This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
I love the strong cryptographic verification and the built-in vendor versions that make it great for ease-of-use. I create the user, tell the end user what their authentication tokens are, and boom, they are in and using it. The vendor implementations in Windows make it extremely simple. Review collected by and hosted on G2.com.
Server-side setup, especially on linux with the various strongswan/libreswan setup, is maddening! It's unrealistically difficult to setup! As a linux server, first you have to find the right distribution-specific *swan to use, then you have to cnofigure it to be a bridge or point-to-point, and then try it. And don't get me started on the logfiles. Logging is absolutely useless. All of the *swan variants have completely useless data in the logfiles. Unless you have already made a point of reading the entire source code from start to finish and commiting it to memory prior to looking at the logs, and fully understanding every line of it, the logs are complete junk. Review collected by and hosted on G2.com.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.


