Coincidentally I have exactly same symptoms connecting 4.1-stable (using
isakmpd.conf and AES SHA1) to an unknown remote Firebox VPN gateway running
"firebox software 8.3" (very sketchy information because I had to prie it
out of the IT people at the remote end).

Rekeying occasionaly fails, Phase 2 is down but Phase 1 SA remains active.
The Firebox side does not reply to my Phase 2 proposals until I manually
kill the Phase 1 SA on my end and reestablish everything. 

I'm inclined to assume the problem lies at Firebox's end. But I have no
access to Watchguard's support pages to see if it is a known problem.

Mitja


> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
> On Behalf Of [EMAIL PROTECTED]
> Sent: Thursday, July 26, 2007 10:05 AM
> To: [email protected]
> Subject: IPSec Keylifetime using ipsecctl and ipsec.conf?
> 
> Hi,
> 
> I am using ipsecctl and /etc/ipsec.conf to create an IPSec 
> tunnel to a  
> WatchGuard Firebox X700 in my company. It works fine, but the  
> re-keying always makes some trouble, it does not always work. My  
> question now is, how can I set the keylifetimes for phase 1 and 2 in  
> /etc/ipsec.conf? Is there a way to do this? The manpage does 
> not give  
> any more info...
> 
> I am running an OpenBSD 4.1 current. My ipsec.conf file looks 
> like this:
> 
> ike esp from 10.240.1.0/24 to 192.168.128.0/24 \
>    peer 1.2.3.4 \
>    main auth hmac-sha1 enc 3des group modp1024 \
>    quick auth hmac-sha1 enc 3des group none \
>    psk "XXXX"
> 
> Regards,
> James

Reply via email to