[strongSwan] Cisco 3845 integrating with Strongswan 5.4 Centos 7 AWS VPC
Jonathan Hunter
jhunter at voxboxcoms.co.uk
Tue Nov 8 18:36:16 CET 2016
Hi Guys
I was wondering if anyone has had this same issue.
we have a number of servers in a VPC in AWS and we are building IPSEC
tunnels with an end customer who are using a Cisco 3845, and we want to
establish a site to site connection.
We are using servers with an Elastic IP, and can establish the tunnel,
however I cannot seem to initiate connections from the AWS server running
strongswan, out to the Cisco, for example ICMP, or SMPP, however if the
Cisco intiates a PING, the tunnel becomes active.
I notice until that point ip xfrm policy has no content populated, please
can someone let me know what I may be missing?
the status of the strongswan command shows ;
strongswan statusall
Status of IKE charon daemon (strongSwan 5.4.0, Linux
3.10.0-327.18.2.el7.x86_64, x86_64):
uptime: 9 minutes, since Nov 08 17:05:11 2016
malloc: sbrk 1622016, mmap 0, used 483808, free 1138208
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,
scheduled: 4
loaded plugins: charon aes des rc2 sha2 sha1 md4 md5 random nonce x509
revocation constraints acert pubkey pkcs1 pkcs8 pkcs12 pgp dnskey sshkey
pem openssl gcrypt fips-prf gmp xcbc cmac hmac ctr ccm gcm curl attr
kernel-netlink resolve socket-default farp stroke vici updown eap-identity
eap-md5 eap-gtc eap-mschapv2 eap-tls eap-ttls eap-peap xauth-generic
xauth-eap xauth-pam xauth-noauth dhcp
Listening IP addresses:
172.31.12.91
Connections:
THW-FW-B: 172.31.12.91...<CustomerPublicIPFirewall> IKEv1,
dpddelay=10s
THW-FW-B: local: [<ElasticIP>] uses pre-shared key authentication
THW-FW-B: remote: [<CustomerPublicIPFirewall>] uses pre-shared key
authentication
THW-FW-B: child: <ElasticIP>/32 === <CustomerSubnet> TUNNEL,
dpdaction=restart
Security Associations (1 up, 0 connecting):
THW-FW-B[1]: ESTABLISHED 9 minutes ago,
172.31.12.91[<ElasticIP>]...<CustomerPublicIPFirewall>[<CustomerPublicIP>]
THW-FW-B[1]: IKEv1 SPIs: 0cc86f09022b466c_i* cfb875944d065524_r,
pre-shared key reauthentication in 7 hours
THW-FW-B[1]: IKE proposal: 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
However As I say, when I try and ping the far side subnet, it doesnt try to
go through the tunnel/create a child policy, however if the far end sends a
ping, it creates a tunnel, and from that point onwards I can initiate a
connection.
Please help!
ipsec.conf shown below;
# ipsec.conf - strongSwan IPsec configuration file
# basic configuration
config setup
charondebug="ike, knl 2, cfg 2, net 2, esp 2, dmn 2, mgr 2"
conn %default
ikelifetime=28800s
keylife=3600s
rekeymargin=3m
keyingtries=3
keyexchange=ikev1
authby=secret
type=tunnel
dpddelay=10s
dpdtimeout =30s
dpdaction=restart
rekey=yes
conn THW-FW-B
ike=3des-sha1-modp1024
esp=3des-sha1-modp1024
left=172.31.12.91
leftsubnet=<ElasticIP>
leftid=<ElasticIP>
leftfirewall=yes
right=<CustomerPublicIPFirewall>
rightsubnet=<CustomerSubnet>
auto=start
Many thanks
Jon
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20161108/52dc1a86/attachment.html>
More information about the Users
mailing list