[strongSwan] Two problems with cisco and sonicwall.
Jordi Casanellas
matalaaranya at gmail.com
Tue Mar 21 16:38:10 CET 2017
Hello,
Thank you very much, I have finally been able to up the tunel
correctly with the ASA.
I have three tunnels left to raise.
One against a fortigate, zyxel and a netgear.
Fortigate:
ipsec statusall
Status of IKE charon daemon (strongSwan 5.2.1, Linux 3.16.0-4-amd64, x86_64):
uptime: 60 seconds, since Mar 21 16:30:24 2017
malloc: sbrk 1462272, mmap 0, used 312736, free 1149536
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,
scheduled: 1
loaded plugins: charon aes rc2 sha1 sha2 md5 random nonce x509
revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey
sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr
kernel-netlink resolve socket-default stroke updown
Listening IP addresses:
81.25.126.250
10.200.1.1
Connections:
evamsterdam: 81.25.126.250...46.16.59.216 IKEv1/2
evamsterdam: local: [81.25.126.250] uses pre-shared key authentication
evamsterdam: remote: [46.16.59.216] uses pre-shared key authentication
evamsterdam: child: 10.200.1.0/24 === 172.20.1.0/24 TUNNEL
Routed Connections:
evamsterdam{1}: ROUTED, TUNNEL
evamsterdam{1}: 10.200.1.0/24 === 172.20.1.0/24
Security Associations (1 up, 0 connecting):
evamsterdam[3]: CONNECTING, 81.25.126.250[%any]...46.16.59.216[%any]
evamsterdam[3]: IKEv2 SPIs: 03306b155e476faf_i* 0000000000000000_r
evamsterdam[3]: Tasks active: IKE_VENDOR IKE_INIT IKE_NATD
IKE_CERT_PRE IKE_AUTH IKE_CERT_POST IKE_CONFIG CHILD_CREATE
IKE_AUTH_LIFETIME IKE_MOBIKE
iptables-save
is empty (but vpn to sonicwall and cisco is working perfectly).
Configure vpn:
config setup
conn evamsterdam
left=81.25.126.250
leftsubnet=10.200.1.0/24
leftid=81.25.126.250
right=46.16.59.216
rightid=46.16.59.216
rightsubnet=172.20.1.0/24
#Encriptacio
keyingtries=0
esp=3des-sha1-modp1024
ike=3des-sha1-modp1024
keyexchange=ikev1
authby=secret
rekey=yes
#lifetime
ikelifetime=60s
lifetime=8h
auto=route
#compress=no
#forceencaps=yes
ipsec.secrets its fine.
Error in log: no IKE config found for 81.25.126.250...95.97.32.250,
sending NO_PROPOSAL_CHOSEN
Thank you!
2017-03-21 13:58 GMT+01:00 Noel Kuntze <noel at familie-kuntze.de>:
> On 21.03.2017 13:18, Jordi Casanellas wrote:
>> My vpn is working only ping in cisco to strongswan, ping strongwsan to cisco not working.
>
>> conn evindustria
>> leftsourceip=10.200.1.1
> That's invalid.
> Remove leftsourceip.
>
>> esp=3des-sha1-modp1024
>> ike=3des-sha1-modp1024
> Bad cipher suite. Upgrade that.
>
>> # This allows the VPN to come up automatically when openswan starts
>> auto=add
>
> That's just wrong. "auto=add" only adds the configuration to charon, but doesn't do anything else with it.
> It's neither initiated, nor used to install trap policies.
> Configure "auto=route".
>
>> Only the VPN works by pinging from the Cisco ASA to Strongwsan
>
> That's because you configured auto=add.
>
> Please stop sending HTML formatted emails. Send plaintext instead. It's unnecessarily difficult to handle it.
>
> --
>
> Mit freundlichen Grüßen/Kind Regards,
> Noel Kuntze
>
> GPG Key ID: 0x63EC6658
> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
>
More information about the Users
mailing list