AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() ![]() ![]() Mikrotik Log: 16:53:49 ipsec,error phase1 negotiation failed due to time up 10.07.161.22.19 be65b4bf51adec2d:0000000000000000ġ6:53:57 ipsec,info initiate new phase 1 (Identity Protection): 10.07.161.22. phase1 negotiation failed due to time up pluto : Jul 20 14:07:39 docker pluto16103: 'mikrotik-to-linux': We cannot identify ourselves with either end of this connection. May 17 20:53:09 hamsocial charon: 07 parsed ID_PROT request 0 May 17 20:52:59 hamsocial charon: 14 generating INFORMATIONAL_V1 request 1065270688 ![]() May 17 20:52:59 hamsocial charon: 14 parsed ID_PROT request 0 May 17 20:52:59 hamsocial charon: 14 received packet: from 206.83.248.2 to 107.161.22.19 (128 bytes) When I try to set up an AWS Site-to-Site VPN connection in Amazon Virtual Private Cloud (Amazon VPC), the IPsec/Phase 2 of my configuration fails to. May 17 20:52:49 hamsocial charon: 06 generating INFORMATIONAL_V1 request 1363442209 May 17 20:52:49 hamsocial charon: 06 parsed ID_PROT request 0 # RSA private key for this host, authenticating it to any other host StrongSwan nf: # nf - strongSwan IPsec configuration fileĬonn # This file holds shared secrets or RSA private keys for authentication. I have gone down to simple PSK auth to try to get it to work. We have a client with 6 sites using IPsec. The RB2011 is on my home network and the Strongswan is on a VPS at a 3rd party provider. Hoping someone can help me figure out what I am doing wrong. Right now I have an example from Strongswan setup will no luck still. I have searched through google and found some great examples and still cannot figure out what is the problem. I am trying to connect a Mikrotik RB2011RM to Strongswan running on a cloud server. ![]()
0 Comments
Read More
Leave a Reply. |