flux AT stunet.tu-freiberg.de
Titel: Freiberger Linux User Group
Listenarchiv
- From: Torsten Dörschel <Torsten.Doerschel AT gmx.de>
- To: Freiberger Linux User Group <flux AT stunet.tu-freiberg.de>
- Subject: [Flux] mit vpnc ins Uni-Netz
- Date: Tue, 5 Dec 2006 21:51:02 +0100
- List-archive: <http://www.stunet.tu-freiberg.de/pipermail/flux>
- List-id: Freiberger Linux User Group <flux.stunet.tu-freiberg.de>
Hallo,
ich versuche schon seit längerem vergeblich, mich von ausserhalb mit vpnc ins
Uninetz einzuwählen.
Mit dem Cisco-Client (v4.8.00) klappt's einwandfrei, nur mit vpnc komme ich
soweit, dass zwar die Verbindung angeblich steht, ich aber jenseits meines
Routers nix anpingen kann.
Zur Konfiguration verwende ich kvpnc - würde mich aber auch mit
einer /etc/vpnc/default.conf zufrieden geben.
Vermutlich liegt das Problem am Port von vpnc: Wenn ich bei kvpnc
unter "Erweitert" angebe, er soll Port 500 nutzen, kommt die Verbindung nicht
zustande. Leider weiss ich nicht, wie man rausfindet, welcher Port verwendet
wird, wenn die Verbindung ohne diese Option klappt (den müsste ich dann ja
nur noch vom Router durchlassen).
Anbei meine /etc/vpnc/default.conf und die kvpnc.conf
Danke im Voraus,
Torsten.
-------------------
#/etc/vpnc/default.conf:
IPSec gateway 139.20.201.100
IPSec ID world
IPSec secret world
Xauth username NUTZER
Xauth password PASSWORT
-------------------
#~/.kde/share/config/kvpncrc:
[General Options]
Auto connect profile=TUBA-World
Debug logwindow color=255,175,0
Do auto connect at startup=false
Dont quit on CloseEvent=true
Enable FreeSWAN verbose=false
Enable pppd debug=false
Error logwindow color=255,0,0
Hold generated scripts=true
Info logwindow color=0,0,0
Kvpnc debuglevel=0
Last Profile=world
Log viewer font size=2
Mainwindow height=213
Mainwindow position x=64
Mainwindow position y=25
Mainwindow width=438
Minimize after connect=true
Openvpn debuglevel=1
Openvpn management port=2222
Path to freeswan=/usr/sbin/ipsec
Path to ifconfig=/sbin/ifconfig
Path to iptables=/sbin/iptables
Path to iputility=/sbin/ip
Path to kill=/bin/kill
Path to kill-all=/usr/bin/killall
Path to netstat=/bin/netstat
Path to openssl=/usr/bin/openssl
Path to openvpn=/usr/sbin/openvpn
Path to ping=/bin/ping
Path to pppd=/usr/sbin/pppd
Path to pptp=/usr/sbin/pptp
Path to racoon=/usr/sbin/racoon
Path to route=/sbin/route
Path to setkey=/usr/sbin/setkey
Path to vpnc-bin=/usr/sbin/vpnc
Pid file for vpnc =/root/.kde/share/apps/kvpnc/vpnc-pid.world.pid
Pppd debuglevel=true
Pptp debuglevel=1
Programs in path=true
Racoon debuglevel=info
Remote logwindow color=0,0,0
Show Statusbar=true
Show debugconsole=false
Show interface IP in tooltip=true
Success logwindow color=0,128,0
Try connect timeout=10
Use KWallet=true
Use colorized log output=true
Use silent quit=false
Vpnc debuglevel=0
Write log file=true
hideOnCloseInfo=false
[Profile_wlan]
Additional network routes=
AllowEmptyGroupPassword=false
Application version=
Auth type=psk
AuthWithUsernameAndPassword=false
Ca certificate=
Cert path=
Command after connect=
Command after disconnect=
Command before connect=
Command before disconnect=
Connection check status interval=20
Connection check success count=10
Connection type=cisco
DNS server=
Description=TUBAFUN
Disable CCP=false
Disable LZO compression=false
Disable MPPE compression=false
Disable opportunistic encryption=false
Do not use no IP by default=false
Do reconnect after connection lost=true
Dont save username=false
Exchange mode=main
Execute command after connect=false
Execute command after disconnect=false
Execute command before connect=false
Execute command before disconnect=false
Fragment=1300
HTTP proxy host=
HTTP proxy port=3128
HTTP proxy timeout=100
Hash algorithm=md5
IKE group=dh2
Keep default route=false
Left next hop=
Local port=500
Local virtual IP=
MTU for pppd=1500
NS cert type=client
NT domain name=
Network device=eth1
PSK is in file=false
PeerTimeout=0
Perfect forward secrety=
Ping host IP=
Pre shared key=wlan
Pre shared key file=
Private key=
PrivateKey password=
Reconnect delay=5
Remote net address=
Remote net mask=24
Remote port=0
Remote virtual IP=
Replace default route=false
Right next hop=
Save PSK=true
Save user password=true
Set default route=false
Special remote ID=
Special server certificate=
TLS auth file=
TLS remote host=
Tunnel device type=tun
Use HTTP proxy=false
Use IKE group=true
Use NS cert type=false
Use NT domain name=false
Use TLS auth=false
Use TLS host=false
Use UDP-port=false
Use UDP-protocol=true
Use Virtual IP=false
Use Xauth interactive=false
Use additional network routes=false
Use advanced settings=true
Use application version=false
Use connection status check=true
Use delay at reconnect=false
Use global IPSec secret=false
Use local port=false
Use mode config=true
Use mssfix=true
Use no BSD compression=false
Use no deflate=false
Use own MTU=false
Use perfect Forward Secrety=false
Use redirect gateway=false
Use remote port=false
Use single DES=false
Use smartcard=false
Use special remote ID=false
Use special server certificate=false
Use userdef packet size=1300
Use userdefined port=false
Use userdefinied cipher=false
Use userdefinied packet size for fragmentation=false
User password=PASSWORT
Userdefined port=10000
Userdefinied cipher=
Username=NUTZER
VPN Gateway=172.17.1.100
VPN ID=wlan
Virtual IP=
do ping ip=false
get dns server from peer=false
local UDP port=0
refuse 128 bit encryption=false
refuse 40 bit encryption=false
refuse EAP=false
require mppe=false
require stateless encryption=false
use DNS-server=false
x509 certificate=
[Profile_world]
Additional network routes=
AllowEmptyGroupPassword=false
Application version=
Auth type=cert
AuthWithUsernameAndPassword=false
Ca certificate=
Cert path=
Command after connect=
Command after disconnect=
Command before connect=
Command before disconnect=
Connection check status interval=20
Connection check success count=10
Connection type=cisco
DNS server=
Description=TUBA VPN vom Internet aus
Disable CCP=false
Disable LZO compression=false
Disable MPPE compression=false
Disable opportunistic encryption=false
Do not use no IP by default=false
Do reconnect after connection lost=true
Dont save username=false
Exchange mode=main
Execute command after connect=false
Execute command after disconnect=false
Execute command before connect=false
Execute command before disconnect=false
Fragment=1300
HTTP proxy host=
HTTP proxy port=3128
HTTP proxy timeout=100
Hash algorithm=md5
IKE group=dh2
Keep default route=false
Left next hop=
Local port=500
Local virtual IP=
MTU for pppd=1500
NS cert type=client
NT domain name=
Network device=default
PSK is in file=false
PeerTimeout=3014706
Perfect forward secrety=server
Ping host IP=139.20.64.26
Pre shared key=world
Pre shared key file=
Private key=
PrivateKey password=
Reconnect delay=5
Remote net address=
Remote net mask=24
Remote port=0
Remote virtual IP=
Replace default route=false
Right next hop=
Save PSK=true
Save user password=true
Set default route=false
Special remote ID=
Special server certificate=
TLS auth file=
TLS remote host=
Tunnel device type=tun
Use HTTP proxy=false
Use IKE group=false
Use NS cert type=false
Use NT domain name=false
Use TLS auth=false
Use TLS host=false
Use UDP-port=true
Use UDP-protocol=false
Use Virtual IP=false
Use Xauth interactive=false
Use additional network routes=false
Use advanced settings=true
Use application version=false
Use connection status check=false
Use delay at reconnect=false
Use global IPSec secret=false
Use local port=false
Use mode config=false
Use mssfix=true
Use no BSD compression=false
Use no deflate=false
Use own MTU=false
Use perfect Forward Secrety=false
Use redirect gateway=false
Use remote port=false
Use single DES=false
Use smartcard=false
Use special remote ID=false
Use special server certificate=false
Use userdef packet size=1300
Use userdefined port=false
Use userdefinied cipher=false
Use userdefinied packet size for fragmentation=false
User password=PASSWORT
Userdefined port=10000
Userdefinied cipher=
Username=NUTZER
VPN Gateway=139.20.201.100
VPN ID=world
Virtual IP=
do ping ip=true
get dns server from peer=false
local UDP port=1523
refuse 128 bit encryption=false
refuse 40 bit encryption=false
refuse EAP=false
require mppe=false
require stateless encryption=false
use DNS-server=false
x509 certificate=
Attachment:
pgpmJzz1hBip1.pgp
Description: PGP signature
- [Flux] mit vpnc ins Uni-Netz, Torsten Dörschel, 05.12.2006
- Re: [Flux] mit vpnc ins Uni-Netz, Helge Bahmann, 06.12.2006
- Re: [Flux] mit vpnc ins Uni-Netz, Torsten Dörschel, 06.12.2006
- Re: [Flux] mit vpnc ins Uni-Netz, Helge Bahmann, 06.12.2006
- Re: [Flux] mit vpnc ins Uni-Netz, Torsten Dörschel, 06.12.2006
- Re: [Flux] mit vpnc ins Uni-Netz, Helge Bahmann, 06.12.2006
Archiv bereitgestellt durch MHonArc 2.6.16.