Openswan Users Cannot Install Eroute Occurs For Mac

Openswan Users Cannot Install Eroute Occurs For Mac 4,6/5 3494 reviews

Openswan cannot install eroute I am running OpenSwan on Ubuntu 14.04. When I connect from two clients with the same public IP only one is allowd and can connect, also I receive this message in my logging.

OpenSwan Install and Configuration on Ubuntu between AWS VPC's
OpenSwan-guide
Required:
An instance accessible with an EIP from each VPC network
Unique and non-overlapping CIDR ranges
Security Group allowing each others EIP (udp: 500,4500 and icmp: echo reply)
Disable Source/Dest Check on each Openswan AWS instance
Configure Routing Tables on each VPC (add tables with associated subnets)
Remote Network A: 10.11.0.0/16 -> openswan instance id
Remote Network B: 10.10.0.0/16 -> openswan instance id
On Each Server:
Install Openswan
% sudo apt-get install openswan
update /etc/sysctl.conf
--------------------------
net.ipv4.ip_forward=1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.conf.eth0.send_redirects = 0
net.ipv4.conf.default.accept_redirects = 0
net.ipv4.conf.eth0.accept_redirects = 0
--------------------------
% sudo sysctl -p
edit /etc/ipsec.conf
Add line: include /etc/ipsec.d/*.conf (do not indent)
On Network A openswan side, create /etc/ipsec.d/to-networkB.conf:
conn to-networkB
type=tunnel
authby=secret
left=10.10.0.21 ## <- the private IP of your openswan server Network A
leftid=1.2.3.4 ## <- external IP of Network A
leftsubnet=10.10.0.0/16
right=5.6.7.8 ## <- the external IP of Network B
rightsubnet=10.11.0.0/16
pfs=yes
auto=start
Add to /etc/ipsec.secrets file:
1.2.3.4 5.6.7.8: PSK 'create_your_super_secret_phrase_here'
On Network B openswan side, create /etc/ipsec.d/to-networkA.conf:
conn to-networkA
type=tunnel
authby=secret
left=10.11.0.25 ## <- the private IP of your openswan server Network B
leftid=5.6.7.8 ## <- the external IP of Network B
leftsubnet=10.11.0.0/16
right=1.2.3.4 ## <- external IP of Network A
rightsubnet=10.10.0.0/16
pfs=yes
auto=start
Add to /etc/ipsec.secrets file:
5.6.7.8 1.2.3.4: PSK 'create_your_super_secret_phrase_here'
---------
On Both Servers
% service ipsec restart
Look at /var/log/syslog and auth.log for connectivity errors and status
% ipsec auto --status
Test by pinging a host on the other side
Success!

commented Nov 21, 2016

Which ubuntu version have you tried this? I cant make ping to work from VPC 1 to 2 or vice versa with ubuntu 14.04
It just stays at 'ipsec__plutorun: 104 'to-nv' #1: STATE_MAIN_I1: initiate'
Nov 21 17:25:32 ip-172-16-239-10 ipsec_setup: NETKEY support found. Use protostack=netkey in /etc/ipsec.conf to avoid attempts to use KLIPS. Attempting to continue with NETKEY
Nov 21 17:25:32 ip-172-16-239-10 ipsec_setup: Using NETKEY(XFRM) stack
Nov 21 17:25:32 ip-172-16-239-10 kernel: [284815.609461] Initializing XFRM netlink socket
Nov 21 17:25:32 ip-172-16-239-10 ipsec_setup: ..Openswan IPsec started
Nov 21 17:25:32 ip-172-16-239-10 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
Nov 21 17:25:32 ip-172-16-239-10 pluto: adjusting ipsec.d to /etc/ipsec.d
Nov 21 17:25:32 ip-172-16-239-10 ipsec__plutorun: 002 added connection description 'o2nv'
Nov 21 17:25:32 ip-172-16-239-10 ipsec__plutorun: 104 'o2nv' #1: STATE_MAIN_I1: initiate

Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment
Openswan Users Cannot Install Eroute Occurs For Mac

Jul 31, 2012. Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed. Jul 30 21:04:48 raspberrypi pluto[1565]: failed to install outgoing SA: 0. I got the exact same pb with openswan on my raspbian. After my clients successfully connect to StrongSwan, nothing happens. I can't route to any destinations.

