<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect  Linux and Strongswan in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/314714#M81144</link>
    <description>&lt;P&gt;Hi Davyboy, I also want to share ipsec.conf file that works for me with Ubuntu 19.04, strongswan-starter 5.7.1 and PanOS&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JorgeLuisLV_2-1583423360910.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24254iC20A75802787CA55/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JorgeLuisLV_2-1583423360910.png" alt="JorgeLuisLV_2-1583423360910.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Main problem that I had was the "ike=" line.&lt;/P&gt;&lt;P&gt;Greetings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Mar 2020 15:56:51 GMT</pubDate>
    <dc:creator>JorgeLuisLV</dc:creator>
    <dc:date>2020-03-05T15:56:51Z</dc:date>
    <item>
      <title>Global Protect  Linux and Strongswan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/117225#M45558</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I had to test IPSec connection on Linux using strongswan as part of a support case i was working on and i collected a lot of good information on how to get this working. So i thought i would share it with you.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tested on PANOS 7.1.2, Ubuntu 16.04, Strongswan 5.3.5-1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Install Ubuntu Desktop or CentOS into VMWare environment and then install Strongswan application.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Strongswan can be downloaded from &lt;/SPAN&gt;&lt;FONT color="#000000"&gt;&lt;A href="https://www.strongswan.org" target="_blank"&gt;&lt;SPAN&gt;https://www.&lt;/SPAN&gt;&lt;SPAN&gt;strongswan&lt;/SPAN&gt;&lt;SPAN&gt;.org&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; or as a package from &lt;/SPAN&gt;&lt;A href="https://launchpad.net/ubuntu/+source/strongswan" target="_blank"&gt;&lt;SPAN&gt;https://launchpad.net/&lt;/SPAN&gt;&lt;SPAN&gt;ubuntu&lt;/SPAN&gt;&lt;SPAN&gt;/+source/&lt;/SPAN&gt;&lt;SPAN&gt;strongswan&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN&gt;used in this Lab&lt;/SPAN&gt; &lt;A href="https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3" target="_blank"&gt;&lt;SPAN&gt;https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Note: If your using the ipsec.secrets file for Xauth you need to make sure "xauth-generic" PLUGIN is installed&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;A href="https://launchpad.net/ubuntu/xenial/amd64/strongswan-plugin-xauth-generic/5.3.5-1ubuntu3" target="_blank"&gt;https://launchpad.net/ubuntu/xenial/amd64/strongswan-plugin-xauth-generic/5.3.5-1ubuntu3&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;If you do not already have a Global Protect gateway configuration, configure it the usual way but enable X-Auth Support and provide a group name and password. I don't want to go into too much detail regarding the other aspects of GP configuration as many guides exist regarding the basics, but i created the gateway (no portal needed for Linux clients) a local user, an auth profile for local database, An IPSec Crypto with all available Encryption options.&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Xauth Option.png" style="width: 798px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5769iEB2A038E7C861D6D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Xauth Option.png" alt="Xauth Option.png" /&gt;&lt;/span&gt;﻿&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;For testing create a local user on the PAN, and set an auth profile for Local database.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;Linux configuration:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After installing strongswan you should see the conf file in the /etc/ folder.&lt;/P&gt;&lt;P&gt;Edit ipsec.conf and ipsec.secrets using you favorite linux editor and save changes.&lt;/P&gt;&lt;P&gt;Make sure it formatted the same as below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;ipsec.conf&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;conn %default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ikelifetime=20m&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reauth=yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rekey=yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; keylife=10m&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rekeymargin=3m&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rekeyfuzz=0%&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; keyingtries=1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type=tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;conn paloalto # This can be called anything for this example its paloalto.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; keyexchange=ikev1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ikelifetime=1440m&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; keylife=60m&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aggressive=yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ike=aes-sha1-modp1024,aes256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; esp=aes-sha1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; xauth=client&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; left=x.x.x.x &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # Linux Client IP or you can use %defaultroute which will pick up the IP Dynamically)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; leftid=@#4c696e7578&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #text to Hex 'Linux' Group name. Linux = 4c696e7578&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; leftsourceip=%modeconfig&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; leftauth=psk&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rightauth=psk&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; leftauth2=xauth&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; right=x.x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Remote Auth Server [The Gateway IP]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rightsubnet=0.0.0.0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Access Route - Should match Access Route in Gateway Configuration&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; xauth_identity=Linux&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Username - Local/LDAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; auto=add&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;ipsec.secrets&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# This file holds shared secrets or RSA private keys for authentication.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# RSA private key for this host, authenticating it to any other host&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# which knows the public part.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;: PSK **** &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # **** = Group Name Password&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Username : XAUTH "password"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # Username name = local user on PAN or LDAP and "password" = password user of user.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once completed remember to save the changes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Useful Strongswan Commands:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sudo ipsec start&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #start service&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sudo ipsec stop &amp;nbsp; &amp;nbsp;&amp;nbsp; #stop service, use when editing the conf files prior to restarting&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sudo ipsec statusall&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # status of installed plugin, readiness of ipsec basic config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sudo nano ipsec.conf / ipsec.secrets&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # ctrl x to save&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Errors:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[ HASH N(AUTH FAILED) ] This is the PSK entry in ipsec.secrets PSK is incorrect or entry not formatted correctly&lt;/P&gt;&lt;P&gt;no XAuth method found - This reports that no XAuth addon is installed such as auth-generic, xauth-pam etc..&lt;/P&gt;&lt;P&gt;no XAuth password found for 'Username' - Incorrect entry or password for XAuth entries in ipsec.secrets, Make sure there is a space between ': XAUTH' or Group name spelt wrong.&lt;/P&gt;&lt;P&gt;XAuth authentication of 'Username' (Myself) failed - This is the user password in the ipsec.secrets XAuth line.&lt;/P&gt;&lt;P&gt;No XAuth password found for 'Username' - username entry for auth_identity entry in ipsec.conf incorrect&lt;/P&gt;&lt;P&gt;No connection? Remote auth Server IP is incorrect i.e. PAN IP of the gateway in ipsec.conf 'right=' Or Client IP incorrect in the ipsec.conf 'left=' Or gateway not configured / not allow connection or some other general connectivity issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example of Successful connection in Linux terminal:&lt;/P&gt;&lt;P&gt;In my example the username and group name is "Linux" Just to confuse myself &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Notice the port&amp;nbsp; is 500 which means that NAT-T is not used (NAT-T uses port 4500) NAT-T in Strongswan (this version) is automatic. I'm also testing it locally from Linux VM to PAN internally, hense why no public IP seen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;img /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ipsec.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5771i14EDDA6573B79AA8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ipsec.png" alt="ipsec.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;Successful Authentication in runtime information for gateway&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Client Success.png" style="width: 799px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5772i1E48D473B42C735F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Client Success.png" alt="Client Success.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo Alto System Log Successful Authentication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="system Logs.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5773i7B1F9CED9C0AC909/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="system Logs.PNG" alt="system Logs.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2016 10:14:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/117225#M45558</guid>
      <dc:creator>Davyboy</dc:creator>
      <dc:date>2016-10-11T10:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect  Linux and Strongswan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/117249#M45560</link>
      <description>&lt;P&gt;Check following doc:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Connect-Linux-Machine-to-Global-Protect/ta-p/77307" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Connect-Linux-Machine-to-Global-Protect/ta-p/77307&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It have been tested on ubuntu 14.04 try on ubuntu 14.0.4 it should work.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Oct 2016 16:25:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/117249#M45560</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-10-03T16:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect  Linux and Strongswan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/314714#M81144</link>
      <description>&lt;P&gt;Hi Davyboy, I also want to share ipsec.conf file that works for me with Ubuntu 19.04, strongswan-starter 5.7.1 and PanOS&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JorgeLuisLV_2-1583423360910.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24254iC20A75802787CA55/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JorgeLuisLV_2-1583423360910.png" alt="JorgeLuisLV_2-1583423360910.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Main problem that I had was the "ike=" line.&lt;/P&gt;&lt;P&gt;Greetings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 15:56:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/314714#M81144</guid>
      <dc:creator>JorgeLuisLV</dc:creator>
      <dc:date>2020-03-05T15:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect  Linux and Strongswan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/526083#M108752</link>
      <description>&lt;P&gt;Hello DavyBoy,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Great info. Could you please let me know if we can do the same with ikev2 using certificates?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2023 03:14:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/526083#M108752</guid>
      <dc:creator>Balram-Vakil</dc:creator>
      <dc:date>2023-01-06T03:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect  Linux and Strongswan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/548548#M111998</link>
      <description>&lt;P&gt;Hi I do not have privileges to access it, can you help me here&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 11:41:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-linux-and-strongswan/m-p/548548#M111998</guid>
      <dc:creator>kak</dc:creator>
      <dc:date>2023-07-07T11:41:07Z</dc:date>
    </item>
  </channel>
</rss>

