Contenu | Rechercher | Menus

Annonce

Si vous avez des soucis pour rester connecté, déconnectez-vous puis reconnectez-vous depuis ce lien en cochant la case
Me connecter automatiquement lors de mes prochaines visites.

À propos de l'équipe du forum.

#1 Le 05/12/2010, à 23:55

SamheG

[Résolu] VPN xl2tp/ipsec

Bonjour,

J'essaie de mettre en place une connexion VPN vers mon boulot (serveur sous Windows 2008)

J'arrive à établir le tunnel ipsec et à m'authentifier via xl2tp mais bizarrement aucun ping vers une adresse locale n'aboutit.
Pourtant en lançant nmap, j'obtiens bien des réponses.

Pour info, voici mes paramètres :

cat /etc/ipsec.conf

# /etc/ipsec.conf - Openswan IPsec configuration file
# $Id$

# Manual: ipsec.conf(5)

# Created: dim. déc. 5 21:42:31 2010
#      by: The L2TP IPsec VPN Manager application version 0.9.7
#
# WARNING! All changes made in this file will be lost!

version    2.0    # conforms to second version of ipsec.conf specification

config setup
    # plutodebug="parsing emitting control private"
    plutodebug=none
    strictcrlpolicy=no
    nat_traversal=yes
    interfaces=%defaultroute
    oe=off
    # which IPsec stack to use. netkey,klips,mast,auto or none
    protostack=netkey

conn %default
    keyingtries=3
    pfs=no
    rekey=yes
    type=transport
    left=%defaultroute
    leftprotoport=17/1701
    rightprotoport=17/1701

# Add connections here.


conn vpntaf
        authby=secret
   
    right=xxx.xxx.xxx.xxx         <- il s'agit ici de l'IP du boulot
    rightid=""
    auto=add

cat /etc/ipsec.secrets

# /etc/ipsec.secrets - secrets for IKE/IPsec authentication
# $Id$

# Manual: ipsec.secrets(5)

# Created: dim. déc. 5 21:42:31 2010
#      by: The L2TP IPsec VPN Manager application version 0.9.7
#
# WARNING! All changes made in this file will be lost!
#
#
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication.  See ipsec_pluto(8) manpage, and HTML documentation.

# RSA private key for this host, authenticating it to any other host
# which knows the public part.  Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
#
%any xxx.xxx.xxx.xxx: PSK "laclépsk"

cat /etc/xl2tpd/xl2tpd.conf

; /etc/xl2tpd/xl2tpd.conf - configuration file for use with L2TP over IPsec.
; $Id$

; Manual: xl2tpd.conf(5)

; Created: dim. déc. 5 21:42:31 2010
;      by: The L2TP IPsec VPN Manager application version 0.9.7
;
; WARNING! All changes made in this file will be lost!

[global]
; listen-addr = 192.168.178.28
debug avp = no
debug network = no
debug packet = no
debug state = no
debug tunnel = no


[lac vpntaf]
lns = xxx.xxx.xxx.xxx         <- il s'agit ici de l'IP du boulot
pppoptfile = /etc/ppp/vpntaf.options.xl2tpd
length bit = yes
redial = yes
redial timeout = 5
max redials = 3

cat /etc/ppp/vpntaf.options.xl2tpd

# /etc/ppp/vpntaf.options.xl2tpd - Options used by PPP when a connection is made by an L2TP daemon
# $Id$

# Manual: PPPD(8)

# Created: dim. déc. 5 21:42:31 2010
#      by: The L2TP IPsec VPN Manager application version 0.9.7
#
# WARNING! All changes made in this file will be lost!

#debug
#dump
#record /var/log/pppd

plugin passprompt.so
ipcp-accept-local
ipcp-accept-remote
idle 72000
ktune
noproxyarp
asyncmap 0
noauth
crtscts
lock
hide-password
modem
noipx

ipparam L2tpIPsecVpn-vpntaf

promptprog "/usr/bin/L2tpIPsecVpn"

refuse-eap


remotename ""
name "samheg"

cert ""
ca ""
key ""

usepeerdns
cat /etc/ppp/chap-secrets
# Secrets for authentication using CHAP
# client        server  secret                  IP addresses
#
samheg    *       monmotdepasse    *
*    samheg       monmotdepasse    *

Et voici ce que j'obtiens dans les logs :

auth.log :

Dec  5 22:23:43 athena ipsec__plutorun: Starting Pluto subsystem...
Dec  5 22:23:43 athena pluto[9888]: Starting Pluto (Openswan Version 2.6.31; Vendor ID OE}GnD\177ZAYe[) pid:9888
Dec  5 22:23:43 athena pluto[9888]: LEAK_DETECTIVE support [enabled]
Dec  5 22:23:43 athena pluto[9888]: SAref support [disabled]: Protocol not available
Dec  5 22:23:43 athena pluto[9888]: SAbind support [disabled]: Protocol not available
Dec  5 22:23:43 athena pluto[9888]: NSS support [disabled]
Dec  5 22:23:43 athena pluto[9888]: HAVE_STATSD notification via /bin/openswan-statsd enabled
Dec  5 22:23:43 athena pluto[9888]: Setting NAT-Traversal port-4500 floating to on
Dec  5 22:23:43 athena pluto[9888]:    port floating activation criteria nat_t=1/port_float=1
Dec  5 22:23:43 athena pluto[9888]:    NAT-Traversal support  [enabled]
Dec  5 22:23:43 athena pluto[9888]: using /dev/urandom as source of random entropy
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: starting up 1 cryptographic helpers
Dec  5 22:23:43 athena pluto[9888]: started helper pid=9891 (fd:7)
Dec  5 22:23:43 athena pluto[9888]: Using Linux 2.6 IPsec interface code on 2.6.35-23-generic (experimental code)
Dec  5 22:23:43 athena pluto[9891]: using /dev/urandom as source of random entropy
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_add(): ERROR: Algorithm already exists
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_add(): ERROR: Algorithm already exists
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_add(): ERROR: Algorithm already exists
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_add(): ERROR: Algorithm already exists
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
Dec  5 22:23:43 athena pluto[9888]: ike_alg_add(): ERROR: Algorithm already exists
Dec  5 22:23:43 athena pluto[9888]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
Dec  5 22:23:43 athena pluto[9888]: Changed path to directory '/etc/ipsec.d/cacerts'
Dec  5 22:23:43 athena pluto[9888]: Changed path to directory '/etc/ipsec.d/aacerts'
Dec  5 22:23:43 athena pluto[9888]: Changed path to directory '/etc/ipsec.d/ocspcerts'
Dec  5 22:23:43 athena pluto[9888]: Changing to directory '/etc/ipsec.d/crls'
Dec  5 22:23:43 athena pluto[9888]:   Warning: empty directory
Dec  5 22:23:43 athena pluto[9888]: added connection description "vpntaf"
Dec  5 22:23:43 athena pluto[9888]: listening for IKE messages
Dec  5 22:23:43 athena pluto[9888]: | invalid listen= option ignored: empty string 
Dec  5 22:23:43 athena pluto[9888]: NAT-Traversal: Trying new style NAT-T
Dec  5 22:23:43 athena pluto[9888]: NAT-Traversal: ESPINUDP(1) setup failed for new style NAT-T family IPv4 (errno=19)
Dec  5 22:23:43 athena pluto[9888]: NAT-Traversal: Trying old style NAT-T
Dec  5 22:23:43 athena pluto[9888]: adding interface eth1/eth1 192.168.0.6:500
Dec  5 22:23:43 athena pluto[9888]: adding interface eth1/eth1 192.168.0.6:4500
Dec  5 22:23:43 athena pluto[9888]: adding interface lo/lo 127.0.0.1:500
Dec  5 22:23:43 athena pluto[9888]: adding interface lo/lo 127.0.0.1:4500
Dec  5 22:23:43 athena pluto[9888]: adding interface lo/lo ::1:500
Dec  5 22:23:43 athena pluto[9888]: adding interface eth1/eth1 2a01:e35:2f21:8510:215:ff:fe37:9a3d:500
Dec  5 22:23:43 athena pluto[9888]: loading secrets from "/etc/ipsec.secrets"
Dec  5 22:23:43 athena pluto[9888]: listening for IKE messages
Dec  5 22:23:43 athena pluto[9888]: forgetting secrets
Dec  5 22:23:43 athena pluto[9888]: loading secrets from "/etc/ipsec.secrets"
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: initiating Main Mode
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: ignoring Vendor ID payload [FRAGMENTATION]
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: enabling possible NAT-traversal with method draft-ietf-ipsec-nat-t-ike-05
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: STATE_MAIN_I2: sent MI2, expecting MR2
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: i am NATed
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: STATE_MAIN_I3: sent MI3, expecting MR3
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: Main mode peer ID is ID_IPV4_ADDR: 'xxx.xxx.xxx.xxx'
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW {using isakmp#1 msgid:0b060dcc proposal=defaults pfsgroup=no-pfs}
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=0b060dcc
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: our client subnet returned doesn't match my proposal - us:192.168.0.6/32 vs them:yyy.yyy.yyy.yyy/32
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: Allowing questionable proposal anyway [ALLOW_MICROSOFT_BAD_PROPOSAL]
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: peer client type is FQDN
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: peer client subnet returned doesn't match my proposal - us:xxx.xxx.xxx.xxx/32 vs them:yyy.yyy.yyy.yyy/32
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: Allowing questionable proposal anyway [ALLOW_MICROSOFT_BAD_PROPOSAL]
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: IDcr was FQDN: srv-LOCAL, using NAT_OA=0.0.0.0/32 as IDcr
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: netlink_raw_eroute: WARNING: that_client port 0 and that_host port 1701 don't match. Using that_client port.
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP=>0x1325c8ed <0xfe011c4f xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=none DPD=none}
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
Dec  5 22:23:43 athena pluto[9888]: "vpntaf" #2: sending encrypted notification INVALID_PAYLOAD_TYPE to xxx.xxx.xxx.xxx:4500

