<div dir="ltr"><div><div><div><div>To whom may it concern,<br></div>I've installed strongswan for IOS on a server and have deployed it's snapshot to another server. The problem is that, my clients can't connect to one of them,I traced the logging process using "ipsec start --nofork --debug-all" <br>
13[IKE] received NAT-T (RFC 3947) vendor ID<br>13[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID<br>13[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID<br>13[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID<br>
13[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID<br>13[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID<br>13[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID<br>13[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br>
13[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID<br>13[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br>13[IKE] received XAuth vendor ID<br>13[IKE] received Cisco Unity vendor ID<br>13[IKE] received DPD vendor ID<br>
13[IKE] 217.218.83.90 is initiating a Main Mode IKE_SA<br>13[ENC] generating ID_PROT response 0 [ SA V V V ]<br>13[NET] sending packet: from 37.123.118.145[500] to 217.218.83.90[500] (136 bytes)<br>14[NET] received packet: from 217.218.83.90[500] to 37.123.118.145[500] (292 bytes)<br>
14[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]<br>14[IKE] remote host is behind NAT<br>14[IKE] sending cert request for "C=US, O=VPNINTOUCH, CN=VPNINTOUCH CA"<br>14[ENC] generating ID_PROT response 0 [ KE No CERTREQ NAT-D NAT-D ]<br>
14[NET] sending packet: from 37.123.118.145[500] to 217.218.83.90[500] (373 bytes)<br>06[JOB] deleting half open IKE_SA after timeout<br></div><br><br><br><br><br>and this is my ipsec .conf<br>config setup<br>        # strictcrlpolicy=yes<br>
        # uniqueids = no<br>        plutostart=yes<br>        nat_traversal=yes<br># Add connections here.<br><br># Sample VPN connections<br><br>conn ios<br>        keyexchange=ikev1<br>        authby=xauthrsasig<br>        xauth=server<br>
        rightauth2=xauth-radius<br>        rightauth=pubkey<br>        left=%defaultroute<br>        eap_identity=110<br>        leftsubnet=<a href="http://0.0.0.0/0">0.0.0.0/0</a><br>        leftcert=serverCert.pem<br>        leftupdown="ipsec _updown"<br>
        right=%any<br>        rightsubnet=<a href="http://10.0.0.0/24">10.0.0.0/24</a><br>        rightsourceip=<a href="http://10.0.0.0/24">10.0.0.0/24</a><br>        rightcert=clientCert.pem<br>        pfs=no<br>    rekey=no<br>
        auto=add<br>    fragmentation=yes<br>        type=tunnel<br>    mediation=yes    <br><br><br><br><br><br></div>May you please help?<br></div>Regards,<br></div>