update:
I enabled remote logging on the attached computers and this is the log output when I hit the 'Save' button on the VPN:IPsec Tunnels page:
I also list the content of the racoon.conf file(s)
PC1:
Feb 15 01:28:11 pcbasedrouter.domain236 racoon: INFO: caught signal 15
Feb 15 01:28:12 pcbasedrouter.domain236 racoon: INFO: racoon shutdown
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: @(#)ipsec-tools 0.7.3 (
http://ipsec-tools.sourceforge.net)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: @(#)This product linked OpenSSL 0.9.7e-p1 25 Oct 2004 (
http://www.openssl.org/)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: Reading configuration from "/var/etc/racoon.conf"
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: NOTIFY: NAT-T is enabled, autoconfiguring ports
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.31[500] used as isakmp port (fd=8)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.31[500] used for NAT-T
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.31[4500] used as isakmp port (fd=9)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.31[4500] used for NAT-T
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::2e0:4cff:feeb:c9b8%ng1[500] used as isakmp port (fd=10)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::2e0:4cff:feeb:c9b8%ng1[4500] used as isakmp port (fd=11)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::1%lo0[500] used as isakmp port (fd=12)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::1%lo0[4500] used as isakmp port (fd=13)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: ::1[500] used as isakmp port (fd=14)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: ::1[4500] used as isakmp port (fd=15)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=16)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 127.0.0.1[500] used for NAT-T
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 127.0.0.1[4500] used as isakmp port (fd=17)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 127.0.0.1[4500] used for NAT-T
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::21b:2fff:fe34:d4d1%rg0[500] used as isakmp port (fd=18)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::21b:2fff:fe34:d4d1%rg0[4500] used as isakmp port (fd=19)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.1[500] used as isakmp port (fd=20)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.1[500] used for NAT-T
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.1[4500] used as isakmp port (fd=21)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.236.1[4500] used for NAT-T
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::240:5ff:fe7e:5a76%rl1[500] used as isakmp port (fd=22)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: fe80::240:5ff:fe7e:5a76%rl1[4500] used as isakmp port (fd=23)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.1.100[500] used as isakmp port (fd=24)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.1.100[500] used for NAT-T
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: INFO: 192.168.1.100[4500] used as isakmp port (fd=25)
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: ERROR: such policy already exists. anyway replace it: 192.168.236.0/24[0] 192.168.236.1/32[0] proto=any dir=in
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: ERROR: such policy already exists. anyway replace it: 192.168.4.0/24[0] 192.168.236.0/24[0] proto=any dir=in
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: ERROR: such policy already exists. anyway replace it: 192.168.236.1/32[0] 192.168.236.0/24[0] proto=any dir=out
Feb 15 01:28:13 pcbasedrouter.domain236 racoon: ERROR: such policy already exists. anyway replace it: 192.168.236.0/24[0] 192.168.4.0/24[0] proto=any dir=out
PC2:
Feb 15 01:28:13 192.168.4.1 racoon: INFO: caught signal 15
Feb 15 01:28:14 192.168.4.1 racoon: INFO: racoon shutdown
Feb 15 01:28:16 192.168.4.1 racoon: INFO: @(#)ipsec-tools 0.7.3 (
http://ipsec-tools.sourceforge.net)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: @(#)This product linked OpenSSL 0.9.7e-p1 25 Oct 2004 (
http://www.openssl.org/)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: Reading configuration from "/var/etc/racoon.conf"
Feb 15 01:28:16 192.168.4.1 racoon: NOTIFY: NAT-T is enabled, autoconfiguring ports
Feb 15 01:28:16 192.168.4.1 racoon: INFO: fe80::1%lo0[500] used as isakmp port (fd=8)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: fe80::1%lo0[4500] used as isakmp port (fd=9)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: ::1[500] used as isakmp port (fd=10)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: ::1[4500] used as isakmp port (fd=11)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=12)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 127.0.0.1[500] used for NAT-T
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 127.0.0.1[4500] used as isakmp port (fd=13)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 127.0.0.1[4500] used for NAT-T
Feb 15 01:28:16 192.168.4.1 racoon: INFO: fe80::200:24ff:fec8:6449%sis1[500] used as isakmp port (fd=14)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: fe80::200:24ff:fec8:6449%sis1[4500] used as isakmp port (fd=15)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.4.1[500] used as isakmp port (fd=16)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.4.1[500] used for NAT-T
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.4.1[4500] used as isakmp port (fd=17)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.4.1[4500] used for NAT-T
Feb 15 01:28:16 192.168.4.1 racoon: INFO: fe80::200:24ff:fec8:6448%sis0[500] used as isakmp port (fd=18)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: fe80::200:24ff:fec8:6448%sis0[4500] used as isakmp port (fd=19)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.1.101[500] used as isakmp port (fd=20)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.1.101[500] used for NAT-T
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.1.101[4500] used as isakmp port (fd=21)
Feb 15 01:28:16 192.168.4.1 racoon: INFO: 192.168.1.101[4500] used for NAT-T
Feb 15 01:28:16 192.168.4.1 racoon: ERROR: such policy already exists. anyway replace it: 192.168.4.0/24[0] 192.168.4.1/32[0] proto=any dir=in
Feb 15 01:28:16 192.168.4.1 racoon: ERROR: such policy already exists. anyway replace it: 192.168.236.0/24[0] 192.168.4.0/24[0] proto=any dir=in
Feb 15 01:28:16 192.168.4.1 racoon: ERROR: such policy already exists. anyway replace it: 192.168.4.1/32[0] 192.168.4.0/24[0] proto=any dir=out
Feb 15 01:28:16 192.168.4.1 racoon: ERROR: such policy already exists. anyway replace it: 192.168.4.0/24[0] 192.168.236.0/24[0] proto=any dir=out
content of /var/etc/racoon.conf on monowall 1:
path pre_shared_key "/var/etc/psk.txt";
path certificate "/var/etc";
remote 192.168.1.101 {
exchange_mode main;
my_identifier user_fqdn "localuser@localdomain";
nat_traversal on;
peers_identifier address 192.168.1.101;
initial_contact on;
support_proxy on;
proposal_check obey;
dpd_delay 0;
proposal {
encryption_algorithm des;
hash_algorithm sha1;
authentication_method pre_shared_key;
dh_group 2;
lifetime time 28800 secs;
}
lifetime time 28800 secs;
}
sainfo address 192.168.236.0/24 any address 192.168.4.0/24 any {
encryption_algorithm des,3des,blowfish,cast128,rijndael;
authentication_algorithm hmac_sha1,hmac_md5;
compression_algorithm deflate;
pfs_group 2;
lifetime time 86400 secs;
}
content of /var/etc/racoon.conf on monowall 2:
path pre_shared_key "/var/etc/psk.txt";
path certificate "/var/etc";
remote 192.168.1.100 {
exchange_mode main;
my_identifier user_fqdn "localuser@localdomain";
nat_traversal on;
peers_identifier address 192.168.1.100;
initial_contact on;
support_proxy on;
proposal_check obey;
dpd_delay 0;
proposal {
encryption_algorithm des;
hash_algorithm sha1;
authentication_method pre_shared_key;
dh_group 2;
lifetime time 28800 secs;
}
lifetime time 28800 secs;
}
sainfo address 192.168.4.0/24 any address 192.168.236.0/24 any {
encryption_algorithm des,3des,blowfish,cast128;
authentication_algorithm hmac_sha1,hmac_md5;
compression_algorithm deflate;
pfs_group 2;
lifetime time 86400 secs;
}
The psk.txt files contain the 2 entries in one line, first the IP address of the respective other Monowall's WAN port, followed by the _ identical_ preshared key.
One of the routers (mono1) further logs these events which may rather be related to the VPN from PC2 to PC1.
Also, both M0n0walls have the same version 1.34.
Are there any other log files of interest?
-Steffen