[strongSwan] VPN connection to Remote Fortigate Client

Noel Kuntze noel.kuntze+strongswan-users-ml at thermi.consulting
Thu Apr 11 18:36:29 CEST 2019


Hi,

Provide your nat rules in iptables/nftables (whatever you're using) or provide the complete rule set, as shown with `iptables-save`.

Am 11.04.19 um 09:04 schrieb MOSES KARIUKI:
> Hello Noel, Team,
> 
> Any kind souls out there?
> Please assist with the below question.
> 
> 
> On Mon, Apr 8, 2019 at 3:22 PM MOSES KARIUKI <kariukims at gmail.com <mailto:kariukims at gmail.com>> wrote:
> 
>     Thanks a lot Noel. The connection is up and stable. Very helpful. 
>     One more thing, the remote client is able to ping my private IP, but i am unable to ping his private IP address. I have checked and my routes seem OK. What do you suggest?
> 
>     Below is my status:
> 
>     */sudo ipsec statusall/*
>     Status of IKE charon daemon (strongSwan 5.6.3, Linux 4.18.0-1008-gcp, x86_64):
>       uptime: 28 seconds, since Apr 08 12:14:39 2019
>       malloc: sbrk 1622016, mmap 0, used 629024, free 992992
>       worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 5
>       loaded plugins: charon aesni aes rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
>     Listening IP addresses:
>       10.138.0.4
>     Connections:
>         televida:  10.138.0.4...200.**.***.***  IKEv2, dpddelay=30s
>         televida:   local:  [35.1**.2**.***] uses pre-shared key authentication
>         televida:   remote: [200.**.***.***] uses pre-shared key authentication
>         televida:   child:  10.138.0.0/20 <http://10.138.0.0/20> === 10.28.2.0/24 <http://10.28.2.0/24> TUNNEL, dpdaction=clear
> 
>     Security Associations (1 up, 0 connecting):
>         televida[1]: ESTABLISHED 23 seconds ago, 10.138.0.4[35.1**.2**.***]...200.**.***.***[200.**.***.***]
>         televida[1]: IKEv2 SPIs: 055627d3eb22222f_i 081a1b696be14ad2_r*, pre-shared key reauthentication in 23 hours
>         televida[1]: IKE proposal: AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_521
>         televida{2}:  INSTALLED, TUNNEL, reqid 2, ESP in UDP SPIs: c5fb101f_i 82900426_o
>         televida{2}:  AES_CBC_256/HMAC_SHA2_256_128, 0 bytes_i, 0 bytes_o, rekeying in 41 minutes
>         televida{2}:   10.138.0.4/32 <http://10.138.0.4/32> === 10.28.2.0/24 <http://10.28.2.0/24>
>     kariukims at klick-001:~$ ping 10.28.2.9
>     PING 10.28.2.9 (10.28.2.9) 56(84) bytes of data.
>     ^C
>     --- 10.28.2.9 ping statistics ---
>     3 packets transmitted, 0 received, 100% packet loss, time 56ms
> 
> 
>     Kind regards,
>     Moses K
> 
>     On Mon, Apr 8, 2019 at 3:09 PM MOSES KARIUKI <kariukims at gmail.com <mailto:kariukims at gmail.com>> wrote:
> 
>         Thanks a lot Noel. The connection is up and stable. Very helpful. 
>         One more thing, the remote client is able to ping my private IP, but i am unable to ping his private IP address. I have checked and my routes seem OK. What do you suggest?
> 
>         Kind regards,
>         Moses K
> 
> 
>         On Thu, Apr 4, 2019 at 9:50 PM Noel Kuntze <noel.kuntze+strongswan-users-ml at thermi.consulting> wrote:
> 
>             Hi,
> 
>             You configured "rightsourceip=10.10.10.0/24 <http://10.10.10.0/24>" but that's supposed to be a site-to-site connection. Use rightsubnet instead.
>             rightsourceip is for assigning and requesting virtual IPs. The best way for you would be to migrate to swanctl instead.
>             Its configuration format is a lot clearer.
> 
>             Kind regards
> 
>             Noel
> 
>             Am 02.04.19 um 11:27 schrieb MOSES KARIUKI:
>             > Dear Tobias,
>             >
>             > :) :)
>             > I read the message. But I can't really interpret what setting is needed to make it work. I have listed my current configuration. I am still finding my way with Linux networking and Strongswan.
>             >
>             > Please assist. I will really appreciate and also offer assist others.
>             >
>             > regards,
>             > Moses
>             >
>             >
>             >
>             > On Tue, Apr 2, 2019 at 11:23 AM Tobias Brunner <tobias at strongswan.org <mailto:tobias at strongswan.org> <mailto:tobias at strongswan.org <mailto:tobias at strongswan.org>>> wrote:
>             >
>             >     Hi Moses,
>             >
>             >     > Apr  1 20:57:58 klick-001 charon: 11[IKE] expected a virtual IP
>             >     > request, sending FAILED_CP_REQUIRED
>             >
>             >     I guess reading is hard.  Or is that message (that you explicitly marked
>             >     in your email) really that unclear?
>             >
>             >     Regards,
>             >     Tobias
>             >
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20190411/7a5536c1/attachment.sig>


More information about the Users mailing list