very good then, I'll have to uninstall racoon2/install the ipsectools. I
must have missed when I installed ipsectools but no worries. If I could ask
one more favor; what does your cisco config look like that would match one
of these? I have got mine configed based on someone else's tunnel specs
rascal wrote:
>
> I have the racoon2 package; does this make a big difference or do
> these configs work close to the same?
I did not have any luck using racoon2 because apparently it does not
interoperate well with older IPSEC implementations. At least, it did
not a couple of years ago when I s
Thanks very much David, I really appreciate it!
I have the racoon2 package; does this make a big difference or do these
configs work close to the same?
On Tue, Jul 14, 2009 at 8:15 PM, David DeSimone wrote:
> rascal wrote:
> >
> > Thanks for the input on this everyone! Eugene, I'll take you u
rascal wrote:
>
> Thanks for the input on this everyone! Eugene, I'll take you up on
> your offer of examples! I have a good idea of how to do this, I
> just want to make sure I get it right and if I have some examples to
> compare to that would be great! Thanks much!
Here is an example IPSEC
Rui Paulo wrote:
> Hi,
> Just a heads up to note that 802.11s D3.0 support has been committed to
> HEAD. If you notice any wireless related problems, please inform me ASAP.
Hi,
Any short tutorials on how to use it? For example with a couple of laptops?
signature.asc
Description: OpenPGP digita
Thanks for the input on this everyone! Eugene, I'll take you up on your
offer of examples! I have a good idea of how to do this, I just want to
make sure I get it right and if I have some examples to compare to that
would be great! Thanks much!
On Tue, Jul 14, 2009 at 9:41 AM, Eugene Perevyazko
Hello,
We have seen the problem reappear on msk driver (after the applying the
latest patch in gnats). The patch did improve things tremendously but
now the watchdog will timeout after 7 or 8 hours of flawless activity
(before the patch it would happen right away on the first transfer).
Usin
On Mon, Jul 13, 2009 at 11:09:11AM -0400, rascal wrote:
> So I have a couple of questions regarding a scenario that has recently been
> brought to me. I have two sites, one with a cisco device and one with a
> server running freebsd 7.2. The client wants to connect the two sites using
> these dev
Old Synopsis: [ip] [patch] fwd reached after skipto in dynamic rules does not
work in every case
New Synopsis: [ipfw] [patch] fwd reached after skipto in dynamic rules does not
work in every case
Responsible-Changed-From-To: freebsd-net->freebsd-ipfw
Responsible-Changed-By: bz
Responsible-Change
rascal wrote:
> ... I have two sites, one with a cisco device and one with a
> server running freebsd 7.2. The client wants to connect the two
> sites using these devices and I am told that the best way would
> be to establish an IPSEC tunnel between the cisco device and the
> freebsd server. Th
Synopsis: [netgraph] swi1: net 100% cpu usage
State-Changed-From-To: open->closed
State-Changed-By: mav
State-Changed-When: Tue Jul 14 07:23:12 UTC 2009
State-Changed-Why:
This is probably duplicate of solved kern/134557. Fix committed
to 8-CURRENT and merged to 7-STABLE on 2009-07-04.
http://ww
11 matches
Mail list logo