Hi guys,
I am trying to configure a Windows IPsec \ L2TP (Pre-shared Key) client connection for ClusterXL and for standalone gateways. Authentication through AD. I made all the settings by the SK140832. All vpn setting on ClusterXL and on others gateways are the same.
The older client support must be enabled for AD-auth support
![AD-support.JPG AD-support.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/6240i4E6010D9BF96F966/image-size/medium?v=v2&px=400)
Other settings
![Global-Settings.JPG Global-Settings.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/6241iA46548F8764308C3/image-size/medium?v=v2&px=400)
![vpn-blade-settings.JPG vpn-blade-settings.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/6242iDD06B412ED4ED9AF/image-size/medium?v=v2&px=400)
But the connection only works for standalone gateways. For ClusterXL, I see an error in the logs: “This IKE SA should be used only for L2TP. Probably a computer certificate. "
For ClusterXL:
![failed_login.JPG failed_login.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/6239iBD79CF8BB53EA5E4/image-dimensions/655x370?v=v2)
For others standalone gateways - the connection is perfect
![Login.JPG Login.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/6243i2044587DDE8834FA/image-size/large?v=v2&px=999)
Does anyone have an idea - why?