On 24 September 2013 16:35, Hugo Osvaldo Barrera
<h...@osvaldobarrera.com.ar> wrote:
> On 2013-09-24 09:44, James Griffin wrote:
>> * Hugo Osvaldo Barrera <h...@osvaldobarrera.com.ar> [2013-09-24 03:53:46
> -0300]:
>>
>> > Hi,
>> >
>> > I've been experimenting a bit with IPSec and creating a VPN using it.
> I've
>> > been successful, but have encountered an odd issue.
>> >
>> > I've two hosts, linking two networks:
>> >
>> > Host A's /etc/iked.conf:
>> > ikev2 active esp from 172.16.0.0/16 to 172.17.0.0/16 \
>> >   peer 174.136.104.18 psk "a-test-key"
>> >
>> > Host B's /etc/iked.conf:
>> > ikev2 esp from 172.17.0.0/16 to 172.16.0.0/16 \
>> >   peer 190.210.108.249 psk "a-test-key"
>> >
>> > (Of course those are not the real keys).
>> >
>> > I can ssh 172.17.0.1 from the 172.16.0.0 network fine and viceversa.
>> >
>> > So far so good.
>> >
>> > BUT I can't establish any TCP connection from Host A to Host B's public
>> > IP address and viceversa.
>>
>> So you can connect using internal addresses but not using public address.
> Just a thought, but have you opened the necessary ports on your router? What
> is your setup like?
>>
>> [ ... ]
>>
>
> They're both connected directly to the internet with no router in front
> of them. With the tunnel disabled, everything works fine between both.
>
> --
> Hugo Osvaldo Barrera
>
> [demime 1.01d removed an attachment of type application/pgp-signature]
>

could you please tcpdump on enc and real interfaces on host A and see
if your traffic (ssh, ping, traceroute) is sent encrypted or not and
on which interface.  and what does host B receive.

Reply via email to