Folks, I set up a router using 6.2-stable, and created IKEv1 tunnels using isakmpd, something I've done many times before. The other end is a Sonicwall NSA 4500, which I've used as an endpoint before as well. My ipsec.conf file is:
> ike active esp \ > from 192.168.144.0/24 \ > to { 10.101.0.0/16, \ > 10.102.0.0/16, \ > 10.103.0.0/16, \ > 10.104.0.0/16, \ > 172.27.199.0/24 } \ > peer [Sonicwall IP] \ > main \ > auth hmac-sha1 \ > enc aes-128 \ > group modp2048 \ > lifetime 28800 \ > quick \ > auth hmac-sha1 \ > enc aes-128 \ > group modp2048 \ > lifetime 28800 \ > psk [PSK redacted] However, the output of ipsecctl -s flow is: > # ipsecctl -s flow > > FLOWS: > flow esp in from 10.104.0.16 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 10.104.0.16 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require > flow esp in from 10.103.0.16 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 10.103.0.16 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require > flow esp in from 10.102.0.16 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 10.102.0.16 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require > flow esp in from 10.104.0.0/16 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 10.104.0.0/16 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require > flow esp in from 10.103.0.0/16 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 10.103.0.0/16 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require > flow esp in from 10.102.0.0/16 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 10.102.0.0/16 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require > ***** flow esp in from 172.16.0.0/16 to 192.168.144.0/24 peer 65.75.99.66 > srcid 24.51.107.65/32 dstid 65.75.99.66/32 type use > ***** flow esp out from 192.168.144.0/24 to 172.16.0.0/16 peer 65.75.99.66 > srcid 24.51.107.65/32 dstid 65.75.99.66/32 type require > flow esp in from 172.27.199.0/24 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 172.27.199.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require > flow esp in from 10.101.0.0/16 to 192.168.144.0/24 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type use > flow esp out from 192.168.144.0/24 to 10.101.0.0/16 peer 65.75.99.66 srcid > 24.51.107.65/32 dstid 65.75.99.66/32 type require Note the two starred flows that are not listed in my ipsec.conf configuration. The 172.16.0.0/16 subnet does exist on the Sonicwall end, and I'm pretty sure that the Sonicwall is requesting that a flow be set up for that subnet. However, I would think that my OpenBSD router would not create that flow since it's not in my ipsec.conf. Any ideas why it's being created anyway? I won't be in a position to see if the flow is really live until tomorrow morning. --Paul