -i ppp+ -p all -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT

and now I am at least getting some output from the openl2tp daemon! :-)

Here's what I am seeing:
Code:

FUNC: tunl 11164: inherited ppp profile 'peer1' from peer profile
FUNC: tunl 11164: allocated context using profile 'default', created by network request
XPRT: RX: tunl 11164/0: len=108 ns/nr=0/0, our ns/nr=0/0, peer ns/nr=0/0
XPRT: tunl 11164: peer ns/nr is 0/0
DATA: RX: tunl 11164/0: rcv 108 bytes from peer 192.168.0.199, packet ns/nr 0/0 type 0
XPRT: tunl 11164: update nr from 0 to 1
AVP: tunl 11164: SCCRQ message decode of 88 bytes started
AVPDATA: PROTOCOL_VERSION: ver=1 rev=0
AVPDATA: FRAMING_CAP: cap=1
AVPDATA: BEARER_CAP: cap=0
AVPDATA: FIRMWARE_VERSION: revision=1280
AVPDATA: HOST_NAME: name=Office-Computer
AVPDATA: VENDOR_NAME: name=Microsoft
AVPDATA: TUNNEL_ID: id=16
AVPDATA: RX_WINDOW_SIZE: size=8
PROTO: tunl 11164: SCCRQ received from peer 16
FSM: CCE(11164) event SCCRQ_ACCEPT in state IDLE
PROTO: tunl 11164: adjust tx_window_size: peer=8, ours=10
AVP: tunl 11164: building SCCRP message, 9 AVPs
PROTO: tunl 11164: sending SCCRP to peer 16
XPRT: tunl 11164: queuing tx packet, type 2, len 145, ns/nr 0/1
XPRT: tunl 11164: update ns to 1
XPRT: tunl 11164: adding packet to ackq, type 2, len 145, ns/nr 0/1
DATA: TX: tunl 11164/0: send 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 0
FSM: CCE(11164) state change: IDLE --> WAITCTLCONN
XPRT: tunl 11164: send zlb ack, ns/nr=1/1
FUNC: tunl 32331: inherited ppp profile 'peer1' from peer profile
FUNC: tunl 32331: allocated context using profile 'default', created by network request
XPRT: RX: tunl 32331/0: len=108 ns/nr=0/0, our ns/nr=0/0, peer ns/nr=0/0
XPRT: tunl 32331: peer ns/nr is 0/0
DATA: RX: tunl 32331/0: rcv 108 bytes from peer 192.168.0.199, packet ns/nr 0/0 type 0
XPRT: tunl 32331: update nr from 0 to 1
AVP: tunl 32331: SCCRQ message decode of 88 bytes started
AVPDATA: PROTOCOL_VERSION: ver=1 rev=0
AVPDATA: FRAMING_CAP: cap=1
AVPDATA: BEARER_CAP: cap=0
AVPDATA: FIRMWARE_VERSION: revision=1280
AVPDATA: HOST_NAME: name=Office-Computer
AVPDATA: VENDOR_NAME: name=Microsoft
AVPDATA: TUNNEL_ID: id=16
AVPDATA: RX_WINDOW_SIZE: size=8
PROTO: tunl 32331: SCCRQ received from peer 16
FSM: CCE(32331) event SCCRQ_ACCEPT in state IDLE
PROTO: tunl 32331: adjust tx_window_size: peer=8, ours=10
AVP: tunl 32331: building SCCRP message, 9 AVPs
PROTO: tunl 32331: sending SCCRP to peer 16
XPRT: tunl 32331: queuing tx packet, type 2, len 145, ns/nr 0/1
XPRT: tunl 32331: update ns to 1
XPRT: tunl 32331: adding packet to ackq, type 2, len 145, ns/nr 0/1
DATA: TX: tunl 32331/0: send 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 0
FSM: CCE(32331) state change: IDLE --> WAITCTLCONN
XPRT: tunl 11164: set retry interval to 2
XPRT: tunl 32331: send zlb ack, ns/nr=1/1
XPRT: tunl 32331: set retry interval to 2
XPRT: tunl 11164: set retry interval to 4
DATA: TX: tunl 11164/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 1
FUNC: tunl 42903: inherited ppp profile 'peer1' from peer profile
FUNC: tunl 42903: allocated context using profile 'default', created by network request
XPRT: RX: tunl 42903/0: len=108 ns/nr=0/0, our ns/nr=0/0, peer ns/nr=0/0
XPRT: tunl 42903: peer ns/nr is 0/0
DATA: RX: tunl 42903/0: rcv 108 bytes from peer 192.168.0.199, packet ns/nr 0/0 type 0
XPRT: tunl 42903: update nr from 0 to 1
AVP: tunl 42903: SCCRQ message decode of 88 bytes started
AVPDATA: PROTOCOL_VERSION: ver=1 rev=0
AVPDATA: FRAMING_CAP: cap=1
AVPDATA: BEARER_CAP: cap=0
AVPDATA: FIRMWARE_VERSION: revision=1280
AVPDATA: HOST_NAME: name=Office-Computer
AVPDATA: VENDOR_NAME: name=Microsoft
AVPDATA: TUNNEL_ID: id=16
AVPDATA: RX_WINDOW_SIZE: size=8
PROTO: tunl 42903: SCCRQ received from peer 16
FSM: CCE(42903) event SCCRQ_ACCEPT in state IDLE
PROTO: tunl 42903: adjust tx_window_size: peer=8, ours=10
AVP: tunl 42903: building SCCRP message, 9 AVPs
PROTO: tunl 42903: sending SCCRP to peer 16
XPRT: tunl 42903: queuing tx packet, type 2, len 145, ns/nr 0/1
XPRT: tunl 42903: update ns to 1
XPRT: tunl 42903: adding packet to ackq, type 2, len 145, ns/nr 0/1
DATA: TX: tunl 42903/0: send 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 0
FSM: CCE(42903) state change: IDLE --> WAITCTLCONN
XPRT: tunl 32331: set retry interval to 4
DATA: TX: tunl 32331/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 1
XPRT: tunl 11164: set retry interval to 8
DATA: TX: tunl 11164/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 2
XPRT: tunl 42903: send zlb ack, ns/nr=1/1
DATA: TX: tunl 11164/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 3
XPRT: tunl 42903: set retry interval to 2
XPRT: tunl 32331: set retry interval to 8
DATA: TX: tunl 32331/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 2
DATA: TX: tunl 11164/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 4
XPRT: tunl 42903: set retry interval to 4
DATA: TX: tunl 42903/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 1
DATA: TX: tunl 32331/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 3
FUNC: tunl 17364: inherited ppp profile 'peer1' from peer profile
FUNC: tunl 17364: allocated context using profile 'default', created by network request
XPRT: RX: tunl 17364/0: len=108 ns/nr=0/0, our ns/nr=0/0, peer ns/nr=0/0
XPRT: tunl 17364: peer ns/nr is 0/0
DATA: RX: tunl 17364/0: rcv 108 bytes from peer 192.168.0.199, packet ns/nr 0/0 type 0
XPRT: tunl 17364: update nr from 0 to 1
AVP: tunl 17364: SCCRQ message decode of 88 bytes started
AVPDATA: PROTOCOL_VERSION: ver=1 rev=0
AVPDATA: FRAMING_CAP: cap=1
AVPDATA: BEARER_CAP: cap=0
AVPDATA: FIRMWARE_VERSION: revision=1280
AVPDATA: HOST_NAME: name=Office-Computer
AVPDATA: VENDOR_NAME: name=Microsoft
AVPDATA: TUNNEL_ID: id=16
AVPDATA: RX_WINDOW_SIZE: size=8
PROTO: tunl 17364: SCCRQ received from peer 16
FSM: CCE(17364) event SCCRQ_ACCEPT in state IDLE
PROTO: tunl 17364: adjust tx_window_size: peer=8, ours=10
AVP: tunl 17364: building SCCRP message, 9 AVPs
PROTO: tunl 17364: sending SCCRP to peer 16
XPRT: tunl 17364: queuing tx packet, type 2, len 145, ns/nr 0/1
XPRT: tunl 17364: update ns to 1
XPRT: tunl 17364: adding packet to ackq, type 2, len 145, ns/nr 0/1
DATA: TX: tunl 17364/0: send 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 0
FSM: CCE(17364) state change: IDLE --> WAITCTLCONN
DATA: TX: tunl 11164/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 5
XPRT: tunl 42903: set retry interval to 8
DATA: TX: tunl 42903/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 2
DATA: TX: tunl 32331/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 4
XPRT: tunl 17364: send zlb ack, ns/nr=1/1
XPRT: tunl 17364: set retry interval to 2
XPRT: tunl 11164: retry failure
DATA: TX: tunl 42903/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 3
DATA: TX: tunl 32331/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 5
FSM: CCE(11164) event XPRT_DOWN in state WAITCTLCONN
AVP: tunl 11164: building STOPCCN message, 3 AVPs
PROTO: tunl 11164: sending STOPCCN to peer 16
XPRT: tunl 11164: queuing tx packet, type 4, len 38, ns/nr 1/1
XPRT: tunl 11164: tx window closed
FUNC: tunl 11164: starting cleanup timer
FSM: CCE(11164) state change: WAITCTLCONN --> CLOSING
XPRT: tunl 17364: set retry interval to 4
DATA: TX: tunl 17364/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 1
DATA: TX: tunl 42903/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 4
XPRT: tunl 32331: retry failure
XPRT: tunl 11164: set retry interval to 2
XPRT: tunl 11164: retry failure
FSM: CCE(32331) event XPRT_DOWN in state WAITCTLCONN
AVP: tunl 32331: building STOPCCN message, 3 AVPs
PROTO: tunl 32331: sending STOPCCN to peer 16
XPRT: tunl 32331: queuing tx packet, type 4, len 38, ns/nr 1/1
XPRT: tunl 32331: tx window closed
FUNC: tunl 32331: starting cleanup timer
FSM: CCE(32331) state change: WAITCTLCONN --> CLOSING
FSM: CCE(11164) event XPRT_DOWN in state CLOSING
DATA: TX: tunl 42903/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 5
XPRT: tunl 17364: set retry interval to 8
DATA: TX: tunl 17364/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 2
XPRT: tunl 32331: set retry interval to 2
XPRT: tunl 32331: retry failure
FSM: CCE(32331) event XPRT_DOWN in state CLOSING
XPRT: tunl 42903: retry failure
DATA: TX: tunl 17364/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 3
FSM: CCE(42903) event XPRT_DOWN in state WAITCTLCONN
AVP: tunl 42903: building STOPCCN message, 3 AVPs
PROTO: tunl 42903: sending STOPCCN to peer 16
XPRT: tunl 42903: queuing tx packet, type 4, len 38, ns/nr 1/1
XPRT: tunl 42903: tx window closed
FUNC: tunl 42903: starting cleanup timer
FSM: CCE(42903) state change: WAITCTLCONN --> CLOSING
DATA: TX: tunl 17364/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 4
XPRT: tunl 42903: set retry interval to 2
XPRT: tunl 42903: retry failure
FSM: CCE(42903) event XPRT_DOWN in state CLOSING
DATA: TX: tunl 17364/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 5
FUNC: tunl 35193: inherited ppp profile 'peer1' from peer profile
FUNC: tunl 35193: allocated context using profile 'default', created by network request
XPRT: RX: tunl 35193/0: len=108 ns/nr=0/0, our ns/nr=0/0, peer ns/nr=0/0
XPRT: tunl 35193: peer ns/nr is 0/0
DATA: RX: tunl 35193/0: rcv 108 bytes from peer 192.168.0.199, packet ns/nr 0/0 type 0
XPRT: tunl 35193: update nr from 0 to 1
AVP: tunl 35193: SCCRQ message decode of 88 bytes started
AVPDATA: PROTOCOL_VERSION: ver=1 rev=0
AVPDATA: FRAMING_CAP: cap=1
AVPDATA: BEARER_CAP: cap=0
AVPDATA: FIRMWARE_VERSION: revision=1280
AVPDATA: HOST_NAME: name=Office-Computer
AVPDATA: VENDOR_NAME: name=Microsoft
AVPDATA: TUNNEL_ID: id=16
AVPDATA: RX_WINDOW_SIZE: size=8
PROTO: tunl 35193: SCCRQ received from peer 16
FSM: CCE(35193) event SCCRQ_ACCEPT in state IDLE
PROTO: tunl 35193: adjust tx_window_size: peer=8, ours=10
AVP: tunl 35193: building SCCRP message, 9 AVPs
PROTO: tunl 35193: sending SCCRP to peer 16
XPRT: tunl 35193: queuing tx packet, type 2, len 145, ns/nr 0/1
XPRT: tunl 35193: update ns to 1
XPRT: tunl 35193: adding packet to ackq, type 2, len 145, ns/nr 0/1
DATA: TX: tunl 35193/0: send 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 0
FSM: CCE(35193) state change: IDLE --> WAITCTLCONN
XPRT: tunl 35193: send zlb ack, ns/nr=1/1
XPRT: tunl 17364: retry failure
XPRT: tunl 35193: set retry interval to 2
FSM: CCE(17364) event XPRT_DOWN in state WAITCTLCONN
AVP: tunl 17364: building STOPCCN message, 3 AVPs
PROTO: tunl 17364: sending STOPCCN to peer 16
XPRT: tunl 17364: queuing tx packet, type 4, len 38, ns/nr 1/1
XPRT: tunl 17364: tx window closed
FUNC: tunl 17364: starting cleanup timer
FSM: CCE(17364) state change: WAITCTLCONN --> CLOSING
XPRT: tunl 35193: set retry interval to 4
DATA: TX: tunl 35193/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 1
XPRT: tunl 17364: set retry interval to 2
XPRT: tunl 17364: retry failure
FSM: CCE(17364) event XPRT_DOWN in state CLOSING
