Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # strongswan.conf - strongSwan configuration file
- charon {
- threads = 16
- plugins {
- sql {
- # loglevel to log into sql database
- loglevel = -1
- }
- }
- syslog {
- daemon {
- default = 1
- cfg = 4
- lib = 4
- }
- }
- }
- libstrongswan {
- plugins {
- pkcs11 {
- modules {
- use_hasher = no
- pkcs11-test {
- path = /usr/local/lib/opensc-pkcs11.so
- }
- }
- }
- }
- }
- ##########################################
- # ipsec.conf - strongSwan IPsec configuration file
- config setup
- uniqueids = no
- conn cap
- keyexchange=ikev2 # this is the only think I changed between ikev1 and ikev2 scenarios
- left=%defaultroute
- leftcert=%smartcard1:19e69b3cf025053d08b52ffc80a3e8239423393e
- leftid="XXXXXXX"
- leftsendcert=ifasked
- right=192.168.2.141
- rightid="YYYYYYYY"
- auto=add
- ############################################
- # /etc/ipsec.secrets - strongSwan IPsec secrets file
- : PIN %smartcard1:19e69b3cf025053d08b52ffc80a3e8239423393e %prompt
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement