Olá,

Estou tentando configurar uma VPN entre uma máquina linux slackware 10.1 kernel 2.4.22 e um firewall PIX da cisco

Instalei o freeswan, quando digito ipsec verify aparece o seguinte:

Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux FreeS/WAN 2.06
Checking for IPsec kernel support: found KLIPS [OK]
Checking that pluto is running [OK]
Two or more interfaces found, checking IP forwarding [OK]
Checking NAT and MASQUERADEing

Opportunistic Encryption DNS checks:
Looking for TXT in forward map: cdwrite [MISSING]
Does the machine have at least one non-private address? [OK]
Looking for TXT in reverse map: 83.142.195.200.in-addr.arpa. [MISSING]
*************************************************************E quando digito ipsec auto --up claro, aparece o seguinte :

106 "claro" #1: STATE_MAIN_I2: sent MI2, expecting MR2
108 "claro" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "claro" #1: STATE_MAIN_I4: ISAKMP SA established
112 "claro" #3: STATE_QUICK_I1: initiate
003 "claro" #3: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME
003 "claro" #3: prepare-host command exited with status 127
003 "claro" #3: route-host command exited with status 127
032 "claro" #3: STATE_QUICK_I1: internal error
031 "claro" #3: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
000 "claro" #3: starting keying attempt 2 of an unlimited number, but releasing whack

**********************************************************
Meu ipsec.conf está da seguinte forma:

config setup
# Debug-logging controls: "none" for (almost) none, "all" for lots.
dumpdir=/tmp
klipsdebug=all
plutodebug=all
interfaces=%defaultroute
#pluto=yes
forwardcontrol=yes
uniqueids=yes

conn claro
auto=start
type=tunnel
#LEFT:Human
left=200.xxx.xxx.xxx
leftnexthop=%defaultroute
leftsubnet=200.xxx.xxx.xxx/xx
#RIGHT:Claro
right=200.xxx.xxx.xxx
rightnexthop=200.xxx.xxx.xxx
rightsubnet=200.xxx.xxx.xxx/xx
#keyingtries=1
#disablearrivalcheck=no
authby=secret
keyexchange=ike
#ikelifetime=240m
#keylife=480m
#rekey=yes
pfs=no
auth=esp
esp=3des-sha1
compress=no

conn block
auto=ignore

conn private
auto=ignore

conn private-or-clear
auto=ignore

conn clear-or-private
auto=ignore

conn clear
auto=ignore

conn packetdefault
auto=ignore


Alguém sabe o que pode estar havendo??