> 
> Here is the log in the source computer :

First thing to do is make sure your packets are getting through to the
destination computer. What do the logs there show? If you run tcpdump on
the destination computer, can you see the packets coming from the source
computer?

Before diving into the internals of IPSEC tunnels, you need to rule out more 
obvious
things like firewalls and general network reachability.

--Greg




-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines

Reply via email to