[strongSwan] Strongswan 5.2.1 client problem - IKEv1 aggressive PSK+XAUTH with Virtual IP

Martin Willi martin at strongswan.org
Fri Dec 19 16:35:05 CET 2014


Hi,

> generating TRANSACTION response 4124377813 [ HASH CPA(X_STATUS) ]
> sending packet: from 192.168.xx.xx[4500] to 192.168.yy.yy[4500] (76 bytes)
> generating TRANSACTION request 2379419226 [ HASH CPRQ(ADDR DNS) ]
> sending packet: from 192.168.xx.xx[4500] to 192.168.yy.yy[4500] (76 bytes)
> received packet: from 192.168.yy.yy[4500] to 192.168.xx.xx[4500] (92 bytes)
> queueing TRANSACTION request as tasks still active
> received packet: from 192.168.yy.yy[4500] to 192.168.xx.xx[4500] (60 bytes)
> payload of type CONFIGURATION_V1 not occurred

Your gateway is initiating a TRANSACTION request after XAuth. Most
likely it is configured to use push mode, while strongSwan performs a
Mode Config pull.

Try to switch to push mode in strongSwan by setting modeconfig=push in
your connection definition.

Regards
Martin



More information about the Users mailing list