Hi Martin,

Thanks for your quick response.

But then why its not showing SA as ESTABLISHED while its indeed ESTABLISHED
and working fine for IKEv1:

M1 (Octean):
IKEv1
Ipsec version:
 Linux strongSwan U4.5.3/K2.6.32.60-1-lfs130202-
ci1-fct

Output:

root@172:~ >ipsec status
000 "conn1":
10.10.10.0/24===10.10.10.8[CN=RY110409750.nokiasiemensnetworks.com<http://10.10.10.0/24===10.10.10.8%5BCN=RY110409750.nokiasiemensnetworks.com>,
O=Nokia Siemens Networks]...10.10.10.9[10.10.10.9]===10.10.10.0/24;
erouted; eroute owner: #2
000 "conn1":   newest ISAKMP SA: #1; newest IPsec SA: #2;
000
000 #2: "conn1" STATE_QUICK_I2 (sent QI2, IPsec SA established);
EVENT_SA_REPLACE in 12280s; newest IPSEC; eroute owner
000 #2: "conn1" esp.ca76e203@10.10.10.9 (168 bytes, 11s ago)
esp.c01555e3@10.10.10.8 (168 bytes, 11s ago); tunnel
000 #1: "conn1" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in
10778s; newest ISAKMP
000
*Security Associations (0 up, 0 connecting):*
  none


is this a known issue and pluto daemon do not support this?





On Wed, Apr 24, 2013 at 4:24 PM, Martin Willi <mar...@strongswan.org> wrote:

> Hi,
>
> > Linux strongSwan U4.5.3/K2.6.32.60-1-lfs130202-ci1-fct
> > Linux strongSwan U5.0.2/K2.6.18-128.el5
>
> > Why is there such a difference between two outputs?
>
> strongSwan 5.x introduces a completely new implementation of the IKEv1
> protocol in the charon daemon (that previously handled IKEv2 only).
>
> 4.x used a different implementation of IKEv1, the pluto daemon.
>
> Regards
> Martin
>
>


-- 
Anuj Aggarwal

 .''`.
: :Ⓐ :   # apt-get install hakuna-matata
`. `'`
   `-
_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to