Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
Openswan 2.3.0 and WinXP clients behind firewall...
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index Networking & Security
View previous topic :: View next topic  
Author Message
agustinchernitsky
n00b
n00b


Joined: 12 Nov 2004
Posts: 14
Location: Argentina

PostPosted: Sat Jun 18, 2005 6:52 pm    Post subject: Openswan 2.3.0 and WinXP clients behind firewall... Reply with quote

Hi Everyone,

I am trying to setup openswan on my Gentoo router with L2TPd support for my WinXP clients. This is the network layout.

WinXP Clients =========== [ Gentoo Router ] <<<< INTERNET >>>> [ Gentoo VPN Gateway] ========== Corp Network.

As you can see, the WinXP clients connect from a public place, wich has this configuration (ie Cybercafes). Now, when I try to connect from a winXP client, I get the IPSEC SA established, but it never gets to the L2TP auth process. It seems it can't get thru NAT.

I have tried this configuration within the same network as the Gentoo VPN GW and it works fine... So, the problem must bue the NAT on the other side. The Gentoo VPN GW has the firewall open (again, for testing purposes).

Has anyone tried this? My best guess is that L2TP is not compatible with NAT...

Any ideas??

Cheers!!

This is my ipsec.conf in the Gentoo VPN Gateway:

Code:
conn road-warrior-psk
        authby=secret
        pfs=no
        right=%any
        rightprotoport=17/1701
        left=200.114.155.43
        #left=192.168.0.33
        leftprotoport=17/1701
        auto=add


Please not I am using PSK as a testing purpose :)

This is the Auth.log:

