cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1768
Views
0
Helpful
4
Replies

Cisco DMVPN / Custom NHRP client + StrongSwan issue

luwoj
Level 1
Level 1

I'm looking for help with figuring out why IPSec connection does not work. I'm trying to establish a secure GRE tunnel between CISCO router (DMVPN) and custom NHRP client + StrongSwan.

 

Here's my CISCO config (relevant portions anyway):

 

(...)crypto ikev2 proposal ikev2-proposal
 encryption aes-cbc-256 aes-cbc-128 aes-cbc-192
 integrity sha256 sha512
 group 14 2
!
crypto ikev2 policy IKEPOLICYLOCAL
 match fvrf any
 match address local 192.168.200.1
 proposal ikev2-proposal
!
crypto ikev2 keyring KEYRING
 peer any
  address 0.0.0.0 0.0.0.0
  pre-shared-key secret
 !
 peer 192.168.200.2
  address 192.168.200.2
  pre-shared-key secret
 !
!
!
crypto ikev2 profile IKEPROFILE
 match identity remote address 0.0.0.0
 authentication remote pre-share
 authentication local pre-share
 keyring local KEYRING
!
!
!
!
!
crypto isakmp policy 1
 encr 3des
 hash sha256
 authentication pre-share
 group 14
crypto isakmp key secret address 0.0.0.0
!
!
crypto ipsec transform-set transform-gre esp-3des esp-sha256-hmac
 mode transport
crypto ipsec transform-set transform-gre-transport esp-3des esp-sha256-hmac
 mode transport
crypto ipsec transform-set TS esp-aes 256 esp-sha256-hmac
 mode transport
!
crypto ipsec profile IPSECPROFILE
 set transform-set TS
 set ikev2-profile IKEPROFILE
!
!
crypto ipsec profile dmvpn-protect3
 set transform-set transform-gre-transport
!
!
!
!
!
!
interface Tunnel0
 ip address 10.255.255.1 255.255.255.0
 no ip redirects
 ip nhrp map multicast dynamic
 ip nhrp network-id 1
 ip ospf network broadcast
 tunnel source GigabitEthernet0/1
 tunnel mode gre multipoint
 tunnel protection ipsec profile IPSECPROFILE
!
interface Embedded-Service-Engine0/0
 no ip address
 shutdown
!
interface GigabitEthernet0/0
 ip address dhcp
 shutdown
 duplex auto
 speed auto
!
interface GigabitEthernet0/1
 ip address 192.168.200.1 255.255.255.0
 duplex auto
 speed auto
!
(...)

 

Here's StrongSwan config that is being produced (swanctl.conf):

 

connections {
        XXX {
                local_addrs = 192.168.200.2
                remote_addrs = 192.168.200.1
                proposals = default
                local {
                        auth = psk
                }
                remote {
                        auth = psk
                }
                children {
                        XXX {
                                esp_proposals = default
                                #esp_proposals = aes128-sha256
                                rekey_time = 10m
                                mode = transport
                        }
                }
        }
        version = 2
        mobike = no
}

secrets {
        ike-XXX {
                secret = secret
        }
}

 

The result of swanctl --initiate --child XXX is:

 

Router#
*Dec 26 22:35:07.691: %CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd packet not an IPSEC packet. (ip) vrf/dest_addr= /192.168.200.1, src_addr= 192.168.200.2, prot= 47

*Dec 26 22:35:08.495: IKEv2:Received Packet [From 192.168.200.2:500/To 192.168.200.1:500/VRF i0:f0]
Initiator SPI : CBFF31FC7D33F529 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUEST
Payload contents:
 SA KE N NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) NOTIFY(Unknown - 16430) NOTIFY(Unknown - 16431) NOTIFY(REDIRECT_SUPPORTED)