et dans syslog :

Dec  5 22:23:42 athena L2tpIPsecVpnControlDaemon: Opening client connection
Dec  5 22:23:42 athena L2tpIPsecVpnControlDaemon: Executing command ipsec setup start
Dec  5 22:23:42 athena kernel: [ 6499.686536] NET: Registered protocol family 15
Dec  5 22:23:42 athena ipsec_setup: Starting Openswan IPsec U2.6.31/K2.6.35-23-generic...
Dec  5 22:23:42 athena ipsec_setup: Using NETKEY(XFRM) stack
Dec  5 22:23:42 athena kernel: [ 6499.743219] intel_rng: FWH not detected
Dec  5 22:23:42 athena kernel: [ 6499.889988] Initializing XFRM netlink socket
Dec  5 22:23:42 athena kernel: [ 6499.904280] padlock: VIA PadLock not detected.
Dec  5 22:23:42 athena kernel: [ 6499.911273] padlock: VIA PadLock Hash Engine not detected.
Dec  5 22:23:43 athena kernel: [ 6499.936223] padlock: VIA PadLock not detected.
Dec  5 22:23:43 athena ipsec_setup: ...Openswan IPsec started
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Command ipsec setup start finished with exit code 0
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Executing command /etc/init.d/xl2tpd start
Dec  5 22:23:43 athena ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
Dec  5 22:23:43 athena pluto: adjusting ipsec.d to /etc/ipsec.d
Dec  5 22:23:43 athena xl2tpd[9890]: setsockopt recvref[22]: Protocol not available
Dec  5 22:23:43 athena xl2tpd[9890]: This binary does not support kernel L2TP.
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Command /etc/init.d/xl2tpd start finished with exit code 0
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Executing command ipsec auto --ready
Dec  5 22:23:43 athena xl2tpd[9893]: xl2tpd version xl2tpd-1.2.6 started on athena PID:9893
Dec  5 22:23:43 athena xl2tpd[9893]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Dec  5 22:23:43 athena xl2tpd[9893]: Forked by Scott Balmos and David Stipp, (C) 2001
Dec  5 22:23:43 athena xl2tpd[9893]: Inherited by Jeff McAdams, (C) 2002
Dec  5 22:23:43 athena xl2tpd[9893]: Forked again by Xelerance (www.xelerance.com) (C) 2006
Dec  5 22:23:43 athena xl2tpd[9893]: Listening on IP address 0.0.0.0, port 1701
Dec  5 22:23:43 athena ipsec__plutorun: 002 added connection description "vpntaf"
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Command ipsec auto --ready finished with exit code 0
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Executing command ipsec auto --up vpntaf
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Command ipsec auto --up vpntaf finished with exit code 0
Dec  5 22:23:43 athena xl2tpd[9893]: Connecting to host xxx.xxx.xxx.xxx, port 1701
Dec  5 22:23:43 athena L2tpIPsecVpnControlDaemon: Closing client connection
Dec  5 22:23:43 athena xl2tpd[9893]: Connection established to xxx.xxx.xxx.xxx, 1701.  Local: 14826, Remote: 104 (ref=0/0).
Dec  5 22:23:43 athena xl2tpd[9893]: Calling on tunnel 14826
Dec  5 22:23:43 athena xl2tpd[9893]: Call established with xxx.xxx.xxx.xxx, Local: 63818, Remote: 1, Serial: 1 (ref=0/0)
Dec  5 22:23:43 athena xl2tpd[9893]: start_pppd: I'm running: 
Dec  5 22:23:43 athena xl2tpd[9893]: "/usr/sbin/pppd" 
Dec  5 22:23:43 athena xl2tpd[9893]: "passive" 
Dec  5 22:23:43 athena xl2tpd[9893]: "nodetach" 
Dec  5 22:23:43 athena xl2tpd[9893]: "file" 
Dec  5 22:23:43 athena xl2tpd[9893]: "/etc/ppp/vpntaf.options.xl2tpd" 
Dec  5 22:23:43 athena xl2tpd[9893]: "/dev/pts/1" 
Dec  5 22:23:43 athena pppd[9963]: Plugin passprompt.so loaded.
Dec  5 22:23:43 athena pppd[9963]: pppd 2.4.5 started by root, uid 0
Dec  5 22:23:43 athena NetworkManager[1145]:    SCPlugin-Ifupdown: devices added (path: /sys/devices/virtual/net/ppp0, iface: ppp0)
Dec  5 22:23:43 athena NetworkManager[1145]:    SCPlugin-Ifupdown: device added (path: /sys/devices/virtual/net/ppp0, iface: ppp0): no ifupdown configuration found.
Dec  5 22:23:43 athena modem-manager: (net/ppp0): could not get port's parent device
Dec  5 22:23:43 athena pppd[9963]: Using interface ppp0
Dec  5 22:23:43 athena pppd[9963]: Connect: ppp0 <--> /dev/pts/1
Dec  5 22:23:43 athena pppd[9963]: CHAP authentication succeeded
Dec  5 22:23:44 athena pppd[9963]: local  IP address 169.254.207.162
Dec  5 22:23:44 athena pppd[9963]: remote IP address 169.254.217.225
Dec  5 22:23:44 athena pppd[9963]: primary   DNS address 192.168.202.8

Voici ce que me renvoie nmap :

nmap -sP 192.168.202.0/24

Nmap scan report for tse_du_taf (192.168.202.244)
Host is up (0.15s latency).

et pourtant si je fais un :

ping 192.168.202.244
il ne se passe rien.


Ce qui semble poser problème, c'est qu'au bout d'un moment, j'ai les messages suivants qui apparaissent dans syslog :

Dec  5 21:56:27 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:56:27 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 0, tunnel = 47352 Dumping.
Dec  5 21:56:37 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:56:37 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 0, tunnel = 47352 Dumping.
Dec  5 21:56:47 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:56:47 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 0, tunnel = 47352 Dumping.
Dec  5 21:56:52 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:56:52 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 9978, tunnel = 47352 Dumping.
Dec  5 21:56:54 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:56:54 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 9978, tunnel = 47352 Dumping.
Dec  5 21:56:57 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:56:57 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 0, tunnel = 47352 Dumping.
Dec  5 21:56:59 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:56:59 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 9978, tunnel = 47352 Dumping.
Dec  5 21:57:07 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:57:07 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 0, tunnel = 47352 Dumping.
Dec  5 21:57:08 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:57:08 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 9978, tunnel = 47352 Dumping.
Dec  5 21:57:17 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)
Dec  5 21:57:17 athena xl2tpd[9371]: network_thread: unable to find call or tunnel to handle packet.  call = 0, tunnel = 47352 Dumping.
Dec  5 21:57:18 athena xl2tpd[9371]: Can not find tunnel 47352 (refhim=0)

Si vous êtes arrivés jusqu'ici, merci d'avoir pris le temps de me lire.
Que puis-je faire? Une idée ?

Dernière modification par SamheG (Le 10/12/2010, à 09:43)

Hors ligne

#2 Le 06/12/2010, à 01:10

chopinhauer

Re : [Résolu] VPN xl2tp/ipsec

SamheG a écrit :
Nmap scan report for tse_du_taf (192.168.202.244)
Host is up (0.15s latency).

Es-tu sur que la machine répond au ping ? Avec Windows c'est tout à fait possible que ce ne soit pas le cas "pour des raisons de sécurité".


Pensez à donner un bon titre à vos sujets : cela permettra d'aider d'autres utilisateurs dans votre même situation. Ce n'est pas qu'en donnant des solutions qu'on aide, mais aussi en posant des bonnes questions et… facilement trouvables.

Hors ligne

#3 Le 06/12/2010, à 09:42

SamheG

Re : [Résolu] VPN xl2tp/ipsec

Oui elle est censée répondre au ping.

Hors ligne

#4 Le 10/12/2010, à 09:42

SamheG

Re : [Résolu] VPN xl2tp/ipsec

Bon en fait après discussion avec l'admin réseau, il s'avère qu'il y avait un petit pb au niveau du vpn.
Tout est rentré dans l'ordre et la connexion se fait sans soucis avec mes paramètres actuels.
Ceux qui voudront configurer un client XL2TP/IPSEC pourront donc se baser sur les paramètres ci-dessus.

Hors ligne