mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
* Updated site-to-site IPsec VPN documentation Added general theoretical IPsec documentation. Changed site-to-site IPsec VPN documentation. Added steps for configuration. Added documentation for troubleshooting site-to-site IPsec VPN. Backported from https://github.com/vyos/vyos-documentation/pull/1653 --------- Co-authored-by: aapostoliuk <aapostoliuk@vyos.io> Co-authored-by: Daniil Baturin <daniil@baturin.org>
324 lines
17 KiB
ReStructuredText
324 lines
17 KiB
ReStructuredText
.. _troubleshooting_ipsec:
|
|
|
|
######################################
|
|
Troubleshooting Site-to-Site VPN IPsec
|
|
######################################
|
|
|
|
************
|
|
Introduction
|
|
************
|
|
|
|
This document describes the methodology to monitor and troubleshoot
|
|
Site-to-Site VPN IPsec.
|
|
|
|
Steps for troubleshooting problems with Site-to-Site VPN IPsec:
|
|
1. Ping the remote site through the tunnel using the source and
|
|
destination IPs included in the policy.
|
|
2. Check connectivity between the routers using the ping command
|
|
(if ICMP traffic is allowed).
|
|
3. Check the IKE SAs' statuses.
|
|
4. Check the IPsec SAs' statuses.
|
|
5. Check logs to view debug messages.
|
|
|
|
**********************
|
|
Checking IKE SA Status
|
|
**********************
|
|
|
|
The next command shows IKE SAs' statuses.
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ike sa
|
|
|
|
Peer ID / IP Local ID / IP
|
|
------------ -------------
|
|
192.168.1.2 192.168.1.2 192.168.0.1 192.168.0.1
|
|
|
|
State IKEVer Encrypt Hash D-H Group NAT-T A-Time L-Time
|
|
----- ------ ------- ---- --------- ----- ------ ------
|
|
up IKEv2 AES_CBC_128 HMAC_SHA1_96 MODP_2048 no 162 27023
|
|
|
|
This command shows the next information:
|
|
- IKE SA status.
|
|
- Selected IKE version.
|
|
- Selected Encryption, Hash and Diffie-Hellman Group.
|
|
- NAT-T.
|
|
- ID and IP of both peers.
|
|
- A-Time: established time, L-Time: time for next rekeying.
|
|
|
|
**************************
|
|
IPsec SA (CHILD SA) Status
|
|
**************************
|
|
|
|
The next commands show IPsec SAs' statuses.
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ipsec sa
|
|
Connection State Uptime Bytes In/Out Packets In/Out Remote address Remote ID Proposal
|
|
------------- ------- -------- -------------- ---------------- ---------------- ----------- ----------------------------------
|
|
PEER-tunnel-1 up 16m30s 168B/168B 2/2 192.168.1.2 192.168.1.2 AES_CBC_128/HMAC_SHA1_96/MODP_2048
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ipsec sa detail
|
|
PEER: #1, ESTABLISHED, IKEv2, 101275ac719d5a1b_i* 68ea4ec3bed3bf0c_r
|
|
local '192.168.0.1' @ 192.168.0.1[4500]
|
|
remote '192.168.1.2' @ 192.168.1.2[4500]
|
|
AES_CBC-128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
established 4054s ago, rekeying in 23131s
|
|
PEER-tunnel-1: #2, reqid 1, INSTALLED, TUNNEL, ESP:AES_CBC-128/HMAC_SHA1_96/MODP_2048
|
|
installed 1065s ago, rekeying in 1998s, expires in 2535s
|
|
in c5821882, 168 bytes, 2 packets, 81s ago
|
|
out c433406a, 168 bytes, 2 packets, 81s ago
|
|
local 10.0.0.0/24
|
|
remote 10.0.1.0/24
|
|
|
|
These commands show the next information:
|
|
- IPsec SA status.
|
|
- Uptime and time for the next rekeing.
|
|
- Amount of transferred data.
|
|
- Remote and local ID and IP.
|
|
- Selected Encryption, Hash and Diffie-Hellman Group.
|
|
- Mode (tunnel or transport).
|
|
- Remote and local prefixes which are use for policy.
|
|
|
|
There is a possibility to view the summarized information of SAs' status
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ipsec connections
|
|
Connection State Type Remote address Local TS Remote TS Local id Remote id Proposal
|
|
------------- ------- ------ ---------------- ----------- ----------- ----------- ----------- ----------------------------------
|
|
PEER up IKEv2 192.168.1.2 - - 192.168.0.1 192.168.1.2 AES_CBC/128/HMAC_SHA1_96/MODP_2048
|
|
PEER-tunnel-1 up IPsec 192.168.1.2 10.0.0.0/24 10.0.1.0/24 192.168.0.1 192.168.1.2 AES_CBC/128/HMAC_SHA1_96/MODP_2048
|
|
|
|
**************************
|
|
Viewing Logs for Debugging
|
|
**************************
|
|
|
|
If IKE SAs or IPsec SAs are down, need to debug IPsec connectivity
|
|
using logs ``show log ipsec``
|
|
|
|
The next example of the successful IPsec connection initialization.
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show log ipsec
|
|
Jun 20 14:29:47 charon[2428]: 02[NET] <PEER|1> received packet: from 192.168.1.2[500] to 192.168.0.1[500] (472 bytes)
|
|
Jun 20 14:29:47 charon[2428]: 02[ENC] <PEER|1> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
|
|
Jun 20 14:29:47 charon-systemd[2428]: received packet: from 192.168.1.2[500] to 192.168.0.1[500] (472 bytes)
|
|
Jun 20 14:29:47 charon[2428]: 02[CFG] <PEER|1> selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 20 14:29:47 charon-systemd[2428]: parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
|
|
Jun 20 14:29:47 charon-systemd[2428]: selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 20 14:29:47 charon[2428]: 02[IKE] <PEER|1> authentication of '192.168.0.1' (myself) with pre-shared key
|
|
Jun 20 14:29:47 charon-systemd[2428]: authentication of '192.168.0.1' (myself) with pre-shared key
|
|
Jun 20 14:29:47 charon[2428]: 02[IKE] <PEER|1> establishing CHILD_SA PEER-tunnel-1{1}
|
|
Jun 20 14:29:47 charon-systemd[2428]: establishing CHILD_SA PEER-tunnel-1{1}
|
|
Jun 20 14:29:47 charon[2428]: 02[ENC] <PEER|1> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
|
|
Jun 20 14:29:47 charon-systemd[2428]: generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
|
|
Jun 20 14:29:47 charon[2428]: 02[NET] <PEER|1> sending packet: from 192.168.0.1[4500] to 192.168.1.2[4500] (268 bytes)
|
|
Jun 20 14:29:47 charon-systemd[2428]: sending packet: from 192.168.0.1[4500] to 192.168.1.2[4500] (268 bytes)
|
|
Jun 20 14:29:47 charon[2428]: 13[NET] <PEER|1> received packet: from 192.168.1.2[4500] to 192.168.0.1[4500] (220 bytes)
|
|
Jun 20 14:29:47 charon[2428]: 13[ENC] <PEER|1> parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) ]
|
|
Jun 20 14:29:47 charon-systemd[2428]: received packet: from 192.168.1.2[4500] to 192.168.0.1[4500] (220 bytes)
|
|
Jun 20 14:29:47 charon[2428]: 13[IKE] <PEER|1> authentication of '192.168.1.2' with pre-shared key successful
|
|
Jun 20 14:29:47 charon-systemd[2428]: parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) ]
|
|
Jun 20 14:29:47 charon[2428]: 13[IKE] <PEER|1> peer supports MOBIKE
|
|
Jun 20 14:29:47 charon-systemd[2428]: authentication of '192.168.1.2' with pre-shared key successful
|
|
Jun 20 14:29:47 charon[2428]: 13[IKE] <PEER|1> IKE_SA PEER[1] established between 192.168.0.1[192.168.0.1]...192.168.1.2[192.168.1.2]
|
|
Jun 20 14:29:47 charon-systemd[2428]: peer supports MOBIKE
|
|
Jun 20 14:29:47 charon[2428]: 13[IKE] <PEER|1> scheduling rekeying in 27703s
|
|
Jun 20 14:29:47 charon-systemd[2428]: IKE_SA PEER[1] established between 192.168.0.1[192.168.0.1]...192.168.1.2[192.168.1.2]
|
|
Jun 20 14:29:47 charon[2428]: 13[IKE] <PEER|1> maximum IKE_SA lifetime 30583s
|
|
Jun 20 14:29:47 charon-systemd[2428]: scheduling rekeying in 27703s
|
|
Jun 20 14:29:47 charon[2428]: 13[CFG] <PEER|1> selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
|
|
Jun 20 14:29:47 charon-systemd[2428]: maximum IKE_SA lifetime 30583s
|
|
Jun 20 14:29:47 charon-systemd[2428]: selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
|
|
Jun 20 14:29:47 charon[2428]: 13[IKE] <PEER|1> CHILD_SA PEER-tunnel-1{1} established with SPIs cb94fb3f_i ca99c8a9_o and TS 10.0.0.0/24 === 10.0.1.0/24
|
|
Jun 20 14:29:47 charon-systemd[2428]: CHILD_SA PEER-tunnel-1{1} established with SPIs cb94fb3f_i ca99c8a9_o and TS 10.0.0.0/24 === 10.0.1.0/24
|
|
|
|
************************
|
|
Troubleshooting Examples
|
|
************************
|
|
|
|
IKE PROPOSAL are Different
|
|
==========================
|
|
|
|
In this situation, IKE SAs can be down or not active.