List: Subject: From: Date: Message-ID: On May 18, 2011, at 12:23 PM, Richard Schmidt wrote: Reinstalled v2.6.32. As I thought: Mac OSX users can connect from behind the same NAT using NETKEY.

I'm going to have to go with my previous assumption that ignoring the right subnet with the workaround prevents distinguishing connections from the same IP ('eroute in use'). The workaround solved my previous problem of reconnecting clients after the tunnel shutdown several hours ago (like 12-24 hours); getting the xl2tpd error 'attempting to reuse tunnel'. My pluto logs were looking exactly like the ones mentioned with the workaround so I didn't look further into it, but I can recreate the problem if that would help to have a log of my previous (v32 and lower) problem. As it is though, v2.6.33's Mac OSX workaround works well as long as you only have one user on the IP at a time. Concurrent users are a no-go. Is there anything I can do to give some better information about either problem?

This started as an OSX peculiarity didn't it? Maybe there's a bug filed with them that I can track down. I'm using openswan 2.6.33 and xl2tpd 1.2.7 on Ubuntu Lucid (10.04 LTS) with kernel 2.6.32-31-server, and I don't seem to have this issue.

I can connect multiple Snow Leopard and iOS 4.x clients from behind the same NAT. I'm using PSK for IPsec. Reconnection of clients is handled by dead peer detection (DPD). For reference I've attached my /etc/ipsec.conf and /etc/ppp/options.xl2tpd. Hopefully this will help you.

# /etc/ipsec.conf - Openswan IPsec configuration file # RCSID $Id: ipsec.conf.in,v 1.16 2005/07/26 12:29:45 ken Exp $ # This file: /usr/share/doc/openswan/ipsec.conf-sample # # Manual: ipsec.conf.5 version 2.0 # conforms to second version of ipsec.conf specification # basic configuration config setup # Do not set debug options to debug configuration issues!

Update: Adjusted to take into account the modular configuration layout introduced in strongSwan 5.1.2. Tweaked cipher settings to provide perfect forward secrecy if. This article is a step by step guide on how to prepare strongSwan 5 to run your own private VPN, allowing you to stop snoopers from spying on your online activities, to bypass geo-restrictions, and to circumvent overzealous firewalls.

DiskMaker X (formerly Lion DiskMaker) is an application built with AppleScript that you can use with many versions of OS X/macOS to build a bootable drive from OS X/macOS installer program (the one you download from the App Store). Download diskmaker x. MacOS High Sierra Install App: macOS Sierra (10.12) Install Disk: DiskMaker X 6: DiskMaker 6 rc5 (6.1 MB) a3874cbf1d724ce2c651379151b802c0fab4d367: macOS Sierra Install App: OS X El Capitan (10.11) Install Disk: OS X El Capitan: OS X Yosemite (10.10) Install Disk: OS X El Capitan: OS X Mavericks (10.9) Install Disk: DiskMaker X 5: DiskMaker X 5.0.3 (6.3 MB) 804cfca414742d24dd8abf0607bed91a6638d739: Get it with mas! Mas install 675248567: This version of DiskMaker X is not able to build a.

Is a modern and complete IPsec implementation with full support for IKEv1 and IKEv2. It’s natively supported by most modern clients, including Linux, Windows 7, Apple iOS, Mac OSX, FreeBSD and BlackBerry OS. If you wonder why I chose strongSwan over Openswan, check out from strongSwan maintainer Prof. Andreas Steffen (yes, it’s biased and dated, but I find it convincing nonetheless). Throughout this post I assume that you’re using Debian Wheezy. If you don’t – don’t worry.

It should be easy to follow the guide even if you favor another Linux distribution. Installation Debian Wheezy ships with strongSwan 4.5.2. I prefer strongSwan 5, the new mainline branch, which in favor of a single daemon, charon, to handle both IKEv1 and IKEv2. Instead of installing from source, let’s get a copy from, which includes strongSwan 5.1.2 from Debian testing recompiled for Wheezy. Add wheezy-backports to your APT repository $ echo 'deb wheezy-backports main' /etc/apt/sources.list.d/wheezy-backports.list $ apt-get update Install strongSwan $ apt-get -t wheezy-backports install strongswan libcharon-extra-plugins This installs the strongSwan package along with its dependencies (there are only a few). To determine that you’re running the right version, do: $ ipsec version Output: Linux strongSwan U5.1.2/K3.2.0-4-amd64 Institute for Internet Technologies and Applications University of Applied Sciences Rapperswil, Switzerland See 'ipsec -copyright' for copyright information. Excellent – you’re now running strongSwan 5.1.2 on Linux kernel 3.2.0.

