Can any1 help me out on this?<br><br><div class="gmail_quote">On Thu, Mar 15, 2012 at 9:10 AM, SaRaVanAn <span dir="ltr">&lt;<a href="mailto:saravanan.nagarajan87@gmail.com">saravanan.nagarajan87@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><b></b>Hi Team, <br><br><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
i am facing the below problem. Please help me <br>
[root@localhost ~]# cat /var/log/secure  | tail<br>Mar 16 20:29:48 localhost pluto[9955]: | find_host_pair: comparing to <a href="http://172.31.114.227:500/" target="_blank">172.31.114.227:500</a> <a href="http://0.0.0.0:500/" target="_blank">0.0.0.0:500</a><br>


Mar 16 20:29:48 localhost pluto[9955]: | find_host_pair_conn (find_host_connection2): <a href="http://172.31.114.227:500/" target="_blank">172.31.114.227:500</a> %any:500 -&gt; hp:north-east<br>Mar 16 20:29:48 localhost pluto[9955]: | searching for connection with policy = PSK+AGGRESSIVE<br>


Mar 16 20:29:48 localhost pluto[9955]: | found policy = PSK+ENCRYPT+TUNNEL+IKEv2ALLOW+<div>SAREFTRACK (north-east)<br><b>Mar 16 20:29:48 localhost pluto[9955]: | find_host_connection2 returns empty<br>Mar 16 20:29:48 localhost pluto[9955]: packet from <a href="http://172.31.114.226:500/" target="_blank">172.31.114.226:500</a>:
 initial Aggressive Mode message from 172.31.114.226 but no (wildcard) 
connection has been configured with policy=PSK+AGGRESSIVE</b><br>
Mar 16 20:29:48 localhost pluto[9955]: | complete state transition with STF_IGNORE<br>Mar 16 20:29:48 localhost pluto[9955]: | * processed 0 messages from cryptographic helpers<br>Mar 16 20:29:48 localhost pluto[9955]: | next event EVENT_PENDING_DDNS in 42 seconds<br>


Mar 16 20:29:48 localhost pluto[9955]: | next event EVENT_PENDING_DDNS in 42 seconds<br><br>Topology:<br>+++++++<br><br>VPNC<br>client                        <div>            GW                                 Openswan(VPN server)<br>

10.1.1.1 ----------- 10.1.1.2  -------- 172.31.114.226 ---------   172.31.114.227<br>
</div><br><br>Peer conf<br>++++++<br><br>[root@localhost ~]# vim /etc/vpnc.conf<br><br>IPSec gateway 172.31.114.227<br>IPSec ID <a href="http://tester.vpn.com/" target="_blank">tester.vpn.com</a><br>
IPSec secret test<br>Xauth username tester<br>Xauth password tester<div><div><img src="http://images/cleardot.gif"></div></div></div>
</blockquote><div class="gmail_quote"><div><div>/etc/ipsec.conf<br>++++++++<br>
</div></div></div>config setup<br>        # Debug-logging controls:  &quot;none&quot; for (almost) none, &quot;all&quot; for lots.<br>        # klipsdebug=none<br>        # plutodebug=&quot;control parsing&quot;<br>        # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey<br>

        protostack=netkey<br>        klipsdebug=all<br>        plutodebug=all<br>        nat_traversal=yes<br>        virtual_private=<br>        oe=off<br>        # Enable this if you see &quot;failed to find any available worker&quot;<br>

        nhelpers=0<br>        interfaces=%defaultroute<br><br>conn north-east<br>    type=tunnel<br>    left=%any<br>    right=172.31.114.227<br>    rightid=<a href="mailto:tester@tester.vpn.com" target="_blank">tester@tester.vpn.com</a><br>

    leftxauthclient=yes<br>    rightxauthserver=yes<br>    leftxauthusername=tester<br>    keyexchange=ike<br>    auto=add<br>    authby=secret<br>    pfs=no<br>    rekey=yes<br>    ikelifetime=3000s<br>    keylife=3000s<br>

    keyingtries=0<br><br>/etc/ipsec.secrets<br>++++++++++++<br>%any <a href="http://172.31.114.227" target="_blank">172.31.114.227</a>: PSK &quot;test&quot;<br>@tester : XAUTH &quot;tester&quot;<br><br><br>
</blockquote></div><br>