[strongSwan] IKEv1 connection problems: strongswan <> cisco-asa

J. Miller z3usy at hotmail.com
Wed Sep 22 20:04:15 CEST 2010


I’m having an issue with getting strongswan to complete its phase2
authorization with our Cisco ASA… I’ve tried about 20 different combinations
of the IKE/ESP encryption types with no luck, and the same issue occurs
during the MAIN_I2 stage.



If anyone can offer any assistance or guidance it would be greatly
appreciated!



========PLUTO ERROR LOG========



| inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #3

| next event EVENT_RETRANSMIT in 40 seconds for #3

|

| *received 68 bytes from xxx.xxx.xxx.xxx:500 on eth0

|   a4 39 4a 95  51 b7 93 b0  16 06 2a 8d  e7 0e c9 79

|   0b 10 05 00  00 00 00 00  00 00 00 44  00 00 00 28

|   00 00 00 01  00 00 00 04  b0 12 3d 04  98 12 22 05

|   01 00 00 00  03 00 00 00  04 00 00 00  84 81 07 01

|   ec 62 aa 0c

| **parse ISAKMP Message:

|    initiator cookie:

|   a4 39 4a 95  51 b7 93 b0

|    responder cookie:

|   16 06 2a 8d  e7 0e c9 79

|    next payload type: ISAKMP_NEXT_N

|    ISAKMP version: ISAKMP Version 1.0

|    exchange type: ISAKMP_XCHG_INFO

|    flags: none

|    message ID:  00 00 00 00

|    length: 68

| ICOOKIE:  a4 39 4a 95  51 b7 93 b0

| RCOOKIE:  16 06 2a 8d  e7 0e c9 79

| peer:  48 03 f2 47

| state hash entry 1

| state object #3 found, in STATE_MAIN_I2

"cisco-asa" #3: Informational Exchange message must be encrypted

| next event EVENT_RETRANSMIT in 40 seconds for #3

|

| *time to handle event

| event after this is EVENT_REINIT_SECRET in 3390 seconds

| handling event EVENT_RETRANSMIT for xxx.xxx.xxx.xxx "cisco-asa" #3

"cisco-asa" #3: max number of retransmissions (2) reached STATE_MAIN_I2



========IPSEC.CONF========



config setup

        plutodebug=all

        # crlcheckinterval=600

        # strictcrlpolicy=yes

        # cachecrls=yes

        nat_traversal=yes

        charonstart=no

        # plutostart=no

        plutostderrlog=/var/log/pluto.log



conn cisco-asa

        type=tunnel

        left=%defaultroute

        leftid=@GROUPID

        right=xxx.xxx.xxx.xxx

        rightsourceip=%dhcp

        rightnexthop=%defaultroute

        rightsubnet=0.0.0.0/0

        xauth=client

        authby=xauthpsk

        ike=3des

        esp=3des-sha

        pfs=no

        auto=start



========IPSEC.SECRETS========



: PSK "groupid-secret"

xxx.xxx.xxx.xxx username : XAUTH "password"



========CISCO ASA CONFIG========



crypto ipsec transform-set connset esp-3des esp-sha-hmac

crypto dynamic-map conn 90 set transform-set connset

crypto map connmap 8 match address 104

crypto map connmap 8 set peer xxx.xxx.xxx.xxx

crypto map connmap 8 set transform-set connset

crypto map connmap 10000 ipsec-isakmp dynamic conn

crypto map connmap interface outside

crypto isakmp identity address

crypto isakmp enable outside

crypto isakmp policy 10

 authentication pre-share

 encryption 3des

 hash sha

 group 2

 lifetime 86400

crypto isakmp nat-traversal  20
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20100922/5badae61/attachment.html>


More information about the Users mailing list