[strongSwan] IKEv2 StrongSwan to Cisco IOS 15.1 interop quirks: some 'attributes failed'

Richard Chan rspchan at starhub.net.sg
Wed Oct 12 03:08:11 CEST 2011


Hi,

Much to my pleasant surprise I was able to set up a RW connection to a Cisco
IOS 15.1
headend using IKEv2. Kudos so the StrongSwan team!


The StrongSwan RW successfully connects with split tunneling (two subnets
behind IOS). It obtains
a /32 address, and installs the xfrm correctly. Everything works as
expected. There are however
some messages about attribute failed. Just wondering what these 'failed'
messages mean.


(StrongSwan is behind a NAT device)
certificate status is not available
  reached self-signed root ca with a path length of 0
authentication of 'XXXX' with RSA signature successful
IKE_SA roadw2[1] established between 192.168.2.139[XXXX]...1.2.3.4[YYYY]
scheduling reauthentication in 10105s
maximum IKE_SA lifetime 10645s
handling INTERNAL_IP4_NETMASK attribute failed
handling INTERNAL_IP4_SUBNET attribute failed
handling INTERNAL_IP4_SUBNET attribute failed
installing new virtual IP 192.168.87.35


conn roadw2
    left=%defaultroute
    leftsourceip=%config
    leftcert=mycert.crt
    right=1.2.3.4
    rightsubnet=192.168.10.0/24,192.168.11.0/24
    rightid="CN=IOS15"
    rightca="CN=IOS-CA"
    ike=aes256-sha1-modp1536
    esp=aes256-sha1
    auto=add
    authby=pubkey
    keyexchange=ikev2

While this is not an IOS list, I noticed that IOS installs an
"all IP traffic to 192.168.87.35/32" selector, instead of narrowing its
selectors to match StrongSwan's rightsubnets. So just incase there are some
inter-op experts here

  protected vrf: (none)
   local  ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
   remote ident (addr/mask/prot/port): (192.168.87.35/255.255.255.255/0/0)
   current_peer 1.2.3.4 port 4500
     PERMIT, flags={}
    #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0
    #pkts not decompressed: 0, #pkts decompress failed: 0
    #send errors 0, #recv errors 0

     local crypto endpt.: 1.2.3.5, remote crypto endpt.: 1.2.3.4
     path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/2
     current outbound spi: 0xCAF25434(3404878900)
     PFS (Y/N): N, DH group: none

(I am by no means an IOS 15.1 expert and it took some time to figure this
out).
This split tunnel networks are specified by an acl.


Extended IP access list acl.ROADW
    10 permit ip 192.168.10.0 0.255.255.255 any
    20 permit ip 192.168.11.0 0.0.0.255 any


crypto ikev2 name-mangler MANGLER
 dn organization-unit
crypto ikev2 authorization policy ROADW
 pool pool.ROADW
 netmask 255.255.255.0
 subnet-acl 199
crypto ikev2 proposal AES256
 encryption aes-cbc-256
 integrity sha1
 group 5
crypto ikev2 policy ROADW
 proposal AES256
crypto ikev2 profile ROADW
 match certificate CERTMAP
 identity local dn
 authentication local rsa-sig
 authentication remote rsa-sig
 pki trustpoint MYCA
 aaa authorization group MYLOCAL name-mangler MANGLER
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20111012/d1d03be1/attachment.html>


More information about the Users mailing list