[strongSwan] strongswan with mikrotik
Andreas Steffen
andreas.steffen at strongswan.org
Tue Jul 27 11:49:18 CEST 2010
And if you set
ike=3des-sha1-modp1024
esp=3des-md5
Regards
Andreas
On 27.07.2010 10:34, zux wrote:
> Hello,
> I'm new to strongswan and ipsec and I'm having problems with configuring
> strongswan to work with mikrotik router, the strange thing is that
> mikrotik is able to initiate the connection and everything works then,
> but strongswan can not initiate the connection. The problem is, that if
> the strongswan box is rebooted, the connection is not reestablished
> until I reset it from the mikrotik side. The configuration on the
> mikrotik is the same as other, that work well between other mikrotik
> boxes. Besides, I have changed the lifetime on mikrotik from 1 day to
> one hour, and then if i reboot strongswan, the connection is established
> after that hour. (or less, if the connection was up for some time)
> I'm sorry if this problem has nothing to do with strongswan, but maybe
> someone can give some useful tips.
>
> The error on Mikrotik, when strongswan tries to connect is this:
>
> Recieved ISAKMP packet from <strongswan IP>, phase 1, Identity Protection
> responding phase 1, starting mode Identity Protection (local <mikrotik
> IP>:500)(remote <strongswan IP>)
> no acceptable proposal found (remote unknown)
> failed to process packet
>
> This is the mikrotik configuration:
>
> Ipsec Policy:
> Src. Address: 192.168.1.0/24
> Dst. Address: 192.168.156.0/24
> Action: encrypt
> Level: require
> IPsec Protocols: esp
> Tunnel = yes
> SA Src. Address: <mikrotik IP>
> SA Dst. Address: <strongswan IP>
> Proposal: pleskava
> Manual SA: None
>
> IPsec Peer:
> Address: <strongswan IP>
> Port: 500
> Secret: <password>
> Exchange Mode: main
> Send initial Contact = yes
> Proposal Check: obey
> Hash Algoritm: sha
> Encrypt Algorithm: 3des
> DH Group: modp1024
> Generate policy = yes
> Lifetime: 1d 00:00:00
>
> Ipsec Proposal:
> Name: pleskava
> Auth. Algorithms: md5
> Encr. Algorithms: 3des
> Lifetime: 01:00:00
> PFS Goup: none
>
>
> and this ir strongswan configuration:
> root at kristaps:~# cat /etc/ipsec.conf
> # ipsec.conf - strongSwan IPsec configuration file
>
> # basic configuration
>
> config setup
> interfaces="ipsec0=eth0"
> klipsdebug=none
> plutodebug=all
> uniqueids=yes
>
> conn %default
> keyingtries=0
> authby=rsasig
>
> conn riga
> left=<stronswan IP>
> leftsubnet=192.168.156.0/24
> right=<mikrotik IP>
> rightsubnet=192.168.1.0/24
> keyexchange=ike
> authby=secret
> auth=esp
> ike=3des-md5-modp1024
> esp=3des-md5-modp1024
> pfs=no
> type=tunnel
> auto=start
>
>
> root at kristaps:~# cat /etc/ipsec.secrets
> <strongswan IP> <mikrotik IP> : PSK "password"
>
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
--
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
More information about the Users
mailing list