IPSEC Road Warrior randomly works…
-
Here's the log from two connection attempts, one from a directly connected to internet laptop win7 with shrew client, the other from a win7 shrew client pc behind a pfsense box running 1.2.3-rc1. I had to disable NAT-T to get either to connect, shouldn't that be required for the pfsense client? The funny thing is both log's are the same!
Works:
Sep 6 12:39:28 racoon: [Unknown Gateway/Dynamic]: ERROR: such policy does not already exist: "192.168.0.0/24[0] 69.145.x.x/32[0] proto=any dir=out"
Sep 6 12:39:28 racoon: [Unknown Gateway/Dynamic]: ERROR: such policy does not already exist: "69.145.x.x/32[0] 192.168.0.0/24[0] proto=any dir=in"
Sep 6 12:39:28 racoon: [Unknown Gateway/Dynamic]: INFO: IPsec-SA established: ESP 216.67.x.x[500]->69.145.x.x[500] spi=3129556591(0xba893e6f)
Sep 6 12:39:28 racoon: [Unknown Gateway/Dynamic]: INFO: IPsec-SA established: ESP 69.145.x.x[0]->216.67.x.x[0] spi=254951700(0xf324114)
Sep 6 12:39:28 racoon: [Unknown Gateway/Dynamic]: INFO: no policy found, try to generate the policy : 69.145.x.x/32[0] 192.168.0.0/24[0] proto=any dir=in
Sep 6 12:39:28 racoon: [Unknown Gateway/Dynamic]: INFO: respond new phase 2 negotiation: 216.67.x.x[500]<=>69.145.x.x[500]
Sep 6 12:39:28 racoon: INFO: generated policy, deleting it.
Sep 6 12:39:28 racoon: [Unknown Gateway/Dynamic]: INFO: ISAKMP-SA established 216.67.x[500]-69.145.x.x[500] spi:198705ee906fabba:730c28bf8cd9ae4e
Sep 6 12:39:27 racoon: INFO: received Vendor ID: CISCO-UNITY
Sep 6 12:39:27 racoon: INFO: received Vendor ID: RFC 3947
Sep 6 12:39:27 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
Sep 6 12:39:27 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
Sep 6 12:39:27 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-01
Sep 6 12:39:27 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
Sep 6 12:39:27 racoon: INFO: begin Aggressive mode.
Sep 6 12:39:27 racoon: [Unknown Gateway/Dynamic]: INFO: respond new phase 1 negotiation: 216.67.x.x[500]<=>69.145.x.x[500]Doesn't work:
Sep 6 12:40:51 racoon: [Unknown Gateway/Dynamic]: ERROR: such policy does not already exist: "192.168.0.0/24[0] 10.54.25.3/32[0] proto=any dir=out"
Sep 6 12:40:51 racoon: [Unknown Gateway/Dynamic]: ERROR: such policy does not already exist: "10.54.25.3/32[0] 192.168.0.0/24[0] proto=any dir=in"
Sep 6 12:40:51 racoon: [Unknown Gateway/Dynamic]: INFO: IPsec-SA established: ESP 216.67.x.x[500]->69.145.x.x[49036] spi=3626258225(0xd8244f31)
Sep 6 12:40:51 racoon: [Unknown Gateway/Dynamic]: INFO: IPsec-SA established: ESP 69.145.x.x[0]->216.67.x.x[0] spi=100369758(0x5fb855e)
Sep 6 12:40:51 racoon: [Unknown Gateway/Dynamic]: INFO: no policy found, try to generate the policy : 10.54.25.3/32[0] 192.168.0.0/24[0] proto=any dir=in
Sep 6 12:40:51 racoon: [Unknown Gateway/Dynamic]: INFO: respond new phase 2 negotiation: 216.67.x.x[500]<=>69.145.x.x[49036]
Sep 6 12:40:51 racoon: INFO: generated policy, deleting it.
Sep 6 12:40:51 racoon: [Unknown Gateway/Dynamic]: INFO: ISAKMP-SA established 216.67.x.x[500]-69.145.x.x[49036] spi:332d086c6d1b1fab:6b2a4e44c140fb5a
Sep 6 12:40:50 racoon: INFO: received Vendor ID: CISCO-UNITY
Sep 6 12:40:50 racoon: INFO: received Vendor ID: RFC 3947
Sep 6 12:40:50 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
Sep 6 12:40:50 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
Sep 6 12:40:50 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-01
Sep 6 12:40:50 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
Sep 6 12:40:50 racoon: INFO: begin Aggressive mode.
Sep 6 12:40:50 racoon: [Unknown Gateway/Dynamic]: INFO: respond new phase 1 negotiation: 216.67.x.x[500]<=>69.145.x.x[49036] -
I got it working, most clients can connect some can't due to their firewalls. I've verified IPSEC passthrough is enabled but that doesn't matter. I've tried to enable NAT-T but then nothing works. It breaks IPSEC completely on the pfsense box.
Also, the ones that do work require me to set static dns, if I enter the dns servers on the DNS tab of the shrew client it doesn't work at all. Any thoughts? When will there be a solid road warrior implementation of IPSEC? Will there be or is OpenVPN expected to replace it?