Hello all,

I am trying to set a VPN between Strongswan on Linux and a Fortigate 60C 
(FortiOS 5.2.4), in IKEv2 EAP identity.
The Fortigate sends the EAP_IDENTITY and Strongswan answers with EAP_IDENTITY,  
and Fortigate does not answer any more (see traces below).

Does anyone already use Fortigate 60C in IKEv2 EAP mode ?

Thanks and regards

Denis

# ipsec.conf - strongSwan IPsec configuration file

config setup
        charondebug="cfg 2, chd 2, dmn 2, esp 2, ike 2, knl 2, mgr 2"

# Add connections here.
conn %default
        keyexchange=ikev2

# Sample VPN connections
conn vpn_FGT
        left=X.X.X.82
        leftsourceip=%config
        leftauth=psk
        leftfirewall=yes
        leftid=172.26.185.82
        auto=start
        ike=aes256-sha256-modp2048
        esp=aes256-sha256-modp2048
        right=X.X.X.50
        rightsubnet=X.X.X.50/32
        rightid=%any
        rightauth=eap

Sep 15 14:59:11 (none) charon: 09[CFG] configured proposals: 
ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ, 
ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
Sep 15 14:59:11 (none) charon: 09[KNL] got SPI c424fe4c
Sep 15 14:59:11 (none) charon: 09[ENC] generating IKE_AUTH request 1 [ IDi 
CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(EAP_ONLY) ]
Sep 15 14:59:11 (none) charon: 09[NET] sending packet: from X.X.X.82[4500] to 
X.X.X.50[4500] (336 bytes)
Sep 15 14:59:11 (none) charon: 09[MGR] checkin IKE_SA vpn_FGT[1]
Sep 15 14:59:11 (none) charon: 10[MGR] checkout IKE_SA by message
Sep 15 14:59:11 (none) charon: 09[MGR] check-in of IKE_SA successful.
Sep 15 14:59:11 (none) charon: 10[MGR] IKE_SA vpn_FGT[1] successfully checked 
out
Sep 15 14:59:11 (none) charon: 10[NET] received packet: from X.X.X.50[4500] to 
X.X.X.82[4500] (192 bytes)
Sep 15 14:59:11 (none) charon: 10[ENC] parsed IKE_AUTH response 1 [ IDr AUTH 
EAP/REQ/ID ]
Sep 15 14:59:11 (none) charon: 10[IKE] authentication of 'X.X.X.50' with 
pre-shared key successful
Sep 15 14:59:11 (none) charon: 10[IKE] server requested EAP_IDENTITY (id 0x95), 
sending 'X.X.X.82'
Sep 15 14:59:11 (none) charon: 10[IKE] reinitiating already active tasks
Sep 15 14:59:11 (none) charon: 10[IKE]   IKE_AUTH task
Sep 15 14:59:11 (none) charon: 10[ENC] generating IKE_AUTH request 2 [ 
EAP/RES/ID ]
Sep 15 14:59:11 (none) charon: 10[NET] sending packet: from X.X.X.82[4500] to 
X.X.X.50[4500] (96 bytes)
Sep 15 14:59:11 (none) charon: 10[MGR] checkin IKE_SA vpn_FGT[1]
Sep 15 14:59:11 (none) charon: 10[MGR] check-in of IKE_SA successful.
Sep 15 14:59:13 (none) charon: 11[CFG] proposing traffic selectors for us:
Sep 15 14:59:13 (none) charon: 11[CFG]  dynamic
Sep 15 14:59:13 (none) charon: 11[CFG] proposing traffic selectors for other:
Sep 15 14:59:13 (none) charon: 11[CFG]  X.X.X.50/32
Sep 15 14:59:15 (none) charon: 06[MGR] checkout IKE_SA
Sep 15 14:59:15 (none) charon: 06[MGR] IKE_SA vpn_FGT[1] successfully checked 
out
Sep 15 14:59:15 (none) charon: 06[MGR] checkin IKE_SA vpn_FGT[1]
Sep 15 14:59:15 (none) charon: 06[MGR] check-in of IKE_SA successful.
Sep 15 14:59:15 (none) charon: 08[MGR] checkout IKE_SA
Sep 15 14:59:15 (none) charon: 08[MGR] IKE_SA vpn_FGT[1] successfully checked 
out
Sep 15 14:59:15 (none) charon: 08[MGR] checkin IKE_SA vpn_FGT[1]
Sep 15 14:59:15 (none) charon: 08[MGR] check-in of IKE_SA successful.
Sep 15 14:59:15 (none) charon: 13[MGR] checkout IKE_SA
Sep 15 14:59:15 (none) charon: 13[MGR] IKE_SA vpn_FGT[1] successfully checked 
out
Sep 15 14:59:15 (none) charon: 13[IKE] retransmit 1 of request with message ID 2
Sep 15 14:59:15 (none) charon: 13[NET] sending packet: from X.X.X.82[4500] to 
X.X.X.50[4500] (96 bytes)
Sep 15 14:59:15 (none) charon: 13[MGR] checkin IKE_SA vpn_FGT[1]

_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to