XPRT: tunl 35193: set retry interval to 8
DATA: TX: tunl 35193/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 2
DATA: TX: tunl 35193/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 3
DATA: TX: tunl 35193/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 4
DATA: TX: tunl 35193/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 5
XPRT: tunl 35193: retry failure
FSM: CCE(35193) event XPRT_DOWN in state WAITCTLCONN
AVP: tunl 35193: building STOPCCN message, 3 AVPs
PROTO: tunl 35193: sending STOPCCN to peer 16
XPRT: tunl 35193: queuing tx packet, type 4, len 38, ns/nr 1/1
XPRT: tunl 35193: tx window closed
FUNC: tunl 35193: starting cleanup timer
FSM: CCE(35193) state change: WAITCTLCONN --> CLOSING
XPRT: tunl 35193: set retry interval to 2
XPRT: tunl 35193: retry failure
FSM: CCE(35193) event XPRT_DOWN in state CLOSING
FUNC: tunl 3402: inherited ppp profile 'peer1' from peer profile
FUNC: tunl 3402: allocated context using profile 'default', created by network request
XPRT: RX: tunl 3402/0: len=108 ns/nr=0/0, our ns/nr=0/0, peer ns/nr=0/0
XPRT: tunl 3402: peer ns/nr is 0/0
DATA: RX: tunl 3402/0: rcv 108 bytes from peer 192.168.0.199, packet ns/nr 0/0 type 0
XPRT: tunl 3402: update nr from 0 to 1
AVP: tunl 3402: SCCRQ message decode of 88 bytes started
AVPDATA: PROTOCOL_VERSION: ver=1 rev=0
AVPDATA: FRAMING_CAP: cap=1
AVPDATA: BEARER_CAP: cap=0
AVPDATA: FIRMWARE_VERSION: revision=1280
AVPDATA: HOST_NAME: name=Office-Computer
AVPDATA: VENDOR_NAME: name=Microsoft
AVPDATA: TUNNEL_ID: id=16
AVPDATA: RX_WINDOW_SIZE: size=8
PROTO: tunl 3402: SCCRQ received from peer 16
FSM: CCE(3402) event SCCRQ_ACCEPT in state IDLE
PROTO: tunl 3402: adjust tx_window_size: peer=8, ours=10
AVP: tunl 3402: building SCCRP message, 9 AVPs
PROTO: tunl 3402: sending SCCRP to peer 16
XPRT: tunl 3402: queuing tx packet, type 2, len 145, ns/nr 0/1
XPRT: tunl 3402: update ns to 1
XPRT: tunl 3402: adding packet to ackq, type 2, len 145, ns/nr 0/1
DATA: TX: tunl 3402/0: send 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 0
FSM: CCE(3402) state change: IDLE --> WAITCTLCONN
XPRT: tunl 3402: send zlb ack, ns/nr=1/1
FUNC: tunl 54212 deleted
FUNC: tunl 54212: deleting context
XPRT: tunl 3402: set retry interval to 2
XPRT: tunl 3402: set retry interval to 4
DATA: TX: tunl 3402/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 1
XPRT: tunl 3402: set retry interval to 8
DATA: TX: tunl 3402/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 2
DATA: TX: tunl 3402/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 3
DATA: TX: tunl 3402/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 4
DATA: TX: tunl 3402/0: resend 145 bytes to peer 192.168.0.199, packet ns/nr 0/1 type 2, retry 5
XPRT: tunl 3402: retry failure
FSM: CCE(3402) event XPRT_DOWN in state WAITCTLCONN
AVP: tunl 3402: building STOPCCN message, 3 AVPs
PROTO: tunl 3402: sending STOPCCN to peer 16
XPRT: tunl 3402: queuing tx packet, type 4, len 38, ns/nr 1/1
XPRT: tunl 3402: tx window closed
FUNC: tunl 3402: starting cleanup timer
FSM: CCE(3402) state change: WAITCTLCONN --> CLOSING
XPRT: tunl 3402: set retry interval to 2
XPRT: tunl 3402: retry failure
FSM: CCE(3402) event XPRT_DOWN in state CLOSING
FUNC: tunl 60851 deleted
FUNC: tunl 60851: deleting context
FUNC: tunl 11164 deleted
FUNC: tunl 11164: deleting context
FUNC: tunl 32331 deleted
FUNC: tunl 32331: deleting context
FUNC: tunl 42903 deleted
FUNC: tunl 42903: deleting context
FUNC: tunl 17364 deleted
FUNC: tunl 17364: deleting context
FUNC: tunl 35193 deleted
FUNC: tunl 35193: deleting context
FUNC: tunl 3402 deleted
FUNC: tunl 3402: deleting context


Also, below is the output from the /var/log/auth.log:

Code:
Oct  2 08:33:47 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Oct  2 08:33:47 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [FRAGMENTATION]
Oct  2 08:33:47 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Oct  2 08:33:47 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: responding to Main Mode from unknown peer 192.168.0.199
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: STATE_MAIN_R1: sent MR1, expecting MI2
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: STATE_MAIN_R2: sent MR2, expecting MI3
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: Main mode peer ID is ID_IPV4_ADDR: '192.168.0.199'
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: I did not send a certificate because I do not have one.
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp2048}
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[4] 192.168.0.199 #8: responding to Quick Mode {msgid:443213dd}
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[4] 192.168.0.199 #8: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[4] 192.168.0.199 #8: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[4] 192.168.0.199 #8: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Oct  2 08:33:47 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[4] 192.168.0.199 #8: STATE_QUICK_R2: IPsec SA established {ESP=>0xa24e1f11 <0xbcdb576a xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Oct  2 08:34:22 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: received Delete SA(0xa24e1f11) payload: deleting IPSEC State #8
Oct  2 08:34:22 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: deleting connection "roadwarrior-l2tp-updatedwin" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:34:22 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: received and ignored informational message
Oct  2 08:34:22 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199 #7: received Delete SA payload: deleting ISAKMP State #7
Oct  2 08:34:22 mike-laptop pluto[19954]: "roadwarrior-all"[4] 192.168.0.199: deleting connection "roadwarrior-all" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:34:22 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received and ignored informational message
Oct  2 08:35:22 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Oct  2 08:35:22 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [FRAGMENTATION]
Oct  2 08:35:22 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Oct  2 08:35:22 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: responding to Main Mode from unknown peer 192.168.0.199
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: STATE_MAIN_R1: sent MR1, expecting MI2
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: STATE_MAIN_R2: sent MR2, expecting MI3
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: Main mode peer ID is ID_IPV4_ADDR: '192.168.0.199'
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: I did not send a certificate because I do not have one.
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp2048}
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[5] 192.168.0.199 #10: responding to Quick Mode {msgid:25bba766}
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[5] 192.168.0.199 #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[5] 192.168.0.199 #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[5] 192.168.0.199 #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Oct  2 08:35:22 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[5] 192.168.0.199 #10: STATE_QUICK_R2: IPsec SA established {ESP=>0x9ae67c79 <0xb81f6d2a xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Oct  2 08:35:57 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: received Delete SA(0x9ae67c79) payload: deleting IPSEC State #10
Oct  2 08:35:58 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: deleting connection "roadwarrior-l2tp-updatedwin" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:35:58 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: received and ignored informational message
Oct  2 08:35:58 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199 #9: received Delete SA payload: deleting ISAKMP State #9
Oct  2 08:35:58 mike-laptop pluto[19954]: "roadwarrior-all"[5] 192.168.0.199: deleting connection "roadwarrior-all" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:35:58 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received and ignored informational message
Oct  2 08:36:46 mike-laptop sudo:     mike : TTY=pts/0 ; PWD=/home/mike ; USER=root ; COMMAND=/etc/init.d/openl2tp top
Oct  2 08:36:49 mike-laptop sudo:     mike : TTY=pts/0 ; PWD=/home/mike ; USER=root ; COMMAND=/etc/init.d/openl2tp stop
Oct  2 08:36:57 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Oct  2 08:36:57 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [FRAGMENTATION]
Oct  2 08:36:57 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Oct  2 08:36:57 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: responding to Main Mode from unknown peer 192.168.0.199
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: STATE_MAIN_R1: sent MR1, expecting MI2
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: STATE_MAIN_R2: sent MR2, expecting MI3
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: Main mode peer ID is ID_IPV4_ADDR: '192.168.0.199'
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: I did not send a certificate because I do not have one.
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp2048}
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[6] 192.168.0.199 #12: responding to Quick Mode {msgid:92768bd0}
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[6] 192.168.0.199 #12: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[6] 192.168.0.199 #12: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[6] 192.168.0.199 #12: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Oct  2 08:36:57 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[6] 192.168.0.199 #12: STATE_QUICK_R2: IPsec SA established {ESP=>0x5109cb07 <0x8bad7822 xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Oct  2 08:37:07 mike-laptop sudo:     mike : TTY=pts/0 ; PWD=/home/mike ; USER=root ; COMMAND=/usr/sbin/openl2tpd -f -D all
Oct  2 08:37:32 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: received Delete SA(0x5109cb07) payload: deleting IPSEC State #12
Oct  2 08:37:33 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: deleting connection "roadwarrior-l2tp-updatedwin" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:37:33 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: received and ignored informational message
Oct  2 08:37:33 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199 #11: received Delete SA payload: deleting ISAKMP State #11
Oct  2 08:37:33 mike-laptop pluto[19954]: "roadwarrior-all"[6] 192.168.0.199: deleting connection "roadwarrior-all" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:37:33 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received and ignored informational message
Oct  2 08:37:55 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Oct  2 08:37:55 mike-laptop pluto[19954]: packet from 192.168.0.199:500: ignoring Vendor ID payload [FRAGMENTATION]
Oct  2 08:37:55 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: responding to Main Mode from unknown peer 192.168.0.199
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: STATE_MAIN_R1: sent MR1, expecting MI2
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: STATE_MAIN_R2: sent MR2, expecting MI3
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: Main mode peer ID is ID_IPV4_ADDR: '192.168.0.199'
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: I did not send a certificate because I do not have one.
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp2048}
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[7] 192.168.0.199 #14: responding to Quick Mode {msgid:4b6e7c4f}
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[7] 192.168.0.199 #14: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[7] 192.168.0.199 #14: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[7] 192.168.0.199 #14: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Oct  2 08:37:55 mike-laptop pluto[19954]: "roadwarrior-l2tp-updatedwin"[7] 192.168.0.199 #14: STATE_QUICK_R2: IPsec SA established {ESP=>0xc72af0ab <0x8bc98e9c xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Oct  2 08:38:30 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: received Delete SA(0xc72af0ab) payload: deleting IPSEC State #14
Oct  2 08:38:30 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: deleting connection "roadwarrior-l2tp-updatedwin" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:38:30 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: received and ignored informational message
Oct  2 08:38:30 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199 #13: received Delete SA payload: deleting ISAKMP State #13
Oct  2 08:38:30 mike-laptop pluto[19954]: "roadwarrior-all"[7] 192.168.0.199: deleting connection "roadwarrior-all" instance with peer 192.168.0.199 {isakmp=#0/ipsec=#0}
Oct  2 08:38:30 mike-laptop pluto[19954]: packet from 192.168.0.199:500: received and ignored informational message
Oct  2 08:39:01 mike-laptop CRON[22343]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct  2 08:39:01 mike-laptop dbus-daemon: Rejected send message, 1 matched rules; type="method_call", sender=":1.41" (uid=1000 pid=9456 comm="/usr/lib/indicator-applet/indicator-applet --oaf-a") interface="org.freedesktop.DBus.Properties" member="Get" error name="(unset)" requested_reply=0 destination=":1.248" (uid=0 pid=22343 comm="/USR/SBIN/CRON "))
Oct  2 08:39:01 mike-laptop CRON[22343]: pam_unix(cron:session): session closed for user root
Oct  2 08:40:01 mike-laptop CRON[22427]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct  2 08:40:01 mike-laptop dbus-daemon: Rejected send message, 1 matched rules; type="method_call", sender=":1.41" (uid=1000 pid=9456 comm="/usr/lib/indicator-applet/indicator-applet --oaf-a") interface="org.freedesktop.DBus.Properties" member="Get" error name="(unset)" requested_reply=0 destination=":1.249" (uid=0 pid=22427 comm="/USR/SBIN/CRON "))



Unfortunately, I still can not connect from my windows PC, but I think I'm gradually getting closer. Does anyone see what I'm doing wrong?

Mike


Top
 Profile  
 
 Post subject: Re: Windows PC Client
PostPosted: Sun Oct 03, 2010 3:31 pm 

Joined: Fri Oct 01, 2010 1:28 pm
Posts: 9
Same status as before.

Here's the output of the tunnel list and peer list from l2tpconfig, whilst the connection is being setup.

Code:
l2tp> tunnel list
   TunId             Peer            Local  PeerTId ConfigId            State
*  10832    192.168.0.199    192.168.0.198       28        2      WAITCTLCONN
*  30183    192.168.0.199    192.168.0.198       28        3      WAITCTLCONN
*  39390    192.168.0.199    192.168.0.198       28        1      WAITCTLCONN
*  43834    192.168.0.199    192.168.0.198       28        4      WAITCTLCONN
l2tp> peer list
Local            Remote         
192.168.0.198    192.168.0.199 


Looks like the connection is only one way. The server does not appear to be able to communicate back to the client. I must be missing something very obvious here.

Mike


Top
 Profile  
 
 Post subject: Re: Windows PC Client
PostPosted: Wed Oct 06, 2010 2:19 pm 
Site Admin

Joined: Sun Jul 27, 2008 1:39 pm
Posts: 122
mike wrote:
Same status as before.

Here's the output of the tunnel list and peer list from l2tpconfig, whilst the connection is being setup.

Code:
l2tp> tunnel list
   TunId             Peer            Local  PeerTId ConfigId            State
*  10832    192.168.0.199    192.168.0.198       28        2      WAITCTLCONN
*  30183    192.168.0.199    192.168.0.198       28        3      WAITCTLCONN
*  39390    192.168.0.199    192.168.0.198       28        1      WAITCTLCONN
*  43834    192.168.0.199    192.168.0.198       28        4      WAITCTLCONN
l2tp> peer list
Local            Remote         
192.168.0.198    192.168.0.199 


Looks like the connection is only one way. The server does not appear to be able to communicate back to the client. I must be missing something very obvious here.

Mike

The Windows L2TP client uses IPSec by default. You can disable IPSec by modifying the registry. I suggest do that first to verify correct operation. http://support.microsoft.com/kb/310109

To use IPSec with OpenL2TP, you will need a correctly installed IPSec setup on Linux, and start openl2tpd with its ipsec.so plugin.


Top
 Profile  
 
 Post subject: Re: Windows PC Client
PostPosted: Thu Oct 07, 2010 4:55 pm 

Joined: Fri Oct 01, 2010 1:28 pm
Posts: 9
Thanks for the Windows Registry tip.

I moved on to using a linux client, disabling IP Sec. All is working now.

Mike


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 5 posts ] 

All times are UTC [ DST ]


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
cron
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group