Hi,
We have a RUT956 running RUT9M_R_00.07.06.10 and copied the IPSEC configuration from a RUT955 running 06.09.5. However, the ipsec is stuck on established and won’t go to established and installed. In the logs we keep seeing retransmits.
192.22.220.129 is the RUT956 LAN interface, 192.22.3.142 is the RUT956 WAN interface and 192.22.255.30 is the remote endpoint.
Mon May 27 16:25:40 2024 daemon.info ipsec: 09[KNL] creating delete job for CHILD_SA ESP/0xc63e9fb8/192.22.3.142
Mon May 27 16:25:40 2024 daemon.info ipsec: 09[JOB] CHILD_SA ESP/0xc63e9fb8/192.22.3.142 not found for delete
Mon May 27 16:25:41 2024 daemon.info ipsec: 06[IKE] <DEMO_c|8> giving up after 3 retransmits
Mon May 27 16:25:41 2024 daemon.info ipsec: 06[IKE] <DEMO_c|8> initiating Aggressive Mode IKE_SA DEMO_c[9] to 192.22.255.30
Mon May 27 16:25:41 2024 daemon.info ipsec: 06[ENC] <DEMO_c|8> generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]
Mon May 27 16:25:41 2024 daemon.info ipsec: 06[NET] <DEMO_c|8> sending packet: from 192.22.3.142[500] to 192.22.255.30[500] (391 bytes)
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[NET] <DEMO_c|9> received packet: from 192.22.255.30[500] to 192.22.3.142[500] (376 bytes)
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[ENC] <DEMO_c|9> parsed AGGRESSIVE response 0 [ SA KE No ID HASH V NAT-D NAT-D V V V V ]
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[IKE] <DEMO_c|9> received NAT-T (RFC 3947) vendor ID
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[IKE] <DEMO_c|9> received DPD vendor ID
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[ENC] <DEMO_c|9> received unknown vendor ID: 82:99:03:17:57:a3:60:82:c6:a6:21:de:00:00:00:00
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[IKE] <DEMO_c|9> received FRAGMENTATION vendor ID
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[IKE] <DEMO_c|9> received FRAGMENTATION vendor ID
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[CFG] <DEMO_c|9> selected proposal: IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_768
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[IKE] <DEMO_c|9> IKE_SA DEMO_c[9] established between 192.22.3.142[mobile00]…192.22.255.30[192.22.255.30]
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[IKE] <DEMO_c|9> scheduling reauthentication in 28067s
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[IKE] <DEMO_c|9> maximum IKE_SA lifetime 28607s
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[ENC] <DEMO_c|9> generating AGGRESSIVE request 0 [ HASH NAT-D NAT-D ]
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[NET] <DEMO_c|9> sending packet: from 192.22.3.142[500] to 192.22.255.30[500] (92 bytes)
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[ENC] <DEMO_c|9> generating QUICK_MODE request 1936924879 [ HASH SA No ID ID ]
Mon May 27 16:25:41 2024 daemon.info ipsec: 13[NET] <DEMO_c|9> sending packet: from 192.22.3.142[500] to 192.22.255.30[500] (220 bytes)
Mon May 27 16:25:45 2024 daemon.info ipsec: 16[IKE] <DEMO_c|9> sending retransmit 1 of request message ID 1936924879, seq 3
Mon May 27 16:25:45 2024 daemon.info ipsec: 16[NET] <DEMO_c|9> sending packet: from 192.22.3.142[500] to 192.22.255.30[500] (220 bytes)
Mon May 27 16:25:52 2024 daemon.info ipsec: 05[IKE] <DEMO_c|9> sending retransmit 2 of request message ID 1936924879, seq 3
Mon May 27 16:25:52 2024 daemon.info ipsec: 05[NET] <DEMO_c|9> sending packet: from 192.22.3.142[500] to 192.22.255.30[500] (220 bytes)
root@device:~# ipsec statusall
Status of IKE charon daemon (strongSwan 5.9.6, Linux 5.4.259, mips):
uptime: 15 minutes, since May 27 16:19:30 2024
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 32
loaded plugins: charon aes des sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pgp pem openssl pkcs8 xcbc hmac kernel-netlink socket-default stroke vici updown eap-identity eap-mschapv2 xauth-generic
Listening IP addresses:
192.22.220.129 (LAN)
fdf7:fbd0:a929::1
192.22.3.142 (MAIN WAN)
192.168.20.40 (4G BACKUP)
Connections:
passth_DEMO_c_lan: %any…%any IKEv1/2
passth_DEMO_c_lan: local: uses public key authentication
passth_DEMO_c_lan: remote: uses public key authentication
passth_DEMO_c_lan: child: 192.22.220.128/29 === 192.22.220.128/29 PASS
DEMO_c: %any…192.22.255.30 IKEv1 Aggressive, dpddelay=30s
DEMO_c: local: [mobile00] uses pre-shared key authentication
DEMO_c: remote: [192.22.255.30] uses pre-shared key authentication
DEMO_c: child: 192.22.220.128/29 === 192.16.0.0/16 TUNNEL, dpdaction=start
Shunted Connections:
passth_DEMO_c_lan: 192.22.220.128/29 === 192.22.220.128/29 PASS
Security Associations (1 up, 0 connecting):
DEMO_c[18]: ESTABLISHED 22 seconds ago, 192.22.3.142[mobile00]…192.22.255.30[192.22.255.30]
DEMO_c[18]: IKEv1 SPIs: 8a91b85d4c3cf88c_i* fb5e58d170171b59_r, pre-shared key reauthentication in 7 hours
DEMO_c[18]: IKE proposal: DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_768
DEMO_c[18]: Tasks active: QUICK_MODE
I have checked our firewall settings on the RUT956 and currently set everything to ACCEPT. What else can we check to determine what is going wrong? On the Fortigate the IPSEC is setup exactly the same as the other VPN.
Kind regards,
Tom