hi,
I cannot make a connection from a ASC to a ASL 6.
Under ASL 5 there were no problems.
Ipsec.log
005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: responding to Main Mode from unknown peer 192.168.1.68
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: policy does not allow OAKLEY_RSA_SIG authentication. Attribute OAKLEY_AUTHENTICATION_METHOD
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: no acceptable Oakley Transform
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: sending notification NO_PROPOSAL_CHOSEN to 192.168.1.68:500
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68 #725: failed to build notification for spisize=0
2005:05:23-14:00:37 (none) pluto[31777]: "S_NCP-TEST_0"[22] 192.168.1.68: deleting connection "S_NCP-TEST_0" instance with peer 192.168.1.68 {isakmp=#0/ipsec=#0}
2005:05:23-14:00:42 (none) pluto[31777]: packet from 192.168.1.68:500: received Vendor ID payload [XAUTH]
2005:05:23-14:00:42 (none) pluto[31777]: packet from 192.168.1.68:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
2005:05:23-14:00:42 (none) pluto[31777]: packet from 192.168.1.68:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 108
2005:05:23-14:00:42 (none) pluto[31777]: packet from 192.168.1.68:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2005:05:23-14:00:42 (none) pluto[31777]: packet from 192.168.1.68:500: received Vendor ID payload [Dead Peer Detection]
2005:05:23-14:00:42 (none) pluto[31777]: packet from 192.168.1.68:500: ignoring unknown Vendor ID payload [101fb0b35c5a4f4c08b919f1ce0d3e4a]
2005:05:23-14:00:42 (none) pluto[31777]: packet from 192.168.1.68:500: received Vendor ID payload [Cisco-Unity]
Stefan