*Dec 26 22:35:08.495: IKEv2:(SESSION ID = 9,SA ID = 1):Verify SA init message
*Dec 26 22:35:08.495: IKEv2:(SESSION ID = 9,SA ID = 1):Insert SA
*Dec 26 22:35:08.495: IKEv2:Searching Policy with fvrf 0, local address 192.168.200.1
*Dec 26 22:35:08.495: IKEv2:Using the Default Policy for Proposal
*Dec 26 22:35:08.495: IKEv2:Found Policy 'default'
*Dec 26 22:35:08.495: IKEv2:(SESSION ID = 9,SA ID = 1):Processing IKE_SA_INIT message
*Dec 26 22:35:08.499: IKEv2:(SESSION ID = 9,SA ID = 1):: The peer's KE payload contained the wrong DH group
*Dec 26 22:35:08.499: IKEv2:(SESSION ID = 9,SA ID = 1):Sending invalid ke notification, peer sent group 19, local policy prefers group 2

*Dec 26 22:35:08.499: IKEv2:(SESSION ID = 9,SA ID = 1):Sending Packet [To 192.168.200.2:500/From 192.168.200.1:500/VRF i0:f0]
Initiator SPI : CBFF31FC7D33F529 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange RESPONSE
Payload contents:
 NOTIFY(INVALID_KE_PAYLOAD)

*Dec 26 22:35:08.499: IKEv2:(SESSION ID = 9,SA ID = 1):Failed SA init exchange
*Dec 26 22:35:08.499: IKEv2:(SESSION ID = 9,SA ID = 1):Initial exchange failed: Initial exchange failed
*Dec 26 22:35:08.503: IKEv2:(SESSION ID = 9,SA ID = 1):Abort exchange
*Dec 26 22:35:08.503: IKEv2:(SESSION ID = 9,SA ID = 1):Deleting SA

*Dec 26 22:35:08.507: IKEv2:Received Packet [From 192.168.200.2:500/To 192.168.200.1:500/VRF i0:f0]
Initiator SPI : CBFF31FC7D33F529 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUEST
Payload contents:
 SA KE N NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) NOTIFY(Unknown - 16430) NOTIFY(Unknown - 16431) NOTIFY(REDIRECT_SUPPORTED)

*Dec 26 22:35:08.507: IKEv2:(SESSION ID = 10,SA ID = 1):Verify SA init message
*Dec 26 22:35:08.507: IKEv2:(SESSION ID = 10,SA ID = 1):Insert SA
*Dec 26 22:35:08.507: IKEv2:Searching Policy with fvrf 0, local address 192.168.200.1
*Dec 26 22:35:08.507: IKEv2:Using the Default Policy for Proposal
*Dec 26 22:35:08.507: IKEv2:Found Policy 'default'
*Dec 26 22:35:08.507: IKEv2:(SESSION ID = 10,SA ID = 1):Processing IKE_SA_INIT message
*Dec 26 22:35:08.507: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieve configured trustpoint(s)
*Dec 26 22:35:08.507: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): NONE
*Dec 26 22:35:08.507: IKEv2:Failed to retrieve Certificate Issuer list
*Dec 26 22:35:08.507: IKEv2:(SESSION ID = 10,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 2
*Dec 26 22:35:08.507: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
*Dec 26 22:35:08.507: IKEv2:(SESSION ID = 10,SA ID = 1):Request queued for computation of DH key
*Dec 26 22:35:08.507: IKEv2:(SESSION ID = 10,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 2
*Dec 26 22:35:08.535: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
*Dec 26 22:35:08.535: IKEv2:(SESSION ID = 10,SA ID = 1):Request queued for computation of DH secret
*Dec 26 22:35:08.535: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA
*Dec 26 22:35:08.535: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED
*Dec 26 22:35:08.535: IKEv2:IKEv2 responder - no config data to send in IKE_SA_INIT exch
*Dec 26 22:35:08.535: IKEv2:(SESSION ID = 10,SA ID = 1):Generating IKE_SA_INIT message
*Dec 26 22:35:08.535: IKEv2:(SESSION ID = 10,SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
   AES-CBC   SHA256   SHA256   DH_GROUP_1024_MODP/Group 2
*Dec 26 22:35:08.535: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieve configured trustpoint(s)
*Dec 26 22:35:08.535: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): NONE
*Dec 26 22:35:08.535: IKEv2:Failed to retrieve Certificate Issuer list

