I am trying to connect a Win7 x64 Pro client to our IPsec gateway, but it
throws error 13801. On the gateway logs this:

"constraint check failed: peer not authenticated by CA 'C=GR, O=Hellenic
Academic and Research Institutions Cert. Authority, CN=Aristotle University
of Thessaloniki Central CA R4'."

 

I have attached the logfile of the connection attempt and the ipsec.conf

 

 

Jul 29 14:39:34 vpnhost charon: 01[NET] received packet: from 79.167.11.77[500] 
to xxx.xxx.xxx.xxx[500] (528 bytes)
Jul 29 14:39:34 vpnhost charon: 01[ENC] parsed IKE_SA_INIT request 0 [ SA KE No 
N(NATD_S_IP) N(NATD_D_IP) ]
Jul 29 14:39:34 vpnhost charon: 01[IKE] 79.167.11.77 is initiating an IKE_SA
Jul 29 14:39:34 vpnhost charon: 01[IKE] remote host is behind NAT
Jul 29 14:39:34 vpnhost charon: 01[IKE] sending cert request for "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Aristotle 
University of Thessaloniki Central CA R3"
Jul 29 14:39:34 vpnhost charon: 01[IKE] sending cert request for "C=GR, 
O=Aristotle University of Thessaloniki, CN=AUTH Users Certification Authority 
R6"
Jul 29 14:39:34 vpnhost charon: 01[IKE] sending cert request for "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Aristotle 
University of Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 01[IKE] sending cert request for "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 01[ENC] generating IKE_SA_INIT response 0 [ SA 
KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ]
Jul 29 14:39:34 vpnhost charon: 01[NET] sending packet: from 
xxx.xxx.xxx.xxx[500] to 79.167.11.77[500] (393 bytes)
Jul 29 14:39:34 vpnhost charon: 06[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (628 bytes)
Jul 29 14:39:34 vpnhost charon: 06[ENC] parsed IKE_AUTH request 1 [ IDi CERTREQ 
N(MOBIKE_SUP) CPRQ(ADDR DNS NBNS SRV ADDR6 DNS6 SRV6) SA TSi TSr ]
Jul 29 14:39:34 vpnhost charon: 06[IKE] received cert request for "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 06[IKE] received 14 cert requests for an 
unknown ca
Jul 29 14:39:34 vpnhost charon: 06[CFG] looking for peer configs matching 
xxx.xxx.xxx.xxx[%any]...79.167.11.77[192.168.2.60]
Jul 29 14:39:34 vpnhost charon: 06[CFG] selected peer config 'rw-android'
Jul 29 14:39:34 vpnhost charon: 06[IKE] peer requested EAP, config inacceptable
Jul 29 14:39:34 vpnhost charon: 06[CFG] switching to peer config 'rw-win7'
Jul 29 14:39:34 vpnhost charon: 06[IKE] initiating EAP_IDENTITY method (id 0x00)
Jul 29 14:39:34 vpnhost charon: 06[IKE] peer supports MOBIKE
Jul 29 14:39:34 vpnhost charon: 06[IKE] authentication of 'vpnhost.domain.tld' 
(myself) with RSA signature successful
Jul 29 14:39:34 vpnhost charon: 06[IKE] sending end entity cert "C=GR, 
O=Aristotle University of Thessaloniki, OU=IT Center, CN=vpnhost.domain.tld"
Jul 29 14:39:34 vpnhost charon: 06[IKE] sending issuer cert "C=GR, O=Hellenic 
Academic and Research Institutions Cert. Authority, CN=Aristotle University of 
Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 06[ENC] generating IKE_AUTH response 1 [ IDr 
CERT CERT AUTH EAP/REQ/ID ]
Jul 29 14:39:34 vpnhost charon: 06[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (3516 bytes)
Jul 29 14:39:34 vpnhost charon: 13[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (84 bytes)
Jul 29 14:39:34 vpnhost charon: 13[ENC] parsed IKE_AUTH request 2 [ EAP/RES/ID ]
Jul 29 14:39:34 vpnhost charon: 13[IKE] received EAP identity 
'[email protected]'
Jul 29 14:39:34 vpnhost charon: 13[IKE] initiating EAP_TLS method (id 0x8E)
Jul 29 14:39:34 vpnhost charon: 13[ENC] generating IKE_AUTH response 2 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 13[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (68 bytes)
Jul 29 14:39:34 vpnhost charon: 12[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (180 bytes)
Jul 29 14:39:34 vpnhost charon: 12[ENC] parsed IKE_AUTH request 3 [ EAP/RES/TLS 
]
