<span style="font-family: Arial; font-size: 13px;">I am attempting to setup an ikev1 ipsec session with a device for which the vendor has provided me with the necessary racoon config however I am having trouble translating this to an equivalent strongswan config and am hoping someone can point out where i am going wrong. It's seems fairly straightforward however I am continually getting the error "no ike config found". Both the initiator and responder (strongswan) are behind nat however i have forwarded the necessary ports and tested this works correctly with another strongswan client (also behind nat) so I am confident that is not the issue.<br><br>This is my racoon config;<br><p><br></p><p><i>path pre_shared_key “/etc/racoon/psk.txt”<br></i></p><p><i>remote anonymous {
</i></p><p><i> exchange_mode main;</i></p><i>
</i><p><i> proposal_check claim;</i></p><i>
</i><p><i> proposal {</i></p><i>
</i><p><i> encryption_algorithm aes;</i></p><i>
</i><p><i> hash_algorithm sha1;</i></p><i>
</i><p><i> authentication_method pre_shared_key;</i></p><i>
</i><p><i> dh_group 2;</i></p><i>
</i><p><i> }</i></p><i>
</i><p><i> generate_policy on;</i></p><i>
</i><p><i> nat_traversal on;</i></p><i>
</i><p><i> peers_identifier user_fqdn “test@test.com”;</i></p><i>
</i><p><i>}</i></p><p><i>sainfo anonymous {</i></p><i>
</i><p><i> encryption_algorithm aes;</i></p><i>
</i><p><i> authentication_algorithm hmac_sha1;</i></p><i>
</i><p><i> compression_algorithm deflate;</i></p><i>
</i><p><i>}</i></p><p>psk.txt <br></p><p><i>test@test.com password</i></p><p><br></p><p>and this is my strongswan config</p><p>ipsec.conf<br></p><p><i>config setup<br><br>conn %default<br> ikelifetime=60m<br> keylife=20m<br> rekeymargin=3m<br> keyingtries=1</i><br></p><i>conn test<br> keyexchange=ikev1<br> nat_traversal=yes<br> left=x.x.x.x <- my internal ip<br> leftsubnet=0.0.0.0/0<br> leftfirewall=yes<br> right=%any<br> rightid=test@test.com<br> rightsourceip=z.z.z.z/24 <- the virtual ip pool i'm assigning an ip from<br> auto=add<br> compress=yes<br> ike=aes128-sha1-modp1024<br> esp=aes128-sha1<br> authby=secret</i><br><br>ipsec.secrets<br><br><i>x.x.x.x test@test.com : PSK "password"</i><br><br>Cheers,<br><br>Pete<br></span>