IPsec VPN to Sonicwall NSA 2400
-
Sonicwall first.
Click VPN
Name can be anything.
Network tab same window.
You will need to create a new network object, mine is called SLSC.Net. Make it a network object and put in your pFSense Local Subnet ie 10.10.10.0 255.255.255.0
Proposals tab same vpn window. Make everything exactly as you see here. Be sure to check Perfect Forward Secrecy and use GP2
Advanced tab same vpn window. Click ok when done with this step.
pFSense Setup side.
Create new vpn.
Phase 1 PF. Make sure you add the 28800 also.
Phase 2 PF. Be sure to uncheck everything not checked in the picture.
Click Preshared Keys and add a new one. YOURKEY is the same as the tunnels preshared key. IP is the IP of the PFSENSE you are currently on, same as wan address. ie 24.111.111.111 is public of the pF box then put that in there. This identifies to the sonicwall.
Lastly add firewall rules in PF to allow traffix via IPSEC.
Any questions post em. This works for sure I have 8 sonicwalls connected to my main pF. Including a NSA 2400.
Kyle
-
Well, I have followed your directions to a T. There are some subtle difference in the SonicWall setup, namely the General Tab of the VPN policy. I have an extra drop down box that allows me to select Site to Site or Tunnel. I used both, but Tunnel Interface doesn't give me the 'Network' Tab. So Site-to-Site it is. I am running SonicOS Enhanced 5.5.1.0-5o.
Using Aggressive Mode the tunnel never becomes active. However as soon as I switch to Main mode it comes up. Still no traffic though. One thing I thought was strange was the Address Object created in the SonicWall for the Remote Location has a Zone assignment of LAN rather than VPN. I tried it with both with no success.
Here is the IPsec Log from the pfSense box
Apr 29 03:03:44 racoon: [First Church]: INFO: IPsec-SA established: ESP X.X.X.X[0]->X.X.X.X[0] spi=3462423859(0xce606533)
Apr 29 03:03:44 racoon: [First Church]: INFO: IPsec-SA established: ESP X.X.X.X[0]->X.X.X.X[0] spi=137167584(0x82d02e0)
Apr 29 03:03:44 racoon: [First Church]: INFO: respond new phase 2 negotiation: X.X.X.X[0]<=>X.X.X.X[0]Here is the VPN IKE log from the SonicWall
16:03:43.896 Info VPN IKE IKE negotiation complete. Adding IPSec SA. (Phase 2) X.X.X.X, 500 X.X.X.X, 500 VPN Policy: TBOL; ESP:3DES; HMAC_SHA1; Group 2; Lifetime=28800 secs; inSPI:0xce606533; outSPI:0x82d02e0
16:03:43.896 Info VPN IKE IKE Initiator: Accepting IPSec proposal (Phase 2) X.X.X.X, 500 X.X.X.X, 500 VPN Policy: TBOL; Local network 192.168.99.0 / 255.255.255.0; Remote network 10.10.11.0/255.255.255.0
16:03:43.816 Info VPN IKE IKE Initiator: Start Quick Mode (Phase 2). X.X.X.X, 500 X.X.X.X, 500 VPN Policy: TBOLIt appears to me as though the tunnel is up. So I must have something configured incorrectly in the firewall rules. Am I correct in thinking I should be able to ping a local device on the remote subnet (10.10.11.10, for instance) from a LAN subnet on the SonicWall (192.168.99.X)?
Thanks
-
switch back to aggressive. then from sw lan 192.x ping the pf lan ip 10.x. give it a packet or two and it will make the tunnel come up. try that. let me know.
-
also my network address object is in zone lan.
firewall rules are auto added on sw.
-
well get it working?
-
The tunnel is up with aggressive mode and have a set the Address object to LAN. However, no traffic is being passed yet. I continue to get this message in the SW:
Notice VPN IPSec IPSec (ESP) packet dropped xxx.xxx.xxx.xxx (remote public ip), 0, X1 xxx.xxx.xxx.xxx (local Public IP) Inbound: SeqNum=65578, SPI=0x8004D31Here are some screen shots to show the tunnel is active and the firewall rule that I was able to find.
-
Did you guys end up finding a solution to this? I am having the exact same problem. My tunnel appears to be active, but no traffic is passing through, and I am seeing IPSec (ESP) packet dropped on the Sonicwall in the logs.
-
No, no luck even after all this time. I have successfully used VPN IPsec over two pfGuards though. Setup was nearly identical to this. I believe there is some strange Sonicwall rule blocking things.
Their technical support simply tells me to upgrade to the latest firmware as the existing firmware has 'VPN issues' I have done this on two different occasions but it didn't change anything. -
Wow, well that's terrible news. Thanks a lot for the quick response. I'm going to try upgrading my firmware (if there is an upgrade available) and see what happens. I'll let you know if I have any success.
-
Still no luck. I am running 5.6.0.5-46o on the SW. The tunnel is active however no traffic is passed. Still getting dropped packets on the SW.
12/16/2010 11:55:15.256 Notice VPN IPSec IPSec (ESP) packet dropped xxx.xxx.xxx.xxx, 0, X1 xxx.xxx.xxx.xxx Inbound: SeqNum=1446931972, SPI=0x4D32000
When I hover over the log record I get 'Message id: 533 Legacy Category: Network Access'
Any luck on your end?