> > Here is the log in the source computer : First thing to do is make sure your packets are getting through to the destination computer. What do the logs there show? If you run tcpdump on the destination computer, can you see the packets coming from the source computer? Before diving into the internals of IPSEC tunnels, you need to rule out more obvious things like firewalls and general network reachability. --Greg -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines