On Mon, 8 Mar 2021, Miguel Ponce Antolin wrote:

I think we are facing issues with the IKE algorithms.

The Cisco peer has the next configuration:
- pfs group14
- ikev2 ipsec-proposal AES256-SHA256
- security-association lifetime seconds 28800

So the libreswan side is configured in the ipsec.d/vpn.conf with similar 
parameters using the yum repository last version 3.25:

conn vpn
    type=tunnel
    authby=secret
    auto=start
    left=%defaultroute
    leftid=xxx.xxx.xxx.120
    leftsubnets=10.xxx.xxx.xxx/28
    right=xxx.xxx.xxx.45
    rightsubnets=xxx.xxx.xxx.17/32
    leftsourceip=xxx.xxx.xxx.92
    leftnexthop=%defaultroute
    ikev2=insist
    ike=aes256-sha2;dh14
    keyexchange=ike
    ikelifetime=28800s
    salifetime=28800s
    dpddelay=30
    dpdtimeout=120
    dpdaction=restart
    remote_peer_type=cisco
    aggrmode=yes
    initial-contact=yes
    encapsulation=no 

Delete the lines with remote_peer_type, aggrmode, and encapsulation

Try using ike=aes256-sha2_256;dh14

Mar  8 12:33:25.540325: | selected state microcode Initiator: process 
AUTHENTICATION_FAILED AUTH notification

It could also be that they are expected a different leftid= then you think?

Despite them claiming pfs, you can try pfs=no as well to see if that
makes a difference.

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to