Project

General

Profile

strongSwan User Documentation » History » Version 16

Martin Willi, 02.09.2007 08:12
Added link to IPsecDirectory

1 5 Martin Willi
= strongSwan User Documentation =
2 2 Martin Willi
3 2 Martin Willi
== Features ==
4 4 Martin Willi
  * [wiki:VirtualIp Virtual IP] via mode-config (IKEv1) or configuration payload (IKEv2)
5 2 Martin Willi
  * [wiki:NatTraversal NAT Traversal]
6 2 Martin Willi
  * [wiki:MobIke MOBIKE]
7 2 Martin Willi
8 15 Martin Willi
== Configuration ==
9 15 Martin Willi
  * [wiki:IpsecConf ipsec.conf]
10 15 Martin Willi
  * [wiki:IpsecSecrets ipsec.secrets]
11 16 Martin Willi
  * [wiki:IpsecDirectory ipsec.d]
12 1 Martin Willi
13 15 Martin Willi
== Interoperability ==
14 15 Martin Willi
15 15 Martin Willi
 * [wiki:WindowsVista Windows Vista]
16 15 Martin Willi
17 15 Martin Willi
== FAQ ==
18 15 Martin Willi
19 6 Martin Willi
'''Q:''' ''I'm trying to set up a VPN tunnel with a ZyXELL/Linksys/X router but the other side keeps on telling me "no proposal chosen" when strongSwan initiates the connection.''
20 9 Martin Willi
21 6 Martin Willi
'''A:''' Make sure that the peer supports all the algorithms (including the key lengths) which strongSwan proposes for IKE and ESP. In terms of IKE, the proposal consists of the following parts: Encryption algorithm, hash algorithm (PRF) and DH group. In terms of ESP the proposal includes the following: Encryption algorithm, hash algorithm, pfs group (DH group) and '''compression algorithm'''. There are lots of IPSec implementations out there that do '''not''' support compression or have implemented it erronously. So the first thing to try in this situation is to switch compression off on the peer. strongSwan's default setting is
22 6 Martin Willi
{{{
23 1 Martin Willi
compress=no
24 7 Tobias Brunner
}}} 
25 7 Tobias Brunner
See also Chapter [http://www.strongswan.org/docs/readme4.htm#section_14.1 14.1 Authentication and encryption algorithms] of the strongSwan documentation. It has good information about the relevant parameters.