<div dir="ltr"><div><div><div><div><div><div>Hi Martin,<br><i><br></i></div><i>Does that host have access to 10.206.1.11 without the IPsec tunnel?<br><br></i></div>No, every other protocol data between .10 and .11 are encrypted.<br>
</div>Let me check my by making the tunnel more specific.<br><br></div>Thanks for the information and hints.<br><br></div>Regards,<br></div>Sriram.<br></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Jan 17, 2014 at 4:53 PM, Martin Willi <span dir="ltr"><<a href="mailto:martin@strongswan.org" target="_blank">martin@strongswan.org</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="im"><br>
> Jan 17 06:57:21 localhost charon: 02[LIB] sending http request to 'http://10.206.1.11:8880'...<br>
> Jan 17 06:57:31 localhost charon: 02[LIB] libcurl http request failed: couldn't connect to host<br>
<br>
</div>Does that host have access to 10.206.1.11 without the IPsec tunnel?<br>
<br>
Please be aware that you can't use the same IPsec tunnel to fetch OSCP<br>
information that you are trying to establish; that's a chicken-and-egg<br>
problem. Until we have support for exchanging OCSP within IKEv2<br>
(RFC4806), you'll have to host the OCSP server on a host that IKE peers<br>
have access to without IPsec.<br>
<br>
Regards<br>
<span class="HOEnZb"><font color="#888888">Martin<br>
<br>
</font></span></blockquote></div><br></div>