Hi,<br><br>I've configured a openswan to connect to a checkpoint by a linux with this doc : <a href="http://www.fw-1.de/aerasec/ng/vpn-freeswan/CP-FW1-NG+Linux-FreeSWAN-RoadWarrior.html">http://www.fw-1.de/aerasec/ng/vpn-freeswan/CP-FW1-NG+Linux-FreeSWAN-RoadWarrior.html
</a><br><br>But i've this error in my logs when i start ipsec :<br><br><blockquote style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;" class="gmail_quote">loading secrets from "/etc/ipsec/ipsec.secrets"
<br>loaded private key file '/etc/ipsec.d/private/freeswan-key.pem' (1103 bytes)<br>"freeswan-checkpoint-x509-net" #1: max number of retransmissions (2) reached STATE_MAIN_I3. Possible authentication failure: no acceptable response to our first encrypted message
<br>"freeswan-checkpoint-x509-net" #1: starting keying attempt 2 of an unlimited number<br>"freeswan-checkpoint-x509-net" #2: initiating Main Mode to replace #1<br>"freeswan-checkpoint-x509-net" #2: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
<br>"freeswan-checkpoint-x509-net" #2: STATE_MAIN_I2: sent MI2, expecting MR2<br>"freeswan-checkpoint-x509-net" #2: ignoring CERT_CRL certificate request payload<br>"freeswan-checkpoint-x509-net" #2: I did not send a certificate because I do not have one.
<br>freeswan-checkpoint-x509-net" #2: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3<br>"freeswan-checkpoint-x509-net" #2: STATE_MAIN_I3: sent MI3, expecting MR3<br>"freeswan-checkpoint-x509-net" #2: ignoring informational payload, type INVALID_CERTIFICATE
<br clear="all"></blockquote><br>My ipsec.conf is this :<br><br><blockquote style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;" class="gmail_quote">conn freeswan-checkpoint-x509-net
<br> # Right side is FreeS/WAN RoadWarrior<br> rightrsasigkey=%cert<br> right=%defaultroute<br> rightid="/O=noc-jupiter..iu2ehn/OU=users/CN=test-marc"<br> #rightcert=freeswan-cert.pem
# As an alternative, the file itself can be specified<br> # Left side is Check Point<br> left=XX.XX.XX.XX<br> leftsubnet=<a href="http://10.255.253.0/24">10.255.253.0/24</a><br> leftcert=checkpoint-cert.pem
<br> leftrsasigkey=%cert<br> #leftrsasigkey=0x0103...... # only needed for old FreeS/WAN<br> leftid=XX.XX.XX.XX # Check Point VPN-1 send IP address as ID<br> #leftid= # leave unset for old FreeS/WAN
<br> # config<br> type=tunnel<br> keyingtries=0<br> disablearrivalcheck=no<br> authby=rsasig<br> auth=esp<br> ike=3des-sha-modp1024<br> esp=3des-sha1<br> keyexchange=ike
<br> auto=start<br> pfs=no<br></blockquote><br><br>Can you help me please to resolv my problem.<br>Thanks.<br><br>-- <br>------------------------<br>SoukoussMan<br><a href="mailto:SoukoussMan@gmail.com">SoukoussMan@gmail.com
</a>