my ipsec.conf

config setup
        crlcheckinterval=180
        nat_traversal=yes
        charonstart=yes
        strictcrlpolicy=no
        plutostart=no

conn %default
        ikelifetime=60m
        keylife=20m
        keyexchange=ikev2
        rekeymargin=3m
        keyingtries=1
        left=167.22.15.11
        leftnexthop=167.22.15.1
        leftcert=no2.crt
        left...@test
        leftsourceip=10.3.0.1
        leftsubnet=0.0.0.0/0
        right=%any
        rightsourceip=10.3.0.2
        rightsubnet=10.3.0.0/24
        auto=start

strongswan.conf

charon {
  load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509 hmac
xcbc stroke kernel-netlink updown
}

libstrongswan {
}


ipsec.secrets

: RSA no2.key

---------------------------------------------------------

ipsec statusall:

ipsec statusall
Status of IKEv2 charon daemon (strongSwan 4.3.6dr5):
  uptime: 105 seconds, since Jan 06 14:08:19 2010
  worker threads: 9 idle of 16, job queue load: 0, scheduled events: 0
  loaded plugins: curl aes des sha1 sha2 md5 fips-prf random x509
pubkey pkcs1 pgp dnskey pem sqlite xcbc hmac gmp kernel-netlink stroke
updown attr resolve
Listening IP addresses:
 167.22.15.11
  10.0.0.1
Connections:
Security Associations:
  none


vpn clients:

Initializing the connection using certificate "no1"
Contacting the security gateway at  167.22.15.11...
Secure VPN Connection terminated locally by the Client.
Reason 412: The remote peer is no longer responding.

Connection terminated on: Jan 6, 2010 22:41:52        Duration: 0
day(s), 00:00.00
Not connected.

--------------------------

Thanks for everyone's reply.



On Wed, Jan 6, 2010 at 9:38 PM, Daniel Mentz
<[email protected]> wrote:
> Kalaj wrote:
>>
>> just want to use Cisco VPN client to connect Strongswan but failed.
>> Used x509 authentication and enable --cisco-quirks , maybe I made a
>> wrong certs or wrong conf,
>> can you guys give me some advices? Thanks.
>
> Please provide more details that enable troubleshooting: log files and the
> exact error message you get from Ciscos VPN client.
>
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to