I'm looking for an expert in VPN configuration, particularly with StrongSwan, to set up a site-to-site connection on my CentOS Linux server. The VPN will be configured on a Linux operating system and the primary purpose is to establish a secure connection between two sites.
I tried following configuration but faced issues as detailed below
VPN Server side
$ cat /etc/strongswan/[login to view URL]
config setup
charondebug="ike 2, knl 2, cfg 2, net 2, esp 2, dmn 2, mgr 2"
strictcrlpolicy=no
uniqueids=no
conn ictbroadcast-vpn
auto=add
compress=no
type=tunnel # defines the type of connection, tunnel
keyexchange=ikev2
fragmentation=yes
forceencaps=yes
dpdaction=clear
dpddelay=300s
rekey=no
left=%any
leftid= [login to view URL]
leftcert=[login to view URL] # reads the VPN server cert in /etc/strongswan/ipsec.d/certs
leftsendcert=always
leftsubnet=[login to view URL]
right=%any
rightid=%any
rightauth=eap-mschapv2
rightsourceip=[login to view URL]
rightdns=[login to view URL],8.8.8.8 #DNS to be assigned to clients
rightsendcert=never
eap_identity=%identity # defines the identity the client uses to reply to an EAP Identity request.
ike=aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024!
esp=aes128gcm16-ecp256,aes256gcm16-ecp384,aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024,aes128gcm16,aes256gcm16,aes128-sha256,aes128-sha1,aes256-sha384,aes256-sha256,aes256-sha1!
VPN Client side
$ cat /etc/strongswan/[login to view URL]
config setup
# strictcrlpolicy=yes
# uniqueids = no
conn ictbroadcast-vpn
right=[login to view URL]
rightid= [login to view URL] # This should match the `leftid` value on your server's configuration
rightsubnet=[login to view URL]
rightauth=pubkey
leftsourceip=%config
leftid=vpnsecure
leftauth=eap-mschapv2
leftcacert=[login to view URL]
eap_identity=%identity
auto=start
$ strongswan status
Security Associations (0 up, 1 connecting):
ictbroadcast-vpn[1]: CONNECTING, [login to view URL][%any]...[login to view URL][%any]
it's try to connect but connectivity failed
Please ensure you're able to configure, test and provide documentation of the VPN setup.
Please implement IKEv2/IPsec protocol for the VPN configuration. Please troubleshoot the described issue with the configuration.