I have sucesfully connected SuperFreeS/WAN 1.99.8 to Gauntlet 6.0 for Solaris using certificates.
The main problem was ID for Gauntlet - you can track it out in /var/log/secure: "Gauntlet" #4: we require peer to have ID '10.0.3.190', but peer declares '3020' Certificate requests, and private keys were generated by openssl, and then signed by Microsoft CA. Notice that connected subnets declared in /etc/ipsec.conf should be exactly the same as ones declared at Gauntlet side. When connecting two Gauntlets, they usually tolerate if subnet declared at one side is broader for instance, 255.255.255.0 instead of 255.255.255.192). Here is the working config: conn %default keyingtries=5 ikelifetime=8h keylife=8h authby=rsasig leftcert=FreeSwanPublicKey.pem leftrsasigkey=%cert rightrsasigkey=%cert left=10.0.2.140 leftsubnet=192.168.0.0/24 leftnexthop=%defaultroute auto=add conn Gauntlet type=tunnel auth=esp pfs=no auto=start compress=no keyexchange=ike right=10.0.3.190 [EMAIL PROTECTED] # this worked for me, you can find correct id in /var/log/secure rightsubnet=192.168.1.0/24 ike=3des-sha-modp1024 esp=3des-sha1 rekeymargin=9m rekeyfuzz=25% Hope this helps, Aleksandar Antic Senior Network Administrator Teletrader Software AG Belgrade office