Jul 29 14:39:34 vpnhost charon: 12[TLS] negotiated TLS 1.0 using suite 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Jul 29 14:39:34 vpnhost charon: 12[TLS] sending TLS server certificate 'C=GR, 
O=Aristotle University of Thessaloniki, OU=IT Center, CN=vpnhost.domain.tld'
Jul 29 14:39:34 vpnhost charon: 12[TLS] sending TLS intermediate certificate 
'C=GR, O=Hellenic Academic and Research Institutions Cert. Authority, 
CN=Aristotle University of Thessaloniki Central CA R4'
Jul 29 14:39:34 vpnhost charon: 12[TLS] sending TLS cert request for 'C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Aristotle 
University of Thessaloniki Central CA R3'
Jul 29 14:39:34 vpnhost charon: 12[TLS] sending TLS cert request for 'C=GR, 
O=Aristotle University of Thessaloniki, CN=AUTH Users Certification Authority 
R6'
Jul 29 14:39:34 vpnhost charon: 12[TLS] sending TLS cert request for 'C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Aristotle 
University of Thessaloniki Central CA R4'
Jul 29 14:39:34 vpnhost charon: 12[TLS] sending TLS cert request for 'C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011'
Jul 29 14:39:34 vpnhost charon: 12[ENC] generating IKE_AUTH response 3 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 12[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (1084 bytes)
Jul 29 14:39:34 vpnhost charon: 11[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (68 bytes)
Jul 29 14:39:34 vpnhost charon: 11[ENC] parsed IKE_AUTH request 4 [ EAP/RES/TLS 
]
Jul 29 14:39:34 vpnhost charon: 11[ENC] generating IKE_AUTH response 4 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 11[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (1084 bytes)
Jul 29 14:39:34 vpnhost charon: 14[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (68 bytes)
Jul 29 14:39:34 vpnhost charon: 14[ENC] parsed IKE_AUTH request 5 [ EAP/RES/TLS 
]
Jul 29 14:39:34 vpnhost charon: 14[ENC] generating IKE_AUTH response 5 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 14[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (1084 bytes)
Jul 29 14:39:34 vpnhost charon: 15[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (68 bytes)
Jul 29 14:39:34 vpnhost charon: 15[ENC] parsed IKE_AUTH request 6 [ EAP/RES/TLS 
]
Jul 29 14:39:34 vpnhost charon: 15[ENC] generating IKE_AUTH response 6 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 15[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (1084 bytes)
Jul 29 14:39:34 vpnhost charon: 16[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (68 bytes)
Jul 29 14:39:34 vpnhost charon: 16[ENC] parsed IKE_AUTH request 7 [ EAP/RES/TLS 
]
Jul 29 14:39:34 vpnhost charon: 16[ENC] generating IKE_AUTH response 7 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 16[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (132 bytes)
Jul 29 14:39:34 vpnhost charon: 05[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (1460 bytes)
Jul 29 14:39:34 vpnhost charon: 05[ENC] parsed IKE_AUTH request 8 [ EAP/RES/TLS 
]
Jul 29 14:39:34 vpnhost charon: 05[ENC] generating IKE_AUTH response 8 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 05[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (68 bytes)
Jul 29 14:39:34 vpnhost charon: 04[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (1460 bytes)
Jul 29 14:39:34 vpnhost charon: 04[ENC] parsed IKE_AUTH request 9 [ EAP/RES/TLS 
]
Jul 29 14:39:34 vpnhost charon: 04[ENC] generating IKE_AUTH response 9 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 04[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (68 bytes)
Jul 29 14:39:34 vpnhost charon: 03[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (1084 bytes)
Jul 29 14:39:34 vpnhost charon: 03[ENC] parsed IKE_AUTH request 10 [ 
EAP/RES/TLS ]
Jul 29 14:39:34 vpnhost charon: 03[TLS] received TLS peer certificate 'C=GR, 
O=Aristotle University of Thessaloniki, OU=IT Center, OU=Class B - Private Key 
created and stored in software CSP, CN=Vyronas Tsingaras, 
[email protected]'
