[strongSwan] no matching peer config found

Volodymyr Litovka doka.ua at gmx.com
Fri Oct 2 23:06:52 CEST 2020


Hi Tom,

I'm using similar configuration, but without keyingtries. Give it a
chance without this parameter.

And try to set local_addr = 10.17.0.3 in connections.VPN01 due to the
following:

> 10[CFG] looking for peer configs matching
> 10.17.0.3[%any]...81.xxx.yyy.zzz[81.xxx.yyy.zzz]
> 10[CFG] no matching peer config found

May be this'll help.

On 02.10.2020 19:18, Tom Cannaerts wrote:
> I'm trying to setup a connection between a StrongSwan behind NAT and a
> directly connected Fortigate but I just can't get the connection up.
>
> This is the relevant config:
>
> # 10.17.0.3 is the private IP of StrongSwan
> # 83.aaa.bbb.ccc is the public IP of StrongSwan where port 500 and
> 4500 are NAT'd to the private
> # 81.xxx.yyy.zzz is the public IP of the Fortigate
> # 10.16.0.0/24 <http://10.16.0.0/24> is the subnet at the StrongSwan
> side that I'm trying to tunnel
> # 10.40.0.0/24 <http://10.40.0.0/24> is the subnet at the Fortigate
> sida that I'm trying to tunnel
>
> connections {
>         VPN01 {
>                 version=2
>                 proposals = aes256-sha256-modp2048
>                 keyingtries = 0
>                 remote_addrs = 81.xxx.yyy.zzz
>                 local {
>                     id = 83.aaa.bbb.ccc
>                     auth = psk
>                 }
>                 remote {
>                     id = 81.xxx.yyy.zzz
>                     auth = psk
>                 }
>                 children {
>                         VPN01-MAIN {
>                             start_action = start
>                             esp_proposals = aes256-sha256-modp2048
>                             local_ts = 10.16.0.0/24 <http://10.16.0.0/24>
>                             remote_ts = 10.40.0.0/24 <http://10.40.0.0/24>
>                         }
>                 }
>         }
> }
>
> secrets {
>     ike1 {
> id = 81.xxx.yyy.zzz
> secret = secret-goes-here
>     }
> }
>
> When loading this config, following entries appear in the log:
>
> 07[NET] received packet: from 81.xxx.yyy.zzz[500] to 10.17.0.3[500]
> (360 bytes)
> 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No ]
> 07[IKE] 81.xxx.yyy.zzz is initiating an IKE_SA
> 07[CFG] selected proposal:
> IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
> 07[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(CHDLESS_SUP)
> N(MULT_AUTH) ]
> 07[NET] sending packet: from 10.17.0.3[500] to 81.xxx.yyy.zzz[500]
> (392 bytes)
> 10[NET] received packet: from 81.xxx.yyy.zzz[500] to 10.17.0.3[500]
> (240 bytes)
> 10[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) AUTH SA TSi TSr ]
> 10[CFG] looking for peer configs matching
> 10.17.0.3[%any]...81.xxx.yyy.zzz[81.xxx.yyy.zzz]
> 10[CFG] no matching peer config found
> 10[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
>
> I believe the N(AUTH_FAILED) is because he can't match the config, not
> because of an actual PSK error. I've re-entered the PSK multiple times
> and even tried using a very simple PSK.
>
> So for some reason it can't find a peer config for 81.xxx.yyy.zzz. Is
> that because it's using the internal IP address for the matching? The
> strange thing is that I have another tunnel/connection setup with a
> WatchGuard in another office in pretty much the exactly the same way,
> and that's working just fine.
>
> Anyone an idea on what I can still check?
>
> Thanks!

--
Volodymyr Litovka
   "Vision without Execution is Hallucination." -- Thomas Edison

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20201003/e26d854e/attachment.html>


More information about the Users mailing list