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ike sa
|
|
|
|
The problem is in IKE phase (Phase 1). The next step is checking debug logs.
|
|
|
|
Responder Side:
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 07:36:33 charon[2440]: 01[CFG] <1> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 23 07:36:33 charon-systemd[2440]: received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 23 07:36:33 charon[2440]: 01[CFG] <1> configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 23 07:36:33 charon-systemd[2440]: configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 23 07:36:33 charon[2440]: 01[IKE] <1> received proposals unacceptable
|
|
Jun 23 07:36:33 charon-systemd[2440]: received proposals unacceptable
|
|
Jun 23 07:36:33 charon[2440]: 01[ENC] <1> generating IKE_SA_INIT response 0 [ N(NO_PROP) ]
|
|
|
|
Initiator side:
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 07:36:32 charon-systemd[2444]: parsed IKE_SA_INIT response 0 [ N(NO_PROP) ]
|
|
Jun 23 07:36:32 charon[2444]: 14[IKE] <PEER|1> received NO_PROPOSAL_CHOSEN notify error
|
|
Jun 23 07:36:32 charon-systemd[2444]: received NO_PROPOSAL_CHOSEN notify error
|
|
|
|
The notification **NO_PROPOSAL_CHOSEN** means that the proposal mismatch.
|
|
On the Responder side there is concrete information where is mismatch.
|
|
Encryption **AES_CBC_128** is configured in IKE policy on the responder
|
|
but **AES_CBC_256** is configured on the initiator side.
|
|
|
|
PSK Secret Mismatch
|
|
===================
|
|
|
|
In this situation, IKE SAs can be down or not active.
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ike sa
|
|
|
|
The problem is in IKE phase (Phase 1). The next step is checking debug logs.
|
|
|
|
Responder:
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 08:07:26 charon-systemd[2440]: tried 1 shared key for '192.168.1.2' - '192.168.0.1', but MAC mismatched
|
|
Jun 23 08:07:26 charon[2440]: 13[ENC] <PEER|3> generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
|
|
|
|
Initiator side:
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 08:07:24 charon[2436]: 12[ENC] <PEER|1> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
|
|
Jun 23 08:07:24 charon-systemd[2436]: parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
|
|
Jun 23 08:07:24 charon[2436]: 12[IKE] <PEER|1> received AUTHENTICATION_FAILED notify error
|
|
Jun 23 08:07:24 charon-systemd[2436]: received AUTHENTICATION_FAILED notify error
|
|
|
|
The notification **AUTHENTICATION_FAILED** means that the authentication
|
|
is failed. There is a reason to check PSK on both side.
|
|
|
|
ESP Proposal Mismatch
|
|
=====================
|
|
|
|
The output of **show** commands shows us that IKE SA is established but
|
|
IPSec SA is not.
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ike sa
|
|
Peer ID / IP Local ID / IP
|
|
------------ -------------
|
|
192.168.1.2 192.168.1.2 192.168.0.1 192.168.0.1
|
|
|
|
State IKEVer Encrypt Hash D-H Group NAT-T A-Time L-Time
|
|
----- ------ ------- ---- --------- ----- ------ ------
|
|
up IKEv2 AES_CBC_128 HMAC_SHA1_96 MODP_2048 no 158 26817
|
|
|
|
.. code-block:: none
|
|
|
|
vyos@vyos:~$ show vpn ipsec sa
|
|
Connection State Uptime Bytes In/Out Packets In/Out Remote address Remote ID Proposal
|
|
------------ ------- -------- -------------- ---------------- ---------------- ----------- ----------
|
|
|
|
The next step is checking debug logs.
|
|
|
|
Initiator side:
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 08:16:10 charon[3789]: 13[NET] <PEER|1> received packet: from 192.168.1.2[500] to 192.168.0.1[500] (472 bytes)
|
|
Jun 23 08:16:10 charon[3789]: 13[ENC] <PEER|1> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
|
|
Jun 23 08:16:10 charon-systemd[3789]: received packet: from 192.168.1.2[500] to 192.168.0.1[500] (472 bytes)
|
|
Jun 23 08:16:10 charon[3789]: 13[CFG] <PEER|1> selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 23 08:16:10 charon-systemd[3789]: parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
|
|
Jun 23 08:16:10 charon-systemd[3789]: selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
|
|
Jun 23 08:16:10 charon[3789]: 13[IKE] <PEER|1> authentication of '192.168.0.1' (myself) with pre-shared key
|
|
Jun 23 08:16:10 charon-systemd[3789]: authentication of '192.168.0.1' (myself) with pre-shared key
|
|
Jun 23 08:16:10 charon[3789]: 13[IKE] <PEER|1> establishing CHILD_SA PEER-tunnel-1{1}
|
|
Jun 23 08:16:10 charon-systemd[3789]: establishing CHILD_SA PEER-tunnel-1{1}
|
|
Jun 23 08:16:10 charon[3789]: 13[ENC] <PEER|1> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
|
|
Jun 23 08:16:10 charon-systemd[3789]: generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
|
|
Jun 23 08:16:10 charon[3789]: 13[NET] <PEER|1> sending packet: from 192.168.0.1[4500] to 192.168.1.2[4500] (268 bytes)
|
|
Jun 23 08:16:10 charon-systemd[3789]: sending packet: from 192.168.0.1[4500] to 192.168.1.2[4500] (268 bytes)
|
|
Jun 23 08:16:10 charon[3789]: 09[NET] <PEER|1> received packet: from 192.168.1.2[4500] to 192.168.0.1[4500] (140 bytes)
|
|
Jun 23 08:16:10 charon-systemd[3789]: received packet: from 192.168.1.2[4500] to 192.168.0.1[4500] (140 bytes)
|
|
Jun 23 08:16:10 charon[3789]: 09[ENC] <PEER|1> parsed IKE_AUTH response 1 [ IDr AUTH N(MOBIKE_SUP) N(NO_ADD_ADDR) N(NO_PROP) ]
|
|
Jun 23 08:16:10 charon-systemd[3789]: parsed IKE_AUTH response 1 [ IDr AUTH N(MOBIKE_SUP) N(NO_ADD_ADDR) N(NO_PROP) ]
|
|
Jun 23 08:16:10 charon[3789]: 09[IKE] <PEER|1> authentication of '192.168.1.2' with pre-shared key successful
|
|
Jun 23 08:16:10 charon-systemd[3789]: authentication of '192.168.1.2' with pre-shared key successful
|
|
Jun 23 08:16:10 charon[3789]: 09[IKE] <PEER|1> peer supports MOBIKE
|
|
Jun 23 08:16:10 charon-systemd[3789]: peer supports MOBIKE
|
|
Jun 23 08:16:10 charon[3789]: 09[IKE] <PEER|1> IKE_SA PEER[1] established between 192.168.0.1[192.168.0.1]...192.168.1.2[192.168.1.2]
|
|
Jun 23 08:16:10 charon-systemd[3789]: IKE_SA PEER[1] established between 192.168.0.1[192.168.0.1]...192.168.1.2[192.168.1.2]
|
|
Jun 23 08:16:10 charon[3789]: 09[IKE] <PEER|1> scheduling rekeying in 26975s
|
|
Jun 23 08:16:10 charon-systemd[3789]: scheduling rekeying in 26975s
|
|
Jun 23 08:16:10 charon[3789]: 09[IKE] <PEER|1> maximum IKE_SA lifetime 29855s
|
|
Jun 23 08:16:10 charon-systemd[3789]: maximum IKE_SA lifetime 29855s
|
|
Jun 23 08:16:10 charon[3789]: 09[IKE] <PEER|1> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
|
|
Jun 23 08:16:10 charon-systemd[3789]: received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
|
|
Jun 23 08:16:10 charon[3789]: 09[IKE] <PEER|1> failed to establish CHILD_SA, keeping IKE_SA
|
|
Jun 23 08:16:10 charon-systemd[3789]: failed to establish CHILD_SA, keeping IKE_SA
|
|
|
|
There are messages: **NO_PROPOSAL_CHOSEN** and
|
|
**failed to establish CHILD_SA** which refers that the problem is in
|
|
the IPsec(ESP) proposal mismatch.
|
|
|
|
The reason of this problem is showed on the responder side.
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 08:16:12 charon[2440]: 01[CFG] <PEER|5> received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
|
|
Jun 23 08:16:12 charon-systemd[2440]: received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
|
|
Jun 23 08:16:12 charon[2440]: 01[CFG] <PEER|5> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ
|
|
Jun 23 08:16:12 charon-systemd[2440]: configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ
|
|
Jun 23 08:16:12 charon[2440]: 01[IKE] <PEER|5> no acceptable proposal found
|
|
Jun 23 08:16:12 charon-systemd[2440]: no acceptable proposal found
|
|
Jun 23 08:16:12 charon[2440]: 01[IKE] <PEER|5> failed to establish CHILD_SA, keeping IKE_SA
|
|
|
|
Encryption **AES_CBC_128** is configured in IKE policy on the responder but **AES_CBC_256**
|
|
is configured on the initiator side.
|
|
|
|
Prefixes in Policies Mismatch
|
|
=============================
|
|
|
|
As in previous situation, IKE SA is in up state but IPsec SA is not up.
|
|
According to logs we can see **TS_UNACCEPTABLE** notification. It means
|
|
that prefixes (traffic selectors) mismatch on both sides
|
|
|
|
Initiator:
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 14:13:17 charon[4996]: 11[IKE] <PEER|1> received TS_UNACCEPTABLE notify, no CHILD_SA built
|
|
Jun 23 14:13:17 charon-systemd[4996]: maximum IKE_SA lifetime 29437s
|
|
Jun 23 14:13:17 charon[4996]: 11[IKE] <PEER|1> failed to establish CHILD_SA, keeping IKE_SA
|
|
Jun 23 14:13:17 charon-systemd[4996]: received TS_UNACCEPTABLE notify, no CHILD_SA built
|
|
Jun 23 14:13:17 charon-systemd[4996]: failed to establish CHILD_SA, keeping IKE_SA
|
|
|
|
The reason of this problem is showed on the responder side.
|
|
|
|
.. code-block:: none
|
|
|
|
Jun 23 14:13:19 charon[2440]: 01[IKE] <PEER|7> traffic selectors 10.0.2.0/24 === 10.0.0.0/24 unacceptable
|
|
Jun 23 14:13:19 charon-systemd[2440]: traffic selectors 10.0.2.0/24 === 10.0.0.0/24 unacceptable
|
|
Jun 23 14:13:19 charon[2440]: 01[IKE] <PEER|7> failed to establish CHILD_SA, keeping IKE_SA
|
|
Jun 23 14:13:19 charon-systemd[2440]: failed to establish CHILD_SA, keeping IKE_SA
|
|
Jun 23 14:13:19 charon[2440]: 01[ENC] <PEER|7> generating IKE_AUTH response 1 [ IDr AUTH N(MOBIKE_SUP) N(NO_ADD_ADDR) N(TS_UNACCEPT) ]
|
|
Jun 23 14:13:19 charon-systemd[2440]: generating IKE_AUTH response 1 [ IDr AUTH N(MOBIKE_SUP) N(NO_ADD_ADDR) N(TS_UNACCEPT) ]
|
|
|
|
Traffic selectors **10.0.2.0/24 === 10.0.0.0/24** are unacceptable on the
|
|
responder side.
|
|
|
|
|