Code:
Nov 30 07:51:23 extranet pluto[12432]: started helper pid=12460 (fd:6)
Nov 30 07:51:23 extranet pluto[12432]: Using KLIPS IPsec interface code
Nov 30 07:51:23 extranet pluto[12432]: Changing to directory '/etc/ipsec/ipsec.d/cacerts'
Nov 30 07:51:24 extranet pluto[12432]:   loaded CA cert file 'ca.crt' (1818 bytes)
Nov 30 07:51:24 extranet pluto[12432]: Could not change to directory '/etc/ipsec/ipsec.d/aacerts'
Nov 30 07:51:24 extranet pluto[12432]: Changing to directory '/etc/ipsec/ipsec.d/ocspcerts'
Nov 30 07:51:24 extranet pluto[12432]: Changing to directory '/etc/ipsec/ipsec.d/crls'
Nov 30 07:51:24 extranet pluto[12432]:   Warning: empty directory
Nov 30 07:51:24 extranet pluto[12432]: added connection description "road-warrior-psk"
Nov 30 07:51:24 extranet pluto[12432]: listening for IKE messages
Nov 30 07:51:24 extranet pluto[12432]: adding interface ipsec0/eth1 200.114.155.43
Nov 30 07:51:24 extranet pluto[12432]: adding interface ipsec0/eth1 200.114.155.43:4500
Nov 30 07:51:24 extranet pluto[12432]: loading secrets from "/etc/ipsec/ipsec.secrets"
Nov 30 07:51:24 extranet pluto[12432]:   loaded private key file '/etc/ipsec/ipsec.d/private/antvpn.key' (951 bytes)
Nov 30 07:52:17 extranet pluto[12432]: packet from 24.232.73.203:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Nov 30 07:52:17 extranet pluto[12432]: packet from 24.232.73.203:500: ignoring Vendor ID payload [FRAGMENTATION]
Nov 30 07:52:17 extranet pluto[12432]: packet from 24.232.73.203:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Nov 30 07:52:17 extranet pluto[12432]: packet from 24.232.73.203:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Nov 30 07:52:17 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #1: responding to Main Mode from unknown peer 24.232.73.203
Nov 30 07:52:17 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Nov 30 07:52:17 extranet pluto[12432]: packet from 24.232.73.203:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004]
Nov 30 07:52:17 extranet pluto[12432]: packet from 24.232.73.203:500: ignoring Vendor ID payload [FRAGMENTATION]
Nov 30 07:52:17 extranet pluto[12432]: packet from 24.232.73.203:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
Nov 30 07:52:18 extranet pluto[12432]: packet from 24.232.73.203:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Nov 30 07:52:18 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #2: responding to Main Mode from unknown peer 24.232.73.203
Nov 30 07:52:18 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #2: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Nov 30 07:52:20 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed
Nov 30 07:52:21 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #1: WARNING: compute_dh_shared(): for OAKLEY_GROUP_MODP2048 took 209678 usec
Nov 30 07:52:21 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Nov 30 07:52:22 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #1: discarding duplicate packet; already STATE_MAIN_R2
Nov 30 07:52:23 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203 #1: Main mode peer ID is ID_FQDN: '@agustinc'
Nov 30 07:52:23 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203 #1: I did not send a certificate because I do not have one.
Nov 30 07:52:23 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Nov 30 07:52:23 extranet pluto[12432]: | NAT-T: new mapping 24.232.73.203:500/4500)
Nov 30 07:52:23 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #1: sent MR3, ISAKMP SA established
Nov 30 07:52:23 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #1: packet rejected: should have been encrypted
Nov 30 07:52:23 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #1: sending notification INVALID_FLAGS to 24.232.73.203:4500
Nov 30 07:52:24 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #1: retransmitting in response to duplicate packet; already STATE_MAIN_R3
Nov 30 07:52:27 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: responding to Quick Mode
Nov 30 07:52:27 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Nov 30 07:52:27 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: discarding duplicate packet; already STATE_QUICK_R1
Nov 30 07:52:30 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: discarding duplicate packet; already STATE_QUICK_R1
Nov 30 07:52:32 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: route-host output: /usr/lib/ipsec/_updown: doroute `ip route add 24.232.73.203/32 via 24.232.73.203 dev ipsec0 ' failed (RTNETLINK answers: Network is unreachable)
Nov 30 07:52:32 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Nov 30 07:52:32 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: IPsec SA established {ESP/NAT=>0x5f4eac91 <0x9bfc56c5 NATOA=192.168.0.23}
Nov 30 07:53:04 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #1: received Delete SA(0x5f4eac91) payload: deleting IPSEC State #3
Nov 30 07:53:04 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #1: received and ignored informational message
Nov 30 07:53:06 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #1: received Delete SA payload: deleting ISAKMP State #1
Nov 30 07:53:06 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500: deleting connection "road-warrior-psk" instance with peer 24.232.73.203 {isakmp=#0/ipsec=#0}
Nov 30 07:53:07 extranet pluto[12432]: "road-warrior-psk": unroute-host output: /usr/lib/ipsec/_updown: doroute `ip route delete 24.232.73.203/32 via 24.232.73.203 dev ipsec0 ' failed (RTNETLINK answers: No such process)
Nov 30 07:53:07 extranet pluto[12432]: packet from 24.232.73.203:4500: received and ignored informational message
Nov 30 07:53:28 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203:4500 #2: max number of retransmissions (2) reached STATE_MAIN_R1
Nov 30 07:53:28 extranet pluto[12432]: "road-warrior-psk"[1] 24.232.73.203:4500: deleting connection "road-warrior-psk" instance with peer 24.232.73.203 {isakmp=#0/ipsec=#0}


And my daemon.log:

Code:
Nov 30 07:51:18 extranet ipsec_setup: Starting Openswan IPsec 2.3.0...
Nov 30 07:51:19 extranet ipsec_setup: Using /lib/modules/2.4.28-gentoo-r8/kernel/net/ipsec/ipsec.o
Nov 30 07:51:19 extranet ipsec_setup: KLIPS debug `all'
Nov 30 07:51:20 extranet ipsec_setup: KLIPS ipsec0 on eth1 200.114.155.43/255.255.255.0 broadcast 255.255.255.255
Nov 30 07:51:21 extranet ipsec_setup: ...Openswan IPsec started
Nov 30 07:52:33 extranet l2tpd[12643]: ourtid = 16012, entropy_buf = 3e8c
Nov 30 07:52:33 extranet l2tpd[12643]: ourcid = 7198, entropy_buf = 1c1e
Nov 30 07:52:33 extranet l2tpd[12643]: check_control: control, cid = 0, Ns = 0, Nr = 0
Nov 30 07:52:33 extranet l2tpd[12643]: handle_avps: handling avp's for tunnel 16012, call 7198
Nov 30 07:52:33 extranet l2tpd[12643]: message_type_avp: message type 1 (Start-Control-Connection-Request)
Nov 30 07:52:33 extranet l2tpd[12643]: protocol_version_avp: peer is using version 1, revision 0.
Nov 30 07:52:33 extranet l2tpd[12643]: framing_caps_avp: supported peer frames: sync
Nov 30 07:52:33 extranet l2tpd[12643]: bearer_caps_avp: supported peer bearers:
Nov 30 07:52:33 extranet l2tpd[12643]: firmware_rev_avp: peer reports firmware version 1280 (0x0500)
Nov 30 07:52:33 extranet l2tpd[12643]: hostname_avp: peer reports hostname 'agustinc'
Nov 30 07:52:33 extranet l2tpd[12643]: vendor_avp: peer reports vendor 'Microsoft'
Nov 30 07:52:33 extranet l2tpd[12643]: assigned_tunnel_avp: using peer's tunnel 1
Nov 30 07:52:33 extranet l2tpd[12643]: receive_window_size_avp: peer wants RWS of 8.  Will use flow control.
Nov 30 07:52:33 extranet l2tpd[12643]: ourtid = 63305, entropy_buf = f749
Nov 30 07:52:33 extranet l2tpd[12643]: check_control: control, cid = 0, Ns = 0, Nr = 0
Nov 30 07:52:33 extranet l2tpd[12643]: handle_avps: handling avp's for tunnel 63305, call 0
Nov 30 07:52:33 extranet l2tpd[12643]: message_type_avp: message type 1 (Start-Control-Connection-Request)
Nov 30 07:52:33 extranet l2tpd[12643]: protocol_version_avp: peer is using version 1, revision 0.
Nov 30 07:52:33 extranet l2tpd[12643]: framing_caps_avp: supported peer frames: sync
Nov 30 07:52:33 extranet l2tpd[12643]: bearer_caps_avp: supported peer bearers:
Nov 30 07:52:33 extranet l2tpd[12643]: firmware_rev_avp: peer reports firmware version 1280 (0x0500)
Nov 30 07:52:33 extranet l2tpd[12643]: hostname_avp: peer reports hostname 'agustinc'
Nov 30 07:52:33 extranet l2tpd[12643]: vendor_avp: peer reports vendor 'Microsoft'
Nov 30 07:52:33 extranet l2tpd[12643]: assigned_tunnel_avp: using peer's tunnel 1
Nov 30 07:52:33 extranet l2tpd[12643]: receive_window_size_avp: peer wants RWS of 8.  Will use flow control.
Nov 30 07:52:33 extranet l2tpd[12643]: control_finish: Peer requested tunnel 1 twice, ignoring second one.
Nov 30 07:52:35 extranet l2tpd[12643]: ourtid = 45756, entropy_buf = b2bc
Nov 30 07:52:35 extranet l2tpd[12643]: ourcid = 53172, entropy_buf = cfb4
Nov 30 07:52:35 extranet l2tpd[12643]: check_control: control, cid = 0, Ns = 0, Nr = 0
Nov 30 07:52:35 extranet l2tpd[12643]: handle_avps: handling avp's for tunnel 45756, call 53172
Nov 30 07:52:35 extranet l2tpd[12643]: message_type_avp: message type 1 (Start-Control-Connection-Request)
Nov 30 07:52:35 extranet l2tpd[12643]: protocol_version_avp: peer is using version 1, revision 0.
Nov 30 07:52:35 extranet l2tpd[12643]: framing_caps_avp: supported peer frames: sync
Nov 30 07:52:35 extranet l2tpd[12643]: bearer_caps_avp: supported peer bearers:
Nov 30 07:52:35 extranet l2tpd[12643]: firmware_rev_avp: peer reports firmware version 1280 (0x0500)
Nov 30 07:52:35 extranet l2tpd[12643]: hostname_avp: peer reports hostname 'agustinc'
Nov 30 07:52:35 extranet l2tpd[12643]: vendor_avp: peer reports vendor 'Microsoft'
Nov 30 07:52:35 extranet l2tpd[12643]: assigned_tunnel_avp: using peer's tunnel 1
Nov 30 07:52:35 extranet l2tpd[12643]: receive_window_size_avp: peer wants RWS of 8.  Will use flow control.
Nov 30 07:52:35 extranet l2tpd[12643]: control_finish: Peer requested tunnel 1 twice, ignoring second one.
Nov 30 07:52:36 extranet l2tpd[12643]: ourtid = 536, entropy_buf = 218
Nov 30 07:52:37 extranet l2tpd[12643]: ourcid = 19492, entropy_buf = 4c24
Nov 30 07:52:37 extranet l2tpd[12643]: check_control: control, cid = 0, Ns = 0, Nr = 0
Nov 30 07:52:37 extranet l2tpd[12643]: handle_avps: handling avp's for tunnel 536, call 19492
