Michael Tokarev wrote:
[..]
So the question is: is the setup like this one supposed to work at all
in linux?
I know there are other less ugly ways to achieve the same effect, eg
by using GRE/IPIP tunnels and incapsulating the traffic into IPSEC (this
way, we'll have only one transport-mode
I'm not sure if this is the right list for such a questions..
But still.
Recently we tried to set up an IPSEC tunnel in a branch office
of a large company, using linux (currently 2.6.14). The endpoint
is running some Cisco PIX device. Everything's fine, using any
userspace tools available,