<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
.MsoChpDefault
{mso-style-type:export-only;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style></head><body lang=EN-US link=blue vlink="#954F72"><div class=WordSection1><p class=MsoNormal>Can someone look at my debugs and config and tell me why Strongswan is sending a no proposal chosen notify message based on the configs for my strongswan and asa below? I tried changing the leftid and rightid to the private outside address of ASA, natted address, not sure what Strongswan doesn’t like, everything looks like it matches..</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Configuring Strongswan with an ASA, ASA is behind firewall, NATing occurs upstream , 500, 4500 are portforwarded back to ASA</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Strongawan syslog output:</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Dec 30 02:46:29 lagunesrevengeII charon: 07[ENC] generating INFORMATIONAL_V1 request 469970900 [ N(NO_PROP) ]</p><p class=MsoNormal>Dec 30 02:46:29 lagunesrevengeII charon: 07[NET] sending packet: from 104.x.x.x[500] to 98.x.x.x[500] (40 bytes)</p><p class=MsoNormal>Dec 30 02:46:37 lagunesrevengeII charon: 08[NET] received packet: from 98.x.x.x[500] to 104.x.x.x[500] (112 bytes)</p><p class=MsoNormal>Dec 30 02:46:37 lagunesrevengeII charon: 08[ENC] parsed ID_PROT request 0 [ SA V ]</p><p class=MsoNormal>Dec 30 02:46:37 lagunesrevengeII charon: 08[IKE] no IKE config found for 104.x.x.x...98.x.x.x, sending NO_PROPOSAL_CHOSEN</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>ASA debug output</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>ec 30 01:38:24 [IKEv1]IP = 104.x.x.x., IKE_DECODE RECEIVED Message (msgid=954138f9) with payloads : HDR + NOTIFY (1</p><p class=MsoNormal>1) + NONE (0) total length : 40</p><p class=MsoNormal>Dec 30 01:38:24 [IKEv1]IP = 104.x.x.x, IKE_DECODE RECEIVED Message (msgid=954138f9) with payloads : HDR + NOTIFY (1</p><p class=MsoNormal>1) + NONE (0) total length : 40</p><p class=MsoNormal>Dec 30 01:38:24 [IKEv1]IP = 104.x.x.x, Received an un-encrypted NO_PROPOSAL_CHOSEN notify message, dropping</p><p class=MsoNormal>Dec 30 01:38:24 [IKEv1]IP = 104.x.x.x, Information Exchange processing failed</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>IPsec.conf</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal># ipsec.conf - strongSwan IPsec configuration file</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal># basic configuration</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>config setup</p><p class=MsoNormal> # strictcrlpolicy=yes</p><p class=MsoNormal> # uniqueids = no</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal># Add connections here.</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal># Sample VPN connections</p><p class=MsoNormal>conn %default</p><p class=MsoNormal> ikelifetime=1440m</p><p class=MsoNormal> keylife=60m</p><p class=MsoNormal> rekeymargin=3m</p><p class=MsoNormal> keyingtries=1</p><p class=MsoNormal> keyexchange=ikev1</p><p class=MsoNormal> authby=secret</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>conn toflakjacket</p><p class=MsoNormal> left=104.x.x.x</p><p class=MsoNormal> leftsubnet=10.0.0.0/24</p><p class=MsoNormal> leftfirewall=yes</p><p class=MsoNormal> right=98.x.x.x</p><p class=MsoNormal> rightsubnet=192.168.7.0/24</p><p class=MsoNormal> auto=route</p><p class=MsoNormal> ike=aes128-sha1-modp1536</p><p class=MsoNormal> esp=aes128-sha1</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>IPsec.secrets</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>104.x.x.x 98.x.x.x : PSK mypassword</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>ASA config</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>interface Vlan1</p><p class=MsoNormal> nameif inside</p><p class=MsoNormal> security-level 100</p><p class=MsoNormal> ip address 192.168.7.1 255.255.255.0</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>interface Vlan2</p><p class=MsoNormal> nameif outside</p><p class=MsoNormal> security-level 0</p><p class=MsoNormal> ip address 192.168.1.250 255.255.255.0</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>object-group network localinteresting</p><p class=MsoNormal> network-object 192.168.7.0 255.255.255.0</p><p class=MsoNormal>object-group network remoteinteresting</p><p class=MsoNormal> network-object 10.0.0.0 255.255.255.0</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>access-list interestingtraffic extended permit ip object-group localinteresting object-group remoteinteresting</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>crypto ipsec ikev1 transform-set myVPN esp-aes esp-sha-hmac</p><p class=MsoNormal>crypto ipsec security-association lifetime seconds 3600</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>crypto map revengemap 1 match address interestingtraffic</p><p class=MsoNormal>crypto map revengemap 1 set peer 104.x.x.x</p><p class=MsoNormal>crypto map revengemap 1 set ikev1 transform-set myVPN</p><p class=MsoNormal>crypto map revengemap interface outside</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>crypto ikev1 enable outside</p><p class=MsoNormal>crypto ikev1 policy 1</p><p class=MsoNormal> authentication pre-share</p><p class=MsoNormal> encryption aes</p><p class=MsoNormal> hash sha</p><p class=MsoNormal> group 5</p><p class=MsoNormal> lifetime 86400</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>tunnel-group 104.x.x.x type ipsec-l2l</p><p class=MsoNormal>tunnel-group 104.x.x.x ipsec-attributes</p><p class=MsoNormal> ikev1 pre-shared-key mypassword</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Sent from <a href="https://go.microsoft.com/fwlink/?LinkId=550986">Mail</a> for Windows 10</p><p class=MsoNormal><o:p> </o:p></p></div></body></html>