Jul 29 14:39:34 vpnhost charon: 03[TLS] received TLS intermediate certificate 
'C=GR, O=Hellenic Academic and Research Institutions Cert. Authority, 
CN=Aristotle University of Thessaloniki Central CA R4'
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Aristotle 
University of Thessaloniki, OU=IT Center, OU=Class B - Private Key created and 
stored in software CSP, CN=Vyronas Tsingaras, [email protected]"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted intermediate ca 
certificate "C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 03[CFG] checking certificate status of "C=GR, 
O=Aristotle University of Thessaloniki, OU=IT Center, OU=Class B - Private Key 
created and stored in software CSP, CN=Vyronas Tsingaras, 
[email protected]"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Aristotle 
University of Thessaloniki, CN=OCSP Responder for AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted intermediate ca 
certificate "C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 1
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response correctly signed by 
"C=GR, O=Aristotle University of Thessaloniki, CN=OCSP Responder for 
AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response is stale: since Jul 29 
14:34:11 2014
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Hellenic 
Academic and Research Institutions Cert. Authority, CN=OCSP Responder for 
HARICA ROOT CA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 0
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response correctly signed by 
"C=GR, O=Hellenic Academic and Research Institutions Cert. Authority, CN=OCSP 
Responder for HARICA ROOT CA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response contains no status on 
our certificate
Jul 29 14:39:34 vpnhost charon: 03[CFG]   requesting ocsp status from 
'http://ocsp.pki.auth.gr' ...
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Aristotle 
University of Thessaloniki, CN=OCSP Responder for AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted intermediate ca 
certificate "C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 1
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response correctly signed by 
"C=GR, O=Aristotle University of Thessaloniki, CN=OCSP Responder for 
AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[LIB]   certificate from Jul 29 14:39:33 2014 
is newer - existing certificate from Jul 29 14:29:11 2014 replaced
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response is valid: until Jul 29 
14:44:33 2014
Jul 29 14:39:34 vpnhost charon: 03[CFG] certificate status is good
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG] checking certificate status of "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Aristotle 
University of Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Aristotle 
University of Thessaloniki, CN=OCSP Responder for AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted intermediate ca 
certificate "C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 1
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response correctly signed by 
"C=GR, O=Aristotle University of Thessaloniki, CN=OCSP Responder for 
AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response contains no status on 
our certificate
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Hellenic 
Academic and Research Institutions Cert. Authority, CN=OCSP Responder for 
HARICA ROOT CA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 0
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response correctly signed by 
"C=GR, O=Hellenic Academic and Research Institutions Cert. Authority, CN=OCSP 
Responder for HARICA ROOT CA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response is stale: since Jul 29 
14:34:11 2014
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Aristotle 
University of Thessaloniki, CN=OCSP Responder for AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted intermediate ca 
certificate "C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 1
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response correctly signed by 
"C=GR, O=Aristotle University of Thessaloniki, CN=OCSP Responder for 
AuthCentralCAR4"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response contains no status on 
our certificate
Jul 29 14:39:34 vpnhost charon: 03[CFG]   requesting ocsp status from 
'http://ocsp.harica.gr' ...
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using certificate "C=GR, O=Hellenic 
Academic and Research Institutions Cert. Authority, CN=OCSP Responder for 
HARICA ROOT CA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   using trusted ca certificate "C=GR, 
O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic 
Academic and Research Institutions RootCA 2011"
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 0
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response correctly signed by 
"C=GR, O=Hellenic Academic and Research Institutions Cert. Authority, CN=OCSP 
Responder for HARICA ROOT CA 2011"
Jul 29 14:39:34 vpnhost charon: 03[LIB]   certificate from Jul 29 14:39:33 2014 
is newer - existing certificate from Jul 29 14:29:11 2014 replaced
Jul 29 14:39:34 vpnhost charon: 03[CFG]   ocsp response is valid: until Jul 29 
14:44:33 2014
Jul 29 14:39:34 vpnhost charon: 03[CFG] certificate status is good
Jul 29 14:39:34 vpnhost charon: 03[CFG]   reached self-signed root ca with a 
path length of 1
Jul 29 14:39:34 vpnhost charon: 03[ENC] generating IKE_AUTH response 10 [ 
EAP/REQ/TLS ]
Jul 29 14:39:34 vpnhost charon: 03[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (132 bytes)
Jul 29 14:39:35 vpnhost charon: 02[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (68 bytes)
Jul 29 14:39:35 vpnhost charon: 02[ENC] parsed IKE_AUTH request 11 [ 
EAP/RES/TLS ]
Jul 29 14:39:35 vpnhost charon: 02[IKE] EAP method EAP_TLS succeeded, MSK 
established
Jul 29 14:39:35 vpnhost charon: 02[ENC] generating IKE_AUTH response 11 [ 
EAP/SUCC ]
Jul 29 14:39:35 vpnhost charon: 02[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (68 bytes)
Jul 29 14:39:36 vpnhost charon: 01[NET] received packet: from 
79.167.11.77[4500] to xxx.xxx.xxx.xxx[4500] (84 bytes)
Jul 29 14:39:36 vpnhost charon: 01[ENC] parsed IKE_AUTH request 12 [ AUTH ]
Jul 29 14:39:36 vpnhost charon: 01[IKE] authentication of '192.168.2.60' with 
EAP successful
Jul 29 14:39:36 vpnhost charon: 01[CFG] constraint check failed: peer not 
authenticated by CA 'C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4'.
Jul 29 14:39:36 vpnhost charon: 01[CFG] selected peer config 'rw-win7' 
inacceptable: non-matching authentication done
Jul 29 14:39:36 vpnhost charon: 01[CFG] no alternative config found
Jul 29 14:39:36 vpnhost charon: 01[ENC] generating IKE_AUTH response 12 [ 
N(AUTH_FAILED) ]
Jul 29 14:39:36 vpnhost charon: 01[NET] sending packet: from 
xxx.xxx.xxx.xxx[4500] to 79.167.11.77[4500] (68 bytes)
config setup
    strictcrlpolicy=no

conn %default
   ikelifetime=24h
   keylife=24h
   keyexchange=ikev2
   dpdaction=clear
   dpdtimeout=3600s
   dpddelay=3600s
   compress=yes
   rightdns=OUR_DNS

conn rw-android
   rekey=no
   leftsubnet=XXX.XXX.XXX.XXX/0
   leftid=vpnhost.domain.tld
   leftcert=vpnhost.domain.tld.pem
   right=%any
   rightsourceip=%itvpnpool
   rightca="C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4"
   rightauth=pubkey
   rightsendcert=ifasked
   auto=add

conn rw-win7
   leftsubnet=0.0.0.0/0
   leftid=vpnhost.domain.tld
   leftcert=vpnhost.domain.tld.pem
   right=%any
   rightid=%any
   rightsourceip=%itvpnpool
   rightca="C=GR, O=Hellenic Academic and Research Institutions Cert. 
Authority, CN=Aristotle University of Thessaloniki Central CA R4"
   rightsendcert=ifasked
   rightauth=eap-tls
   eap_identity=%identity
   auto=add
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to