Nov 30 07:52:37 extranet l2tpd[12643]: message_type_avp: message type 1 (Start-Control-Connection-Request)
Nov 30 07:52:37 extranet l2tpd[12643]: protocol_version_avp: peer is using version 1, revision 0.
Nov 30 07:52:37 extranet l2tpd[12643]: framing_caps_avp: supported peer frames: sync
Nov 30 07:52:37 extranet l2tpd[12643]: bearer_caps_avp: supported peer bearers:
Nov 30 07:52:37 extranet l2tpd[12643]: firmware_rev_avp: peer reports firmware version 1280 (0x0500)
Nov 30 07:52:37 extranet l2tpd[12643]: hostname_avp: peer reports hostname 'agustinc'
Nov 30 07:52:37 extranet l2tpd[12643]: vendor_avp: peer reports vendor 'Microsoft'
Nov 30 07:52:37 extranet l2tpd[12643]: assigned_tunnel_avp: using peer's tunnel 1
Nov 30 07:52:37 extranet l2tpd[12643]: receive_window_size_avp: peer wants RWS of 8.  Will use flow control.
Nov 30 07:52:37 extranet l2tpd[12643]: control_finish: Peer requested tunnel 1 twice, ignoring second one.
Nov 30 07:52:38 extranet l2tpd[12643]: control_xmit: Maximum retries exceeded for tunnel 16012.  Closing.
Nov 30 07:52:38 extranet l2tpd[12643]: call_close : Connection 1 closed to 24.232.73.203, port 1701 (Timeout)
Nov 30 07:52:43 extranet l2tpd[12643]: control_xmit: Unable to deliver closing message for tunnel 16012. Destroying anyway.
Nov 30 07:52:44 extranet l2tpd[12643]: ourtid = 51180, entropy_buf = c7ec
Nov 30 07:52:44 extranet l2tpd[12643]: ourcid = 19703, entropy_buf = 4cf7
Nov 30 07:52:44 extranet l2tpd[12643]: check_control: control, cid = 0, Ns = 0, Nr = 0
Nov 30 07:52:44 extranet l2tpd[12643]: handle_avps: handling avp's for tunnel 51180, call 19703
Nov 30 07:52:44 extranet l2tpd[12643]: message_type_avp: message type 1 (Start-Control-Connection-Request)
Nov 30 07:52:44 extranet l2tpd[12643]: protocol_version_avp: peer is using version 1, revision 0.
Nov 30 07:52:44 extranet l2tpd[12643]: framing_caps_avp: supported peer frames: sync
Nov 30 07:52:44 extranet l2tpd[12643]: bearer_caps_avp: supported peer bearers:
Nov 30 07:52:44 extranet l2tpd[12643]: firmware_rev_avp: peer reports firmware version 1280 (0x0500)
Nov 30 07:52:44 extranet l2tpd[12643]: hostname_avp: peer reports hostname 'agustinc'
Nov 30 07:52:44 extranet l2tpd[12643]: vendor_avp: peer reports vendor 'Microsoft'
Nov 30 07:52:44 extranet l2tpd[12643]: assigned_tunnel_avp: using peer's tunnel 1
Nov 30 07:52:44 extranet l2tpd[12643]: receive_window_size_avp: peer wants RWS of 8.  Will use flow control.
Nov 30 07:52:49 extranet l2tpd[12643]: control_xmit: Maximum retries exceeded for tunnel 51180.  Closing.
Nov 30 07:52:49 extranet l2tpd[12643]: call_close : Connection 1 closed to 24.232.73.203, port 1701 (Timeout)
Nov 30 07:52:54 extranet l2tpd[12643]: control_xmit: Unable to deliver closing message for tunnel 51180. Destroying anyway.
Nov 30 07:52:54 extranet l2tpd[12643]: ourtid = 5440, entropy_buf = 1540
Nov 30 07:52:54 extranet l2tpd[12643]: ourcid = 4881, entropy_buf = 1311
Nov 30 07:52:54 extranet l2tpd[12643]: check_control: control, cid = 0, Ns = 0, Nr = 0
Nov 30 07:52:54 extranet l2tpd[12643]: handle_avps: handling avp's for tunnel 5440, call 4881
Nov 30 07:52:54 extranet l2tpd[12643]: message_type_avp: message type 1 (Start-Control-Connection-Request)
Nov 30 07:52:54 extranet l2tpd[12643]: protocol_version_avp: peer is using version 1, revision 0.
Nov 30 07:52:54 extranet l2tpd[12643]: framing_caps_avp: supported peer frames: sync
Nov 30 07:52:54 extranet l2tpd[12643]: bearer_caps_avp: supported peer bearers:
Nov 30 07:52:54 extranet l2tpd[12643]: firmware_rev_avp: peer reports firmware version 1280 (0x0500)
Nov 30 07:52:54 extranet l2tpd[12643]: hostname_avp: peer reports hostname 'agustinc'
Nov 30 07:52:54 extranet l2tpd[12643]: vendor_avp: peer reports vendor 'Microsoft'
Nov 30 07:52:54 extranet l2tpd[12643]: assigned_tunnel_avp: using peer's tunnel 1
Nov 30 07:52:54 extranet l2tpd[12643]: receive_window_size_avp: peer wants RWS of 8.  Will use flow control.
Nov 30 07:52:59 extranet l2tpd[12643]: control_xmit: Maximum retries exceeded for tunnel 5440.  Closing.
Nov 30 07:52:59 extranet l2tpd[12643]: call_close : Connection 1 closed to 24.232.73.203, port 1701 (Timeout)
Nov 30 07:53:04 extranet l2tpd[12643]: control_xmit: Unable to deliver closing message for tunnel 5440. Destroying anyway.


