Hi,
thanks for reporting back.
So the remote device wants some crypto your IPFire machine does not know anything about (or has not configured for this connection). Just bumped across this, but that is nothing serious…
This is where the error happens: The customer’s VPN device sends you an IKE authentication packet containing a peer configuration (i. e. which networks should be routed through that IPsec connection) not matching to anything configured on you IPFire machine.
Please ensure the networks configured for this connection are the same on both your and the customers and (as described here). Perhaps there was some Copy & Waste involved when creating an IKEv2 connection… 
Yes:
[root@maverick ~]# ipsec statusall
Status of IKE charon daemon (strongSwan 5.9.2, Linux 5.10.55-ipfire, x86_64):
uptime: x hours, since Aug 30 xx:xx:xx 2021
malloc: sbrk x, mmap 0, used x, free x
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 11
loaded plugins: charon aes des sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp curve25519 chapoly xcbc cmac hmac ctr ccm gcm drbg curl attr kernel-netlink resolve socket-default farp stroke vici updown eap-identity eap-mschapv2 eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-noauth dhcp counters
Listening IP addresses:
10.x.x.x
10.x.x.x
85.x.x.x
Connections:
BRANCHA: %any...x IKEv2, dpddelay=10s
BRANCHA: local: [x] uses public key authentication
BRANCHA: cert: "C=AT, O=ACME, Inc. - Branch A, CN=x"
BRANCHA: remote: [C=BE, O=ACME, Inc. - Branch A, CN=x] uses public key authentication
BRANCHA: cert: "C=BE, O=ACME, Inc. - Branch A, CN=x"
BRANCHA: child: 10.x.x.x/32 === 10.x.x.x/32 TUNNEL, dpdaction=clear
BRANCHB: %any...x IKEv2, dpddelay=10s
BRANCHB: local: [x] uses public key authentication
BRANCHB: cert: "C=AT, O=ACME, Inc. - Branch A, CN=x"
BRANCHB: remote: [x] uses public key authentication
BRANCHB: cert: "C=AT, O=ACME, Inc. - Branch B, CN=x"
BRANCHB: child: 10.x.x.x/24 === 10.x.x.x/24 10.x.x.x/24 TUNNEL, dpdaction=restart
BRANCHC: %any...x IKEv2, dpddelay=10s
BRANCHC: local: [x] uses public key authentication
BRANCHC: cert: "C=AT, O=ACME, Inc. - Branch A, CN=x"
BRANCHC: remote: [x] uses public key authentication
BRANCHC: cert: "C=AT, O=ACME, Inc. - Branch C, CN=x"
BRANCHC: child: 10.x.x.x/24 === 10.x.x.x/24 10.x.x.x/24 TUNNEL, dpdaction=restart
Security Associations (3 up, 0 connecting):
BRANCHC[20]: ESTABLISHED 37 minutes ago, 85.x.x.x[x]...x[x]
BRANCHC[20]: IKEv2 SPIs: 03c14572ca94b3b5_i* cc5d75436a73d38f_r, public key reauthentication in 119 minutes
BRANCHC[20]: IKE proposal: CHACHA20_POLY1305/PRF_HMAC_SHA2_512/CURVE_25519
BRANCHC{62}: INSTALLED, TUNNEL, reqid 2, ESP SPIs: ca9ebe4f_i c6efc783_o
BRANCHC{62}: CHACHA20_POLY1305, 962509 bytes_i (4902 pkts, 0s ago), 1323253 bytes_o (6573 pkts, 0s ago), rekeying in 9 minutes
BRANCHC{62}: 10.x.x.x/24 === 10.x.x.x/24 10.x.x.x/24
BRANCHB[21]: ESTABLISHED 22 minutes ago, 85.x.x.x[x]...x[x]
BRANCHB[21]: IKEv2 SPIs: 0f6add2f8902bd63_i* 30e2ce021a8ecf9f_r, public key reauthentication in 2 hours
BRANCHB[21]: IKE proposal: CHACHA20_POLY1305/PRF_HMAC_SHA2_512/CURVE_25519
BRANCHB{63}: INSTALLED, TUNNEL, reqid 3, ESP SPIs: c9154df6_i cc6400f0_o
BRANCHB{63}: CHACHA20_POLY1305, 0 bytes_i, 0 bytes_o, rekeying in 21 minutes
BRANCHB{63}: 10.x.x.x/24 === 10.x.x.x/24 10.x.x.x/24
BRANCHA[19]: ESTABLISHED 44 minutes ago, 85.x.x.x[x]...x[C=BE, O=ACME, Inc. - Branch A, CN=x]
BRANCHA[19]: IKEv2 SPIs: f7b54aeddf6dd76c_i 4f80de8c4622808d_r*, public key reauthentication in 2 hours
BRANCHA[19]: IKE proposal: AES_GCM_16_256/PRF_HMAC_SHA2_512/CURVE_25519
BRANCHA{61}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: cf8bf933_i c42346ef_o
BRANCHA{61}: AES_GCM_16_256, 9137 bytes_i (122 pkts, 5s ago), 9595 bytes_o (136 pkts, 5s ago), rekeying in 12 seconds
BRANCHA{61}: 10.x.x.x/32 === 10.x.x.x/32
Thanks, and best regards,
Peter Müller