Certificate generation Create your certification authority (CA) The first step is to generate the X.509 certificates, including a certificate authority (CA), a server certificate, and at least one client certificate. Let’s start by creating a self-signed root CA certificate. $ cd /etc/ipsec.d/ $ ipsec pki -gen -type rsa -size 4096 -outform pem private/strongswanKey.pem $ chmod 600 private/strongswanKey.pem $ ipsec pki -self -ca -lifetime 3650 -in private/strongswanKey.pem -type rsa -dn 'C=CH, O=strongSwan, CN=strongSwan Root CA' -outform pem cacerts/strongswanCert.pem The result is a 4096 bit RSA private key strongswanKey.pem (line 4) and a self-signed CA certificate strongswanCert.pem (line 10) with a validity of 10 years (3650 days). The files are stored in PEM encoded format (I prefer working with PEM over binary DER, the strongSwan default).

You can change the Distinguished Name (DN) to more relevant values for country (C), organization (O), and common name (CN), but you don’t have to. You’re right regarding MSCHAP. I was going to suggest to try adding an entry for authentication with XAuth alone, but it appears that wouldn’t work well with iOS: “Authentication uses XAuth and certificates (authby=xauthrsasig). Authentication without certificates may fail due to an attempt on the iOS side to use aggressive mode.” So yes, you may have to use a L2TP. If you try further, make sure to compile strongSwan with the nat-transport flag which is required if either server or any of your clients is behind a NAT (using L2TP).

When writing the first iptables command “iptables -t nat -A POSTROUTING -o eth1! -p esp -j SNAT –to-source ” (eth1 is the correct interface in my case, my IP address is a IPv6 address unfortunately, and i didn’t do the permanent changes to /etc/sysctl.conf yet, but the 3 echo commands instead – i don’t know if any of this makes a difference), i get the following error: “iptables v1.4.4 need tcp udp sctp or dccp with port specification” Could you please tell me if i did something wrong, or what else to try?

Thanks in advance. Hi Luca, I don’t have much experience setting up a VPN on a Mac, but I do remember when I did it for a friend once, it took me some time to properly add the certificates. Did you install the client certificate, client keyfile and CA certificate via Utilities-Keychain Access in the System Keychain?

Also, I remember I had to mark both imported certificates as trusted for all users (basically “Always trust” in all settings). For the keyfile make sure to allow all applications to access it (or at least add /usr/sbin/racoon to the list of allowed apps). Then, when you create a “Cisco VPN”, you should be able to select the appropriate certificate, and also supply it with the XAUTH password. That was basically the main hurdle I recall. I’m having same problem with iOS 9: 14IKE authentication with RSA signature successful 14ENC generating IKEAUTH response 1 14NET sending packet: from 4500 to 45 06NET sending packet: from 4500 to 4500 15JOB deleting half open IKESA after timeout 15IKE IKESA IPSec-IKEv2-EAP1 state change: CONNECTING = DESTROYING Tried rightsendcert=false Tried fragmentation=yes But it manifests for both Hostname config and IP certificate config. So at least that issue probably isn’t related to DNS hostname vs IP.

I have Strongswan running on a Debian 3.2.0-4. Server setup: eth0 with a local IP (192.168.1.12) and router gateway 192.168.1.1 (different Internet from eth1) eth1 is connected directly to the outside (not the.1.1 router) with a static public ip (for example, 63.12.1.34 – different Internet from eth0). I have this conn: auto=start type=tunnel left=63.12.1.34 leftsubnet=192.168.1.12/32 leftnexthop=%defaultroute right=4.8.12.13 rightsubnet=172.2.2.0/27 rightnexthop=%defaultroute The connection establishes, I can ssh to the right site, but after a few seconds ssh session keeps freezing. Any idea what the problem could be? Hi Alexander, Thanks for coming back to my question.

I did add the line deb wheezy-backports main to the sources.list file and did the apt-get update with this result at the end: Genegeerd wheezy/rpi Translation-en 836 B opgehaald in 18s (45 B/s) W: GPG-fout: wheezy-backports Release: De volgende ondertekeningen konden niet geverifieerd worden omdat de publieke sleutel niet beschikbaar is: NOPUBKEY 8B48AD W: Ophalen van is mislukt 404 Not Found E: Some index files failed to download. They have been ignored, or old ones used instead.

Root@raspberrypi:# And when i dispite the error try to install acording to the next step in the tutorial i receive the following message: WAARSCHUWING: De volgende pakketten kunnen niet geauthentificeerd worden: strongswan-ike strongswan-starter libstrongswan strongswan-libcharon strongswan-charon libcharon-extra-plugins libstrongswan-standard-plugins strongswan Wilt u deze pakketten installeren zonder verificatie j/N? J At the end i receive the next message:. Restarting strongswan IPsec services: ipsecStopping strongSwan IPsec Illegal instruction failed! Btw, it installs strongswan vesion 5.2.1-4 so that is the version from the normal repository. Root@raspberrypi:# ipsec version Linux strongSwan U5.2.1/K3.12.35+ Institute for Internet Technologies and Applications University of Applied Sciences Rapperswil, Switzerland See ‘ipsec –copyright’ for copyright information.

Root@raspberrypi:# This is the content of my sources.list: deb wheezy main contrib non-free rpi # Uncomment line below then ‘apt-get update’ to enable ‘apt-get source’ #deb-src wheezy main contrib non-free rpi deb wheezy-backports main Hope you can help me with this. Regards, Bert. Bert, I am not familiar with the Raspberry Pi, but it seems you’re using an outdated keyring?

Try to see: # apt-cache policy debian-archive-keyring # apt-key list and finally do: # apt-get install debian-archive-keyring # apt-key update Then, this error: “is mislukt 404 Not Found” seems to indicate that you haven’t entered the repo correctly in your sources list file. Make sure in the line deb wheezy-backports main between wheezy-backports and main there is indeed a space character (nor some other invisible character). If there is still a problem, could you post your /etc/apt/sources.list file here and, if there is anything in it, also the contents of the /etc/apt/source.list.d directory? Hi Conrad, “Illegal instruction” (SIGILL) doesn’t sound good it’s most likely related to the package, how it was compiled, and how it is compatible (or not) with your R Pi. Looks like Bert was successful with an older version of Strongswan.

You could try installing it from another repository (instead of backports). Did you try using the official Raspbian repo? It does contain Strongswan 5.2.1, same like Backports at the moment.

No idea if it works properly, but you could give it a try. To do that, first remove /etc/apt/sources.list.d/wheezy-backports.list again (unless you know how to do package pinning). Then make sure you have the raspbian repo installed. In /etc/apt/sources.list add: deb wheezy main contrib non-free deb-src wheezy main contrib non-free And make sure you have the public sign key installed as well: wget -O – sudo apt-key add – Then follow the instruction in this tutorial, starting with: apt-get install strongswan libcharon-extra-plugins.

Hi Alexander, thank you very much for your instant reply. I was able to add the raspbian testing environment and install the packages with: apt-get -t testing install strongswan libcharon-extra-plugins Now strongswan 5.2.1 works like a charm on my little pi!

I also wanted to say that I really love this howto. With your help, I was able to set up a RPi as a VPN machine that is now supporting all my clients Windows 8.1, Windows Phone 8 (via EAP-TLS) & IOS 8. May I take the liberty to suggest to more tiny things: 1. I used the option ‘–digest sha256’ in order to sign the certificates not with SHA1 2.

I added ‘–flag clientAuth’ to the client certs (e.g. Needed for Windows Phone) Thank you for your help and this great tutorial! Hi Alexander, Thanks for the great article, it’s very understandable. At the point where I want to generate a p12 file from my certificates I get the following error: root@machine:/etc/ipsec.d# openssl pkcs12 -export -inkey private/jelle-laptop-1.pem -in certs/jelle-laptop-1.pem -name 'Test' -certfile cacerts/strongswanCert.pem -caname 'Test' -out jelle.p12 unable to load certificates I am running Ubuntu 14.04, but managed to install the required packages from the repository. I also noticed my private pem files are text files, while my /etc/ipsec.d/certs files are binary files.

Openswan Users Cannot Install Eroute Occurs For Machine

Do you know if this is correct? Hi Jelly, It seems like your certificates are in the binary DER form. In the tutorial I assumed that everything is stored in Base64-encoded DER to make the files more portable. For example, if you go back to the “Create your VPN host certificate” section, check where it says –outform pem certs/vpnHostCert.pem. The outform parameter specifies the encoded form of the certificate, and it’s DER by default. So if you forget that part, you will end up with the binaries you’re seeing. There is an easy way to convert the certificates into base64-encoded PEMs, with something like: openssl x509 -inform der -in certificate.crt -out certificate.pem.

Hello Alexander. Thanks for this tutorial. I am having one small issue; Starting strongSwan 5.2.2 IPsec starter. /opt/etc/ipsec.conf:34: missing value for setting 'conn' invalid config file '/opt/etc/ipsec.conf' unable to start strongSwan - fatal errors in config ipsec.conf:34 is directly related to conn%default unfortunately, i’m a strongswan noob, so i don’t know how parameter requirements might have changed from version to version and this is my first IPSec server.

Thanks in advance for any insight. Adrian, thanks for sharing the info regarding Win Phone 8.1. I’ll update the howto soon.

Microsoft has regarding error code 13801 Error 13801 occurs on the client when:. The certificate is expired.

Discontinued gps gpx nmea point tracks. GPS Track Editor was added by katiaark2 in May 2012 and the latest update was made in Feb 2020. The list of alternatives was updated May 2018. It's possible to update the information on GPS Track Editor or report it as discontinued, duplicated or spam. Gps track editor alternatives for mac Popular Alternatives to GPS Track Editor for Mac. Explore 6 Mac apps like GPS Track Editor, all suggested and ranked by the AlternativeTo user community.

The trusted root for the certificate is not present on the client. The subject name of the certificate does not match the remote computer. The certificate does not have the required Enhanced Key Usage (EKU) values assigned. Did you make sure that the VPN Server Name as given on client certificate matches with the subjectName of the server certificate? I’ve followed your tutorial and at this moment, it works well with iOS devices (IKEv1).

However, I’m having difficulty setting up IKEv2 via Apple Configurator, and seeing that the support pages on the strongSwan site are difficult for me to grasp, I’m hoping that you can help. With Apple Configurator, what would I put for Local Identifier and Remote Identifier? And with regards to other parameters in the Configurator (Dead Peer Detection Rate, IKE/Child SA Params Encryption Algorithm, Integrity Algorithm, Diffie Hellman Group #, and Lifetime in Minutes, and would be best to use?

Hi Alex, Thank you for well written tutorial. It helped me a lot.

One thing however – maybe it is something obvious – but anway: I had to make sure that my host certificate and private key had the same filename, otherwise I got error about loading private key. My bad habit of naming files my.vpn.server-cert.pem and my.vpn.server-key.pem and my lack of attention to tiny line saying it couldn’t load the private key took me few hours to figure out why I was getting IKE error about authentication failed.

Thanks again for really useful article. I currently have a stable setup with Strongswan 5.x installed on a Raspbian image on an RPi. I use IKEv1 + Xauth RSA for all my iDevices + Mac and IKEv2 on a Windows 10 machine. I read recently that iOS devices and OS X now also support IKEv2 via GUI and was considering moving to IKEv2 based on the fact that IKEv2 should be more secure and faster than IKEv1. My question is: as it seems that authentication in iOS and OS X only allows user+password (EAP-MSCHAPv2) or certificate (RSA), when now I have user+password+certificate, how can this still be more secure?

Does it make sense to go through the hassle of reconfiguring Strongswan and the devices, just to move from IKEv1 to IKEv2, solely based on the above mentioned advantages? Thanks in advance for any insights. Thanks for the article and some tips for others.

I see both the author and some other commenters mention iOS clients needing to do both Cert (RSA) based authentication along with Xauth for username/password. This is true as standard but not necessarily compulsory. I have previously setup StrongSwan5 as an IKEv1 server for iOS devices and hit an issue with username/password in a VPN on Demand scenario. With a VPN on Demand setup you need to use device certificates for authentication and to also push the settings as a mobileconfig file – typically via a Mobile Device Management system.

If you do then as standard such MDM systems only allow including the user name and not a password. This means that each time the iOS device is asked to connect on demand it will keep asking for the password and will not save it. It is undocumented but potentially possible to hand edit a mobileconfig file and add an entry for the users password but this means doing this for each user each time they change their password. Furthermore mobileconfig files might be stored as plain text on the MDM server i.e. An xml file including the users password! I resolved this by using the xauth-noauth option in my ipsec.conf file instead. As a result StrongSwan5 does not challenge the client device i.e.

Openswan users cannot install eroute occurs for macbook pro

The iOS device for a user name and password and just uses the certificates for authentication. As may already be clear from above, in order to do VPN on Demand as asked by another commenter you would need to use a MDM solution to push the client certificate, VPN settings, and VPN on Demand settings all in a mobileconfig file. This can be done using either IKEv1 (aka.

Cisco IPSec), IKEv2, Cisco Anyconnect or various SSL VPN clients. It cannot be done using L2TP or PPTP. I plan to follow this article to ‘upgrade’ my StrongSwan5 IKEv1 setup to IKEv2. Hello Alexander!

I’ve installed strongswan 5.4.0 and tryind to connect from Android Strongswan client. I used Your configuration guide.

I got: Apr 4 12:10:40 test170 charon: 09NET received packet: from xxx.xxx.xxx.xxx44630 to zz.zz.zz.zz500 (1012 bytes) Apr 4 12:10:40 test170 charon: 09ENC parsed IKESAINIT request 0 SA KE No N(NATDSIP) N(NATDDIP) N(FRAGSUP) N(HASHALG) Apr 4 12:10:40 test170 charon: 09IKE no IKE config found for zz.zz.zz.zz xxx.xxx.xxx.xxx, sending NOPROPOSALCHOSEN Apr 4 12:10:40 test170 charon: 09ENC generating IKESAINIT response 0 N(NOPROP) Is it look like IKEv1 is being used? Seems like a very dumb problem: I’ve followed your description and I can connect to the PI from my mobile phone, but I cannot access internal IPs or host names – what might be wrong?

This particular setup is kind of a like a gateway for roadwarriors. All traffic is routed through the server and back: `leftsubnet = 0.0.0.0/0`. If you want to access a local IP (something like 10.0.0.2 or 10.0.1.118) I presume it is also send to this gateway, hence you are unable to access it.

In this configuration virtual IP’s are used: `rightsourceip=172.16.16.0/24`. You can edit your configuration by removing this rule and adding `rightsubnet=10.0.0.0/24` or something similar that is in line with your subnet on the client. Have a look at There are a lot of configurations. I’m not sure which one the author uses. Something along the lines ikev2 virtual ip nat?

Anyway, definitely one of the better tutorials on the web. Really useful part on how to create keys and certificates! Although this article is old it helped considerably to simplify the step by step required to install strongSwan. I ran into a couple of snags: 1) hangs while generating certs – solved by installing “haveged” to provide better random number entropy 2) tutorial needs more info – for example what IP should be used on line 19 of /etc/ipsec.conf file, or do the names on lines 9 & 10 of /etc/ipsec.secrets (i.e.

User1 and user2) need to correspond to the file names for the client “pem” files? 3) how can you be sure your vpn server is running o listening? On the last point I don’t see any processes with “ipsec” or “wan” (for strongSwan) in their name, nor can I see listeners on the standard ports for ipsec vpn. I was unable to connect with my Mac (OS Sierra) with either IKEv2 or Cisco IKEv1, although the OS was able to read the client.p12 file OK and showed the correct info for my CA Root Authority. I can reply to some of these ‘snags’: 1) I didn’t encounter any hangs. You might have a different Linux distributions that doesn’t use `ipsec` as command, but `strongswan`. 2) On line 19: The author assigns virtual IP’s to clients.

This makes this whole configuration more flexible, and saves a long explanation on how to make it work for your subnet.pem files and Xauth keys are unrelated. The author specifies different kind of connections, RSA public keys, PSK with Xauth. You can use the one you like for your client. 3) You can use ipsec statusall to check all current connections and loaded plugins. You can use something like ‘netstat -pnaut’ to check if strongswan is listening on UDP:500/4500.