Kernel: 2.4.28-gentoo-r8
Openswan: 2.3.0[/code]
Back to top
View user's profile Send private message
v_tieleman
n00b
n00b


Joined: 29 Mar 2005
Posts: 8
Location: The Netherlands

PostPosted: Fri Jun 24, 2005 10:56 am    Post subject: Reply with quote

Actually, it is not your L2TPD that is causing problems.
I actually had the same problem, namely the openswan server can not create a route to the client that is connecting:

Nov 30 07:52:32 extranet pluto[12432]: "road-warrior-psk"[2] 24.232.73.203:4500 #3: route-host output: /usr/lib/ipsec/_updown: doroute `ip route add 24.232.73.203/32 via 24.232.73.203 dev ipsec0 ' failed (RTNETLINK answers: Network is unreachable)

Do you have another router in between? I actually have the following setup:


Windows XP VPN Client ---- Gentoo Gateway ---- Router A ---- Internet ---- Router B (192.168.0.1) --- Gentoo VPN Server --- Network (192.168.0.0/24)


The routers in my case are ADSL modems. The problem is the VPN server does not know the route to the VPN client has to go through the Router B.
You can fix it by adding the following line:

rightnexthop=192.168.0.1
Back to top
View user's profile Send private message
agustinchernitsky
n00b
n00b


Joined: 12 Nov 2004
Posts: 14
Location: Argentina

PostPosted: Fri Jun 24, 2005 4:15 pm    Post subject: Solution Reply with quote

well, after trying and trying I found this from http://www.jacco2.dds.nl/networking/freeswan-l2tp.html.

Quote:
22.3 Gateway not reachable


You are using KLIPS and you get the following error:


route-host output: /usr/lib/ipsec/_updown: doroute `ip route add x.x.x.x/32 via x.x.x.x dev ipsec0 ' failed
(RTNETLINK answers: Network is unreachable)

This means that the packets are not routed to the proper ipsecN interface so they are not processed
by KLIPS. This may be a bug which is to be solved in Openswan 2.3.1. You can work around this problem by adding an extra line to the Openswan configuration file, e.g.:

conn L2TP-CERT
authby=rsasig
pfs=no
left=123.123.123.123
leftnexthop=<IP_address_of_your_gateway>
leftrsasigkey=%cert
leftcert=/etc/ipsec.d/ssl/localCERT.pem
etc.


There are no ipsecN interfaces if you are using 26sec instead of KLIPS. So in theory the leftnexthop parameter would not work but I noticed that I did have to use this leftnexthop= parameter when the Openswan server was behind NAT.


So, using my config, I changed my ipsec.conf to:

Code:
conn road-warrior-psk
        authby=secret
        pfs=no
        compress=yes
        right=%any #Road warrior
        rightprotoport=17/1701
        leftnexthop=my isp gateway
        left=my public ip
        leftprotoport=17/1701
        auto=add


Once I changed this, I got an IPSEC with PSK auth and L2TP running. Works like a charm!

Let me know if it works![/quote]
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index Networking & Security All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum