[strongSwan] multiple right subnets - road warrior config
Arun G Nair
arungnair at gmail.com
Mon Mar 25 21:10:20 CET 2013
Hi,
I'm trying to connect to a Fortigate vpn gateway with Strongswan
5.0.2 from linux. I've used parameters from windows fortinet ipsec
client (config below) and I'm able to successfully connect to the
gateway. But I can't connect to multiple remote subnets at the same
time. I can only connect to the last subnet defined. If I re-order the
definitions, I can connect to the other subnet. I've done this before
with site to site vpn connections but this is a road warrior set up.
What am I missing here ?
PS: I've not tried connecting to network-mgmt. That was in the docs
provided for fortinet on windows, but I don't have any servers in that
subnet.
[~]> cat /opt/strongswan/etc/ipsec.conf
# ipsec.conf - strongSwan IPsec configuration file
# basic configuration
config setup
# strictcrlpolicy=yes
uniqueids=never
#charondebug="dmn 1, mgr 1, ike 2, chd 1, job 1, cfg 3, knl 2, net 2,
enc 1, lib 1"
conn %default
ikelifetime=8h
keylife=30m
rekeymargin=3m
keyingtries=3
keyexchange=ikev1
ike=3des-sha-modp1536,aes-sha-modp1536
esp=3des-sha-modp1536,aes-sha-modp1536
aggressive=yes
authby=secret
conn network
left=192.168.1.12
leftid=user
right=gateway.net
rightid=vv.xx.yy.zz
conn network-mgmt
also=network
rightsubnet=xx.yy.248.8/29
auto=start
conn network-trust
also=network
rightsubnet=xx.yy.248.32/28
auto=start
conn network-dmz
also=network
rightsubnet=xx.yy.248.48/28
auto=start
[~]> sudo /opt/strongswan/sbin/ipsec statusall
Status of IKE charon daemon (strongSwan 5.0.2, Linux
2.6.32-358.2.1.el6.i686, i686):
uptime: 7 seconds, since Mar 26 01:24:51 2013
malloc: sbrk 135168, mmap 0, used 95552, free 39616
worker threads: 8 of 16 idle, 7/1/0/0 working, job queue: 0/0/0/0,
scheduled: 3
loaded plugins: charon aes des sha1 sha2 md5 random nonce x509
revocation constraints pubkey pkcs1 pkcs8 pgp dn
skey pem fips-prf gmp xcbc cmac hmac attr kernel-netlink resolve
socket-default stroke updown xauth-generic
Listening IP addresses:
192.168.1.12
Connections:
network-mgmt: 192.168.1.12...gateway.net IKEv1 Aggressive
network-mgmt: local: [user] uses pre-shared key authentication
network-mgmt: remote: [vv.xx.yy.zz] uses pre-shared key authentication
network-mgmt: child: dynamic === xx.yy.248.8/29 TUNNEL
network-trust: child: dynamic === xx.yy.248.32/28 TUNNEL
network-dmz: child: dynamic === xx.yy.248.48/28 TUNNEL
Security Associations (1 up, 0 connecting):
network-mgmt[1]: ESTABLISHED 6 seconds ago,
192.168.1.12[user]...vv.xx.yy.zz[vv.xx.yy.zz]
network-mgmt[1]: IKEv1 SPIs: a3676024cee6d6d2_i* b8f961a5eedca572_r,
pre-shared key reauthentication in 7 hours
network-mgmt[1]: IKE proposal: 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
network-mgmt{1}: INSTALLED, TUNNEL, ESP in UDP SPIs: c99b5d07_i 381c7157_o
network-mgmt{1}: 3DES_CBC/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o,
rekeying in 24 minutes
network-mgmt{1}: 192.168.1.12/32 === xx.yy.248.8/29
network-trust{2}: INSTALLED, TUNNEL, ESP in UDP SPIs: c44f6125_i 381c7158_o
network-trust{2}: 3DES_CBC/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o,
rekeying in 25 minutes
network-trust{2}: 192.168.1.12/32 === xx.yy.248.32/28
network-dmz{3}: INSTALLED, TUNNEL, ESP in UDP SPIs: c2348492_i 381c7159_o
network-dmz{3}: 3DES_CBC/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o,
rekeying in 24 minutes
network-dmz{3}: 192.168.1.12/32 === xx.yy.248.48/28
[~]> cat /opt/strongswan/etc/ipsec.secrets
user : PSK passphrase
Any help is appreciated.
Regards,
Arun G Nair
More information about the Users
mailing list