*Dec 26 22:35:08.535: IKEv2:(SESSION ID = 10,SA ID = 1):Sending Packet [To 192.168.200.2:500/From 192.168.200.1:500/VRF i0:f0]
Initiator SPI : CBFF31FC7D33F529 - Responder SPI : DF46102669005D56 Message id: 0
IKEv2 IKE_SA_INIT Exchange RESPONSE
Payload contents:
 SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)

*Dec 26 22:35:08.535: IKEv2:(SESSION ID = 10,SA ID = 1):Completed SA init exchange
*Dec 26 22:35:08.535: IKEv2:(SESSION ID = 10,SA ID = 1):Starting timer (30 sec) to wait for auth message

*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Received Packet [From 192.168.200.2:4500/To 192.168.200.1:500/VRF i0:f0]
Initiator SPI : CBFF31FC7D33F529 - Responder SPI : DF46102669005D56 Message id: 1
IKEv2 IKE_AUTH Exchange REQUEST
Payload contents:
 IDi AUTH NOTIFY(USE_TRANSPORT_MODE) NOTIFY(ESP_TFC_NO_SUPPORT) SA TSi TSr NOTIFY(Unknown - 16396) NOTIFY(Unknown - 16397) NOTIFY(Unknown - 16397) NOTIFY(Unknown - 16417) NOTIFY(Unknown - 16420)

*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Stopping timer to wait for auth message
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Checking NAT discovery
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):NAT detected float to init port 4500, resp port 4500
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Searching policy based on peer's identity '192.168.200.2' of type 'IPv4 address'
*Dec 26 22:35:08.543: IKEv2:found matching IKEv2 profile 'IKEPROFILE'
*Dec 26 22:35:08.543: IKEv2:% Getting preshared key from profile keyring KEYRING
*Dec 26 22:35:08.543: IKEv2:% Matched peer block '192.168.200.2'
*Dec 26 22:35:08.543: IKEv2:Searching Policy with fvrf 0, local address 192.168.200.1
*Dec 26 22:35:08.543: IKEv2:Using the Default Policy for Proposal
*Dec 26 22:35:08.543: IKEv2:Found Policy 'default'
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Verify peer's policy
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Peer's policy verified
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Get peer's authentication method
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Peer's authentication method is 'PSK'
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Get peer's preshared key for 192.168.200.2
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Verify peer's authentication data
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Use preshared key for id 192.168.200.2, key len 6
*Dec 26 22:35:08.543: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
*Dec 26 22:35:08.543: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
*Dec 26 22:35:08.543: IKEv2:(SESSION ID = 10,SA ID = 1):Verification of peer's authenctication data PASSED
*Dec 26 22:35:08.547: IKEv2:(SESSION ID = 10,SA ID = 1):Processing IKE_AUTH message
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 5 flags 16370 keysize 128 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 6 flags 16370 keysize 128 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 7 flags 16370 keysize 128 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 2 flags 16370 keysize 128 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 0 flags 16370 keysize 128 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 1 flags 16370 keysize 128 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 5 flags 16370 keysize 192 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 6 flags 16370 keysize 192 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 7 flags 16370 keysize 192 IDB 0x0
*Dec 26 22:35:08.547: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 2 flags 16370 keysize 192 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 0 flags 16370 keysize 192 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 1 flags 16370 keysize 192 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 5 flags 16370 keysize 256 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 6 flags 16370 keysize 256 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 7 flags 16370 keysize 256 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 2 flags 16370 keysize 256 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 0 flags 16370 keysize 256 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 1 flags 16370 keysize 256 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 3 hmac 5 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 3 hmac 6 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 3 hmac 7 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 3 hmac 2 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 3 hmac 0 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.551: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 3 hmac 1 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.555: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 0 hmac 5 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.555: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 0 hmac 6 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.555: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 0 hmac 7 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.555: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 0 hmac 2 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.559: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 0 hmac 0 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.559: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 0 hmac 1 flags 16370 keysize 0 IDB 0x0
*Dec 26 22:35:08.563: IKEv2:(SESSION ID = 10,SA ID = 1):Received Policies: : Failed to find a matching policyESP: Proposal 1:  AES-CBC-128 AES-CBC-192 AES-CBC-256 3DES BLOWFISH SHA256 SHA384 SHA512 SHA96 AES XCBC 96 MD596 Don't use ESN
*Dec 26 22:35:08.571:
*Dec 26 22:35:08.571:
*Dec 26 22:35:08.571: IKEv2:(SESSION ID = 10,SA ID = 1):Expected Policies: : Failed to find a matching policy
*Dec 26 22:35:08.571: IKEv2:(SESSION ID = 10,SA ID = 1):: Failed to find a matching policy
*Dec 26 22:35:08.571: IKEv2:(SESSION ID = 10,SA ID = 1):Sending no proposal chosen notify
*Dec 26 22:35:08.571: IKEv2:(SESSION ID = 10,SA ID = 1):Get my authentication method
*Dec 26 22:35:08.571: IKEv2:(SESSION ID = 10,SA ID = 1):My authentication method is 'PSK'
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Get peer's preshared key for 192.168.200.2
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Generate my authentication data
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Use preshared key for id 192.168.200.1, key len 6
*Dec 26 22:35:08.575: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
*Dec 26 22:35:08.575: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Get my authentication method
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):My authentication method is 'PSK'
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Generating IKE_AUTH message
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Constructing IDr payload: '192.168.200.1' of type 'IPv4 address'
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Building packet for encryption.
Payload contents:
 VID IDr AUTH NOTIFY(NO_PROPOSAL_CHOSEN)

*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Sending Packet [To 192.168.200.2:4500/From 192.168.200.1:4500/VRF i0:f0]
Initiator SPI : CBFF31FC7D33F529 - Responder SPI : DF46102669005D56 Message id: 1
IKEv2 IKE_AUTH Exchange RESPONSE
Payload contents:
 ENCR

*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Session with IKE ID PAIR (192.168.200.2, 192.168.200.1) is UP
*Dec 26 22:35:08.575: IKEv2:IKEv2 MIB tunnel started, tunnel index 1
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):Checking for duplicate IKEv2 SA
*Dec 26 22:35:08.575: IKEv2:(SESSION ID = 10,SA ID = 1):No duplicate IKEv2 SA found
*Dec 26 22:35

 

I simply don't get it. It appears that correct policy is already there, and that everything should work. The error message I see does not instantly point to what the problem could be. Or is it ?

 

I would really appreciate help with this.

4 Replies 4

Francesco Molino
VIP Alumni
VIP Alumni
Hi

Based on logs you have different error messages like authentication issues, proposal and DH group.

Here a link showing how to make sure your Cisco and strongwan stress configured in the right way to talk ikev2 and build the vpn tunnel :
https://www.cisco.com/c/en/us/support/docs/ip/internet-key-exchange-ike/117258-config-l2l.html#anc10

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Francesco, you refer to "different error messages". I agree that there's some kind of authentication issue, but the problem is I don't know what exactly.
Phase 1 seems to be finished successfully.
Then authentication phase begins and it does not finish with success (I think). So the problem lies here. But what EXACTLY is the problem ?

As of the link provided.. in this example, crypto maps are used, and I think they don't apply to DMVPN scenario.

I’m not sure Phase1 is up and running. Maybe you can share output of show crypto ikev2 sa.

Also when I do DMVPN between Cisco and Linux I always use Quagga for NHRPd.
Here a link that can help: https://wiki.alpinelinux.org/wiki/Dynamic_Multipoint_VPN_(DMVPN)_Phase_3_with_Quagga_NHRPd

Maybe you can share some logs from strongwan. Please attach a text file with logs otherwise it’s not easy to read it doing scrolling.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

I don't see any reference to GRE encapsulation in your StrongSwan configuration.  Is GRE configured on the StrongSwan device?

--
Please remember to select a correct answer and rate helpful posts
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: