No, there is a single WAN gateway and a single gateway to reach these routed subnets on TNET.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuTNET 2025-06-17T08:42:25 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:17 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:09 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:05 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:42:01 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:59 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:57 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:56 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:55 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
TNET 2025-06-17T08:41:54 91.2.119.28:80 10.10.45.49:32975 tcp Default deny / state violation rule
WAN 2025-06-17T08:41:54 45.76.130.220:14043 91.2.119.28:80 tcp let out anything from firewall host itself (force gw) 14[ENC1] <the uuid|1> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
14[NET1] <the uuid|1> sending packet: from 203.0.113.158[500] to 109.104.97.188[500] (336 bytes)
03[NET2] sending packet: from 203.0.113.158[500] to 198.51.100.188[500]
02[NET2] received packet: from 198.51.100.188[500] to 203.0.113.158[500]
02[NET2] waiting for data on sockets
12[NET1] <the uuid|1> received packet: from 198.51.100.188[500] to 149.106.180.158[500] (446 bytes)
12[ENC1] <the uuid|1> parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) V ]
12[IKE1] <the uuid|1> received Cisco Delete Reason vendor ID
12[IKE1] <the uuid|1> received Cisco Copyright (c) 2009 vendor ID
12[IKE1] <the uuid|1> received FRAGMENTATION vendor ID
12[IKE2] <the uuid|1> received FRAGMENTATION_SUPPORTED notify
12[CFG1] <the uuid|1> selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
12[IKE1] <the uuid|1> local host is behind NAT, sending keep alives
12[IKE2] <the uuid|1> reinitiating already active tasks
12[IKE2] <the uuid|1> IKE_CERT_PRE task
12[IKE2] <the uuid|1> IKE_AUTH task
12[IKE1] <the uuid|1> authentication of '203.0.113.158' (myself) with pre-shared key
12[IKE2] <the uuid|1> successfully created shared key MAC
12[IKE0] <the uuid|1> establishing CHILD_SA c942748f-a0ff-403f-8539-5a2fc2ba54f2{2}
12[ENC1] <the uuid|1> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
12[NET1] <the uuid|1> sending packet: from 203.0.113.158[4500] to 109.104.97.188[4500] (268 bytes)
03[NET2] sending packet: from 203.0.113.158[4500] to 198.51.100.188[4500]
02[NET2] received packet: from 198.51.100.188[4500] to 203.0.113.158[4500]
QuoteAre you sure this does not create any race conditions between the GUI config and the overwritten config?
QuoteIs it always the same proposals after every reload/restart of the service?
QuoteIsabella, did you manage to have the tunnel fully working?
QuoteAlso, in your custom conf file - did you use the connection id the same as in swanctl.conf, or you created full new settings (including p2 children section etc.)? Thanks!
connections {
<the connection UUID from swanctl.conf> {
proposals = aes256-sha1-modp1024
children {
<the child UUID from swanctl.conf> {
esp_proposals = aes256-sha1
}
}
}
}
# cat /usr/local/etc/swanctl/swanctl.conf
# This file is automatically generated. Do not edit
connections {
00000000-0000-0000-0000-000000000000 {
proposals = aes256-sha1-modp2048
unique = no
aggressive = no
<snip>
connections {
00000000-0000-0000-0000-000000000000 {
proposals = aes256-sha1-modp1024
}
}