[strongSwan] Strongswan 5.2.1 client problem - IKEv1 aggressive PSK+XAUTH with Virtual IP
Martin Willi
martin at strongswan.org
Fri Dec 19 16:35:05 CET 2014
Hi,
> generating TRANSACTION response 4124377813 [ HASH CPA(X_STATUS) ]
> sending packet: from 192.168.xx.xx[4500] to 192.168.yy.yy[4500] (76 bytes)
> generating TRANSACTION request 2379419226 [ HASH CPRQ(ADDR DNS) ]
> sending packet: from 192.168.xx.xx[4500] to 192.168.yy.yy[4500] (76 bytes)
> received packet: from 192.168.yy.yy[4500] to 192.168.xx.xx[4500] (92 bytes)
> queueing TRANSACTION request as tasks still active
> received packet: from 192.168.yy.yy[4500] to 192.168.xx.xx[4500] (60 bytes)
> payload of type CONFIGURATION_V1 not occurred
Your gateway is initiating a TRANSACTION request after XAuth. Most
likely it is configured to use push mode, while strongSwan performs a
Mode Config pull.
Try to switch to push mode in strongSwan by setting modeconfig=push in
your connection definition.
Regards
Martin
More information about the Users
mailing list