<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: strongSwan - GUI - Network Manager - Username / Password in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/209306#M4907</link>
    <description>&lt;P&gt;This is a great guide, however my CHeckpoint is dropping my connecitons because it's using IKEv2. ANy guidance? I've tried my best to find an easy guide on getting StrongSwan to work on my Ubuntu laptop with no luck (using Certificate auth)&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2024 17:41:50 GMT</pubDate>
    <dc:creator>bwaller-sp</dc:creator>
    <dc:date>2024-03-20T17:41:50Z</dc:date>
    <item>
      <title>strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/182449#M4900</link>
      <description>&lt;P&gt;Instead of using strongSwan Command Line Interface (CLI), you can also use the Network-Manager-strongSwan Plugin to create a VPN Remote Connection to a Check Point Firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;This is not an official guide. This is just a tutorial from my lab.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;How to configure strongSwan, please see:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/strongSwan-Client-Support.htm?Highlight=StrongSwan" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/strongSwan-Client-Support.htm?Highlight=StrongSwan&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Username / Password Authentication

Gateway:
- R81.20 JF 10

Linux Client:
- Ubuntu 22.04
- strongSwan 5.9.5
- Network-Manager-StrongSwan 1.5.2&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Ubuntu&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;1) Install Network Manager strongSwan Plugin&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;$ sudo apt install network-manager-strongswan&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These packages are also needed to connect successfully&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;$ sudo apt-get install libstrongswan-extra-plugins
$ sudo apt-get install libcharon-extra-plugins
$ sudo apt-get install strongswan&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) add the following to /etc/strongswan.conf&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;charon-nm {
        load_modular = yes
        send_vendor_id = yes
        plugins {
                include strongswan.d/charon/*.conf
                attr {
                    dns = 1.1.1.1, 9.9.9.9
                }
        }

}&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;* &lt;STRONG&gt;charon-nm&lt;/STRONG&gt; is used by the Network Manager only. Without the option "send_vendor_id=yes", the VPN won't come up. See also under Troubleshooting an example of the strongswan.conf file I use in my lab.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;3) Restart ipsec service&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;$ systemctl restart ipsec&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4) create IPSec Profile in Network Manager&lt;/P&gt;
&lt;P&gt;Select: &lt;STRONG&gt;IPSec/IKEv2 (strongSwan)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bildschirmfoto 2023-05-29 um 23.11.13.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21123i4B0F98CFD18AE583/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2023-05-29 um 23.11.13.png" alt="Bildschirmfoto 2023-05-29 um 23.11.13.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;5) Configure Firewall IP Address etc. This is only an example of my Lab.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bildschirmfoto 2023-05-29 um 23.18.10.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21126iDE40A536243EDC8F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2023-05-29 um 23.18.10.png" alt="Bildschirmfoto 2023-05-29 um 23.18.10.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bildschirmfoto 2023-06-28 um 18.10.08.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21560iC9CBA3F7DBB0B41D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2023-06-28 um 18.10.08.png" alt="Bildschirmfoto 2023-06-28 um 18.10.08.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;6) Connect to Gateway&lt;/P&gt;
&lt;P&gt;Enter User Password and the Remote Access VPN should work.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bildschirmfoto 2023-05-29 um 23.20.36.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21128i571C872611542DAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2023-05-29 um 23.20.36.png" alt="Bildschirmfoto 2023-05-29 um 23.20.36.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;7) Connected&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bildschirmfoto 2023-05-29 um 23.48.37.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21130iC594367CB4E8C432/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2023-05-29 um 23.48.37.png" alt="Bildschirmfoto 2023-05-29 um 23.48.37.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Log Output - /var/log/syslog&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;May 29 23:20:21 strongswan charon-nm: 00[DMN] Starting charon NetworkManager backend (strongSwan 5.9.5)
May 29 23:20:21 strongswan charon-nm: 00[CFG] PKCS11 module '&amp;lt;name&amp;gt;' lacks library path
May 29 23:20:21 strongswan charon-nm: 00[PTS] TPM 2.0 - could not load "libtss2-tcti-tabrmd.so.0"
May 29 23:20:21 strongswan charon-nm: 00[LIB] plugin 'tpm': failed to load - tpm_plugin_create returned NULL
May 29 23:20:21 strongswan charon-nm: 00[LIB] providers loaded by OpenSSL: legacy default
May 29 23:20:21 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395221.6499] manager: (tun0): new Tun device (/org/freedesktop/NetworkManager/Devices/4)
May 29 23:20:21 strongswan charon-nm: 00[LIB] created TUN device: tun0
May 29 23:20:21 strongswan systemd-udevd[4704]: Using default interface naming scheme 'v249'.
May 29 23:20:21 strongswan charon-nm: 00[CFG] loaded 0 RADIUS server configurations
May 29 23:20:21 strongswan charon-nm: 00[NET] using forecast interface ens160
May 29 23:20:21 strongswan charon-nm: 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
May 29 23:20:21 strongswan charon-nm: 00[CFG] HA config misses local/remote address
May 29 23:20:21 strongswan charon-nm: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
May 29 23:20:21 strongswan charon-nm: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
May 29 23:20:21 strongswan charon-nm: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
May 29 23:20:21 strongswan charon-nm: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
May 29 23:20:21 strongswan charon-nm: 00[CFG] loading crls from '/etc/ipsec.d/crls'
May 29 23:20:21 strongswan charon-nm: 00[CFG] loading secrets from '/etc/ipsec.secrets'
May 29 23:20:21 strongswan charon-nm: 00[LIB] dropped capabilities, running as uid 0, gid 0
May 29 23:20:21 strongswan charon-nm: 00[JOB] spawning 16 worker threads
May 29 23:21:53 strongswan charon-nm: 05[CFG] received initiate for NetworkManager connection Home - IPSec
May 29 23:21:53 strongswan charon-nm: 05[CFG] using gateway identity '192.168.0.1'
May 29 23:21:53 strongswan charon-nm: 05[IKE] initiating IKE_SA Home - IPSec[1] to 10.34.103.98
May 29 23:21:53 strongswan charon-nm: 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) V ]
May 29 23:21:53 strongswan charon-nm: 05[NET] sending packet: from 10.34.103.200[55399] to 10.34.103.98[500] (484 bytes)
May 29 23:21:53 strongswan charon-nm: 13[NET] received packet: from 10.34.103.98[500] to 10.34.103.200[55399] (633 bytes)
May 29 23:21:53 strongswan charon-nm: 13[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_S_IP) N(NATD_S_IP) N(NATD_S_IP) N(NATD_S_IP) N(NATD_S_IP) N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
May 29 23:21:53 strongswan charon-nm: 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
May 29 23:21:53 strongswan charon-nm: 13[IKE] local host is behind NAT, sending keep alives
May 29 23:21:53 strongswan charon-nm: 13[IKE] received cert request for "O=home-fw..22erwk"
May 29 23:21:53 strongswan charon-nm: 13[IKE] received 1 cert requests for an unknown ca
May 29 23:21:53 strongswan charon-nm: 13[IKE] sending cert request for "O=home-fw..22erwk"
May 29 23:21:53 strongswan charon-nm: 13[IKE] establishing CHILD_SA Home - IPSec{1}
May 29 23:21:53 strongswan charon-nm: 13[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr CPRQ(ADDR ADDR6 DNS NBNS DNS6 DNS DNS6) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
May 29 23:21:53 strongswan charon-nm: 13[NET] sending packet: from 10.34.103.200[58460] to 10.34.103.98[4500] (368 bytes)
May 29 23:21:53 strongswan charon-nm: 16[NET] received packet: from 10.34.103.98[4500] to 10.34.103.200[58460] (1008 bytes)
May 29 23:21:53 strongswan charon-nm: 16[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
May 29 23:21:53 strongswan charon-nm: 16[IKE] received end entity cert "O=home-fw..22erwk, CN=home-fw VPN Certificate"
May 29 23:21:53 strongswan charon-nm: 16[CFG]   using certificate "O=home-fw..22erwk, CN=home-fw VPN Certificate"
May 29 23:21:53 strongswan charon-nm: 16[CFG]   using trusted ca certificate "O=home-fw..22erwk"
May 29 23:21:53 strongswan charon-nm: 16[CFG]   reached self-signed root ca with a path length of 0
May 29 23:21:53 strongswan charon-nm: 16[CFG] checking certificate status of "O=home-fw..22erwk, CN=home-fw VPN Certificate"
May 29 23:21:53 strongswan charon-nm: 16[CFG]   fetching crl from 'O=home-fw..22erwk, CN=ICA_CRL11' ...
May 29 23:21:53 strongswan charon-nm: 16[LIB] unable to fetch from O=home-fw..22erwk, CN=ICA_CRL11, no capable fetcher found
May 29 23:21:53 strongswan charon-nm: 16[CFG] crl fetching failed
May 29 23:21:53 strongswan charon-nm: 16[CFG]   fetching crl from 'http://home-fw.example.de:18264/ICA_CRL11.crl' ...
May 29 23:21:53 strongswan charon-nm: 16[LIB] libcurl request failed [6]: Could not resolve host: home-fw.example.de
May 29 23:21:53 strongswan charon-nm: 16[CFG] crl fetching failed
May 29 23:21:53 strongswan charon-nm: 16[CFG] certificate status is not available
May 29 23:21:53 strongswan charon-nm: 16[IKE] authentication of '192.168.0.1' with RSA signature successful
May 29 23:21:53 strongswan charon-nm: 16[IKE] server requested EAP_IDENTITY (id 0xD4), sending 'vpn_soeren'
May 29 23:21:53 strongswan charon-nm: 16[ENC] generating IKE_AUTH request 2 [ EAP/RES/ID ]
May 29 23:21:53 strongswan charon-nm: 16[NET] sending packet: from 10.34.103.200[58460] to 10.34.103.98[4500] (96 bytes)
May 29 23:21:53 strongswan charon-nm: 07[NET] received packet: from 10.34.103.98[4500] to 10.34.103.200[58460] (80 bytes)
May 29 23:21:53 strongswan charon-nm: 07[ENC] parsed IKE_AUTH response 2 [ EAP/REQ/GTC ]
May 29 23:21:53 strongswan charon-nm: 07[IKE] server requested EAP_GTC authentication (id 0xD5)
May 29 23:21:53 strongswan charon-nm: 07[ENC] generating IKE_AUTH request 3 [ EAP/RES/GTC ]
May 29 23:21:53 strongswan charon-nm: 07[NET] sending packet: from 10.34.103.200[58460] to 10.34.103.98[4500] (96 bytes)
May 29 23:21:53 strongswan charon-nm: 08[NET] received packet: from 10.34.103.98[4500] to 10.34.103.200[58460] (80 bytes)
May 29 23:21:53 strongswan charon-nm: 08[ENC] parsed IKE_AUTH response 3 [ EAP/SUCC ]
May 29 23:21:53 strongswan charon-nm: 08[IKE] EAP method EAP_GTC succeeded, no MSK established
May 29 23:21:53 strongswan charon-nm: 08[IKE] authentication of 'vpn_soeren' (myself) with EAP
May 29 23:21:53 strongswan charon-nm: 08[ENC] generating IKE_AUTH request 4 [ AUTH ]
May 29 23:21:53 strongswan charon-nm: 08[NET] sending packet: from 10.34.103.200[58460] to 10.34.103.98[4500] (112 bytes)
May 29 23:21:54 strongswan charon-nm: 09[NET] received packet: from 10.34.103.98[4500] to 10.34.103.200[58460] (400 bytes)
May 29 23:21:54 strongswan charon-nm: 09[ENC] parsed IKE_AUTH response 4 [ AUTH N(CRASH_DET) CPRP(ADDR DNS DNS) SA TSi TSr N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) ]
May 29 23:21:54 strongswan charon-nm: 09[IKE] authentication of '192.168.0.1' with EAP successful
May 29 23:21:54 strongswan charon-nm: 09[IKE] IKE_SA Home - IPSec[1] established between 10.34.103.200[vpn_soeren]...10.34.103.98[192.168.0.1]
May 29 23:21:54 strongswan charon-nm: 09[IKE] scheduling rekeying in 35812s
May 29 23:21:54 strongswan charon-nm: 09[IKE] maximum IKE_SA lifetime 36412s
May 29 23:21:54 strongswan charon-nm: 09[IKE] installing DNS server 192.168.0.31 via resolvconf
May 29 23:21:54 strongswan charon-nm: 09[IKE] installing new virtual IP 192.168.1.168
May 29 23:21:54 strongswan avahi-daemon[808]: Registering new address record for 192.168.1.168 on ens160.IPv4.
May 29 23:21:54 strongswan charon: 10[KNL] 192.168.1.168 appeared on ens160
May 29 23:21:54 strongswan charon-nm: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
May 29 23:21:54 strongswan charon-nm: 09[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
May 29 23:21:54 strongswan charon-nm: 09[IKE] CHILD_SA Home - IPSec{1} established with SPIs c0040ebd_i c0417c77_o and TS 192.168.1.168/32 === 10.34.103.1/32 10.34.103.98/32 172.18.0.1/32 192.168.0.0/24 192.168.2.0/24 192.168.4.1/32 192.168.207.0/24 192.168.222.1/32
May 29 23:21:54 strongswan charon: 15[KNL] interface tun0 activated
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8189] device (tun0): state change: unmanaged -&amp;gt; unavailable (reason 'connection-assumed', sys-iface-state: 'external')
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8199] device (tun0): state change: unavailable -&amp;gt; disconnected (reason 'connection-assumed', sys-iface-state: 'external')
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8204] device (tun0): Activation: starting connection 'tun0' (7e91075e-00b4-41ab-aea7-512e0a3ffc19)
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8207] device (tun0): state change: disconnected -&amp;gt; prepare (reason 'none', sys-iface-state: 'external')
May 29 23:21:54 strongswan charon: 12[KNL] fe80::5047:48eb:aeb1:877e appeared on tun0
May 29 23:21:54 strongswan charon: 08[KNL] 192.168.1.168 appeared on tun0
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8212] device (tun0): state change: prepare -&amp;gt; config (reason 'none', sys-iface-state: 'external')
May 29 23:21:54 strongswan dbus-daemon[809]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.3' (uid=0 pid=811 comm="/usr/sbin/NetworkManager --no-daemon " label="unconfined")
May 29 23:21:54 strongswan systemd[1]: Starting Network Manager Script Dispatcher Service...
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8259] device (tun0): state change: config -&amp;gt; ip-config (reason 'none', sys-iface-state: 'external')
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8264] device (tun0): state change: ip-config -&amp;gt; ip-check (reason 'none', sys-iface-state: 'external')
May 29 23:21:54 strongswan charon-nm: 10[KNL] interface tun0 activated
May 29 23:21:54 strongswan dbus-daemon[809]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
May 29 23:21:54 strongswan systemd[1]: Started Network Manager Script Dispatcher Service.
May 29 23:21:54 strongswan charon-nm: 14[KNL] fe80::5047:48eb:aeb1:877e appeared on tun0
May 29 23:21:54 strongswan charon-nm: 06[KNL] 192.168.1.168 appeared on tun0
May 29 23:21:54 strongswan systemd-resolved[629]: ens160: Bus client set default route setting: no
May 29 23:21:54 strongswan systemd-resolved[629]: ens160: Bus client reset DNS server list.
May 29 23:21:54 strongswan systemd-resolved[629]: tun0: Bus client set default route setting: yes
May 29 23:21:54 strongswan systemd-resolved[629]: tun0: Bus client set DNS server list to: 192.168.0.21
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8421] device (tun0): state change: ip-check -&amp;gt; secondaries (reason 'none', sys-iface-state: 'external')
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8430] device (tun0): state change: secondaries -&amp;gt; activated (reason 'none', sys-iface-state: 'external')
May 29 23:21:54 strongswan NetworkManager[811]: &amp;lt;info&amp;gt;  [1685395314.8446] device (tun0): Activation: successful, device activated.
May 29 23:21:54 strongswan charon: 13[NET] using forecast interface ens160
May 29 23:21:54 strongswan charon: 13[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
May 29 23:21:54 strongswan charon-nm: 16[NET] using forecast interface ens160
May 29 23:21:54 strongswan charon-nm: 16[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
May 29 23:22:04 strongswan systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully.
May 29 23:22:29 strongswan charon-nm: 16[IKE] sending keep alive to 10.34.103.98[4500]
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Troubleshooting&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Linux Client:

Check /var/log/syslog for any issues.&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Example:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is my ipsec.conf and strongswan.conf.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;/etc/ipsec.conf&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;You don't need this file for the Network Manager to work&lt;/FONT&gt;. This is only an example for the CLI connect and for comparison with the values I entered into the Network Manager GUI above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;# ipsec.conf - strongSwan IPsec configuration file

# basic configuration

config setup
	# strictcrlpolicy=yes
	# uniqueids = no

# Add connections here.
conn home
	auto=add
	type=tunnel
	leftfirewall=yes
	rightauth=pubkey
	leftauth=eap-gtc
	keyexchange=ikev2
	eap_identity=install
	left=%any
	leftsourceip=%config
	right=10.34.103.98
	rightid=192.168.0.1
	rightsubnet=0.0.0.0/0
	ike=aes256-sha256-modp2048
	esp=aes128-sha256
	ikelifetime=8h
	lifetime=1h
	reauth=yes
	rekey=yes
	margintime=1m
	rekeyfuzz=50%
	dpdaction=restart
	dpddelay=30s
	dpdtimeout=60s&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;/etc/strongswan.conf&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;There are two sections, &lt;STRONG&gt;charon-nm&lt;/STRONG&gt; is used by the Network Manager und &lt;STRONG&gt;charon&lt;/STRONG&gt; is used for the CLI. For Network Manager to work, you only need &lt;STRONG&gt;charon-nm &lt;/STRONG&gt;section.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;# strongswan.conf - strongSwan configuration file
#
# Refer to the strongswan.conf(5) manpage for details
#
# Configuration changes should be made in the included files


charon-nm {
        load_modular = yes
        send_vendor_id = yes
        plugins {
                include strongswan.d/charon/*.conf
                attr {
                    dns = 192.168.0.21, 192.168.0.31
                }
        }

}

charon {
  	load_modular = yes
  	send_vendor_id = yes
  	plugins {
    		include strongswan.d/charon/*.conf
		attr {
	            dns = 192.168.0.21, 192.168.0.31
        	}
  	}

}
include strongswan.d/*.conf&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 18:59:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/182449#M4900</guid>
      <dc:creator>Sören</dc:creator>
      <dc:date>2023-06-28T18:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/182457#M4901</link>
      <description>&lt;P&gt;Wow, very informative, thanks for sharing &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 00:06:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/182457#M4901</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-30T00:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/184903#M4902</link>
      <description>&lt;P&gt;Hi Sören,&lt;/P&gt;&lt;P&gt;thanks for the instructions!&lt;BR /&gt;Following this we were able to successfully connect to our firewall, but the connections only work for 15 minutes.&lt;/P&gt;&lt;P&gt;This 15 minute interval coincides exactly with the time for the dhcp leases for the machines. (We are using the option to assign Office Mode IPs automatically using a Windows DHCP Server).&lt;BR /&gt;After the 15 minutes the client still tries to send traffic using the vpn connection, but the firewall logs an encryption failure for every connection: "According to the policy the packet should not have been decrypted"&lt;/P&gt;&lt;P&gt;If we assign the IPs via usage of the ipassignment.conf, the connections last for nearly three hours, but still disconnect after that.&lt;/P&gt;&lt;P&gt;Have you experienced similar problems? How do you assign Office Mode IPs?&lt;/P&gt;&lt;P&gt;Thank you&lt;BR /&gt;Björn&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 08:33:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/184903#M4902</guid>
      <dc:creator>BS</dc:creator>
      <dc:date>2023-06-27T08:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/185031#M4903</link>
      <description>&lt;P&gt;I tried to replicate the issue and it happened to me too. In my setup I also use a DCHP server to get an Office Mode IP Address. The connection was established at 07:55 am and it stopped working at 10:42 am, almost 3 hours later.&lt;/P&gt;
&lt;P&gt;I will debug this issue and I will post my results later on.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 13:06:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/185031#M4903</guid>
      <dc:creator>Sören</dc:creator>
      <dc:date>2023-06-28T13:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/185085#M4905</link>
      <description>&lt;P&gt;Please try "Enforce UDP Encapsulation". In my lab setup it worked using this option.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bildschirmfoto 2023-06-28 um 18.10.08.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21559i50D8F78F4565FA2E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2023-06-28 um 18.10.08.png" alt="Bildschirmfoto 2023-06-28 um 18.10.08.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 18:55:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/185085#M4905</guid>
      <dc:creator>Sören</dc:creator>
      <dc:date>2023-06-28T18:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/191735#M4906</link>
      <description>&lt;P&gt;Wow this was a great help.&lt;/P&gt;&lt;P&gt;I am running R81.20 and Linux Mint 21.2 Cinnamon.&lt;/P&gt;&lt;P&gt;Network manager is the way to go on Linux and VPN to Check Point.&lt;/P&gt;&lt;P&gt;I also managed to get 2FA working by selecting RADIUS as a authentication method on R81.20 gateway.&lt;/P&gt;&lt;P&gt;Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 14:45:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/191735#M4906</guid>
      <dc:creator>Hogni_av_Reyni</dc:creator>
      <dc:date>2023-09-06T14:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/209306#M4907</link>
      <description>&lt;P&gt;This is a great guide, however my CHeckpoint is dropping my connecitons because it's using IKEv2. ANy guidance? I've tried my best to find an easy guide on getting StrongSwan to work on my Ubuntu laptop with no luck (using Certificate auth)&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 17:41:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/209306#M4907</guid>
      <dc:creator>bwaller-sp</dc:creator>
      <dc:date>2024-03-20T17:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/209320#M4908</link>
      <description>&lt;P&gt;Which Check Point version do you use?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Did you follow the steps described here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/strongSwan-Client-Support.htm?Highlight=StrongSwan" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/strongSwan-Client-Support.htm?Highlight=StrongSwan&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;IKEv2 is fine and should work.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 21:56:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/209320#M4908</guid>
      <dc:creator>Sören</dc:creator>
      <dc:date>2024-03-20T21:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/216027#M4909</link>
      <description>&lt;P&gt;Have this solution support for connect Ubuntu Linux 2FA with OTP token get from the&amp;nbsp;&lt;SPAN&gt;FortiToken mobile auth application.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;My team uses Checkpoint Remote Access Client&amp;nbsp;&lt;SPAN&gt;entering the username/password -&amp;gt; connecting and response -&amp;gt; enters OTP token get from&amp;nbsp;FortiToken&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;But I config as tutorial &lt;STRONG&gt;IPSec/IKEv2 (strongSwan)&amp;nbsp;&lt;/STRONG&gt;not work, and I don't see how to input&amp;nbsp;&lt;SPAN&gt;OTP token&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 08:02:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/216027#M4909</guid>
      <dc:creator>nguyentthai96</dc:creator>
      <dc:date>2024-06-01T08:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/219461#M4910</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please check the the following doc: &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/strongSwan-Client-Support.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/strongSwan-Client-Support.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The 2FA is not supported with Strongswan.&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 15:47:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/219461#M4910</guid>
      <dc:creator>Oryx</dc:creator>
      <dc:date>2024-07-02T15:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/219463#M4911</link>
      <description>&lt;P&gt;MFA only works if you enter the token code + password at the same time, such as "123456Password" as your password.&lt;BR /&gt;&lt;BR /&gt;In my lab I use a FreeIPA server with password and token authentication, connected to my Check Point Firewall via LDAP. It should also work when using RSA for example.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:42:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/219463#M4911</guid>
      <dc:creator>Sören</dc:creator>
      <dc:date>2024-07-02T17:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/219528#M4912</link>
      <description>&lt;P&gt;Hi Soren,&lt;/P&gt;&lt;P&gt;I'm aware that works, I'm just saying that is not supported.&lt;/P&gt;&lt;P&gt;From a partner point of view that is something worth to consider when you try to deploy something. It's always what I say to my end customers. If you are willing to deal with all the issues of being on your own, then it's ok. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 09:44:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/219528#M4912</guid>
      <dc:creator>Oryx</dc:creator>
      <dc:date>2024-07-03T09:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/257938#M4913</link>
      <description>&lt;P&gt;Brilliant guide, thanks very much.&lt;BR /&gt;&lt;BR /&gt;I have managed to install it, but have not yet tested it.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 18:14:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/257938#M4913</guid>
      <dc:creator>JKsep2</dc:creator>
      <dc:date>2025-09-22T18:14:50Z</dc:date>
    </item>
    <item>
      <title>Re: strongSwan - GUI - Network Manager - Username / Password</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/269813#M4914</link>
      <description>&lt;P&gt;Good work guys, please is there any possibility of making this work with cockpit?&lt;/P&gt;&lt;P&gt;I'm running the core version of Ubuntu without GUI, unfortunately when I try the "Add VPN" option under Networking using cockpit, it prompted me to install wireguard-tool instead.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advise?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2026 16:55:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/strongSwan-GUI-Network-Manager-Username-Password/m-p/269813#M4914</guid>
      <dc:creator>dofcd</dc:creator>
      <dc:date>2026-02-05T16:55:41Z</dc:date>
    </item>
  </channel>
</rss>

