Hi everbody,
forgive me if I'm writing in the wrong list and please point me to the right
one.
I'm having a bad time trying to set up a vpn between a Fortigate 200D and a
strongswan linux box (ipfire):
what I'm trying to do is to translate the configuration I have on the
Forticlient (windows application)
to make it work under Strongswan.
Forticlient configuration:
xauth disabled
mode aggressive
options mode config
phase 1:
ikev1
encryption aes256
auth sha256
DH group 5
key life 86400 sec
dead peer detection
nat traversal
phase 2:
ikev1
encryption aes256
auth sha256
DH group 5
key life 43200 sec
enable replay detection
enable PFS
DH Group 5
And this is the ipsec.conf file I tried to forge from the windows client:
version 2
conn %default
keyingtries=%forever
conn CSAP
left=MY_PLUBLIC_IP
leftsubnet=192.168.1.0/24
leftfirewall=yes
lefthostaccess=yes
right=PEER_IP
rightsubnet=192.168.100.1/24
ike=aes256,sha256,modp1536
esp=aes256,sha256,modp1536
keyexchange=ikev1
ikelifetime=86400s
keylife=43200s
#compress=yes
dpdaction=restart
dpddelay=30
dpdtimeout=120
authby=secret
auto=start
fragmentation=yes
But when I try to connect all I get is this from the console:
[root@firewall ~]# ipsec up CSAP
initiating Main Mode IKE_SA CSAP[3] to 151.11.136.132
generating ID_PROT request 0 [ SA V V V V V V ]
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 1 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 2 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 3 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 4 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 5 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
giving up after 5 retransmits
peer not responding, trying again (2/0)
initiating Main Mode IKE_SA CSAP[3] to PEER_IP
generating ID_PROT request 0 [ SA V V V V V V ]
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 1 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 2 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
sending retransmit 3 of request message ID 0, seq 1
sending packet: from MY_PUBLIC_IP[500] to PEER_IP[500] (320 bytes)
destroying IKE_SA in state CONNECTING without notification
establishing connection 'CSAP' failed
(here I stopped it manually from another console)
In /var/log/messages all I see is this:
May 9 09:14:37 firewall charon: 06[ENC] generating ID_PROT request 0 [ SA V V
V V V V ]
May 9 09:14:37 firewall charon: 06[NET] sending packet: from MY_PUBLIC_IP[500]
to PEER_IP[500] (320 bytes)
May 9 09:14:37 firewall charon: 03[NET] error writing to socket: Invalid
argument
May 9 09:14:41 firewall charon: 07[IKE] sending retransmit 1 of request
message ID 0, seq 1
May 9 09:14:41 firewall charon: 07[NET] sending packet: from MY_PUBLIC_IP[500]
to PEER_IP[500] (320 bytes)
May 9 09:14:41 firewall charon: 03[NET] error writing to socket: Invalid
argument
May 9 09:14:48 firewall charon: 10[IKE] sending retransmit 2 of request
message ID 0, seq 1
May 9 09:14:48 firewall charon: 10[NET] sending packet: from MY_PUBLIC_IP[500]
to PEER_IP[500] (320 bytes)
May 9 09:14:48 firewall charon: 03[NET] error writing to socket: Invalid
argument
May 9 09:15:01 firewall charon: 05[IKE] sending retransmit 3 of request
message ID 0, seq 1
May 9 09:15:01 firewall charon: 05[NET] sending packet: from MY_PUBLIC_IP[500]
to PEER_IP[500] (320 bytes)
May 9 09:15:01 firewall charon: 03[NET] error writing to socket: Invalid
argument
May 9 09:15:19 firewall charon: 15[CFG] received stroke: terminate 'CSAP'
May 9 09:15:19 firewall charon: 14[IKE] destroying IKE_SA in state CONNECTING
without notification
May 9 09:15:19 firewall charon: 06[CFG] received stroke: terminate 'CSAP'
May 9 09:15:20 firewall charon: 06[CFG] no IKE_SA named 'CSAP' found
I'm obviously doing something wrong here, I think that message "error writing
to socket: Invalid argument" in the
log might be the culprit but I don't know what does it mean, I can ping and
reach via telnet the PEER so there is
no connection problem (also the windows client version is connecting correctly
to the vpn).
Strongswan version is 5.3.5, kernel is 3.14.65, I already checked that all the
required kernel modules are loaded.
Please advice in any way.
Thanks
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users