Hello guys!
The problem:
I stack with a problem during Site-to-Site IPSec VPN setup between Ataro 8 and Centos 5.5 box.
My problem is that I always failing signature check on the Astaro (ASG8) side and receive "INVALID_KEY_INFORMATION" and so cannot pass "STATE_MAIN_I3" phase.
What do I know:
I do know how to setup easily IPSec S2S VPN between two Centos 5.5 boxes or between two ASG 8 boxes but I have no idea how should I setup RSA certificates between Centos 5.5 and ASG8.
What do I have:
Assume that on the "left" side I have a Centos 5.5 with Openswan 2.6.21 using NSS database that should use only RSA authentication mechanism sitting on the 10.170.2.150 IP with subnet mask 255.255.255.0
On the "right" side there is an Astaro ASG8 that should communicate with a Centos from the right side using Site-to-Site IPSec VPN sitting on 10.170.2.100 IP with the same subnet mask.
What have I done
I've already tried to create certificates on the Centos machine and import them into ASG and reverse, I've tried to use ASG's CA cert to sign certificates on the Centos box and reverse, I've tried to handwrite RSA sigs on both machines and still no luck, still authentication fails. But I'm thinking I just got lost and messed both machines.
What do I need:
Please guide me (at least in theory) how to setup RSA certificates in my case.
This thread was automatically locked due to age.