[Openswan Users] Trying to connect OpenSwan to SonicWall.
Rick Knight
rick_knight at rlknight.com
Fri Jun 15 12:43:39 EDT 2007
Aaron, thanks for your reply.
I need to use Xauth for authentication, it's in the policy and I can't
change that. Also, my SonicWall is configured for 3DES and SHA1 so
that's what I have in my ipsec.conf. One thing I'm wondering about
though is the name of the VPN Policy. Do I need to match this in my
ipsec.conf file? Whoever set up the SonicWall and configured the VPN
policies, put spaces in the name. Instead of "GroupVPN", we have "WAN
GroupVPN". I have not been able to get my secrets file to work with the
later.Could that be causing problems.
Also, where can I find your article?
Thanks,
Rick Knight
Aaron Kincer wrote:
> Make sure your encryption settings on your Sonicwall match what you are
> using here. Also, make sure you have turned of XAUTH for your
> GroupVPN. Have
> you read my posting on how I got it working for Sonicwall?
>
> On 6/15/07, Rick Knight <rick_knight at rlknight.com> wrote:
>>
>> I'm trying to establish a connection to a SonicWall 3060 Enhanced
>> firewall using Openswan 2.3. I have several documents describing how to
>> do this, but for some reason I can't make it work. Can someone take a
>> look at my settings and tell me what I've missed or gotten wrong? Below
>> is my ipsec.conf and several lines of output generated when I try to
>> connect.
>>
>> My ipsec.conf
>> # /etc/ipsec.conf - Openswan IPsec configuration file
>> # RCSID $Id: ipsec.conf.in,v 1.15.2.2 2005/11/14 20:10:27 paul Exp $
>>
>> # This file: /usr/share/doc/openswan/ipsec.conf-sample
>> #
>> # Manual: ipsec.conf.5
>>
>>
>> version 2.0 # conforms to second version of ipsec.conf
>> specification
>>
>> # basic configuration
>> config setup
>> # plutodebug / klipsdebug = "all", "none" or a combation from below:
>> # "raw crypt parsing emitting control klips pfkey natt x509 private"
>> # eg:
>> # plutodebug="control parsing"
>> #
>> # Only enable klipsdebug=all if you are a developer
>> #
>> # NAT-TRAVERSAL support, see README.NAT-Traversal
>> nat_traversal=yes
>> # virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12
>>
>> # Add connections here
>>
>> conn sonicwall
>> type=tunnel
>> left=172.16.88.25
>> leftnexthop=172.16.88.2
>> leftsubnet=172.16.88.0/23
>> leftxauthclient=yes
>> leftid=@localID
>> right=x.x.x.x
>> rightsubnet=192.168.0.0/24
>> rightxauthserver=yes
>> rightid=@uniqueID
>> keyingtries=0
>> pfs=no
>> aggrmode=no
>> auto=add
>> auth=esp
>> ike=3des-sha1
>> esp=3des-sha1
>> authby=secret
>> #xauth=yes
>> keyexchange=ike
>>
>> #Disable Opportunistic Encryption
>> #include /etc/ipsec.d/examples/no_oe.conf
>>
>> My ipsec.secrets contains this...
>> @localID @uniqueID : PSK "secret"
>>
>> Output of # ipsec auto --up sonicwall
>> 104 "sonicwall" #2: STATE_MAIN_I1: initiate
>> 003 "sonicwall" #2: ignoring unknown Vendor ID payload
>> [5b362bc820f60001]
>> 003 "sonicwall" #2: received Vendor ID payload
>> [draft-ietf-ipsec-nat-t-ike-03] method set to=108
>> 106 "sonicwall" #2: STATE_MAIN_I2: sent MI2, expecting MR2
>> 003 "sonicwall" #2: ignoring unknown Vendor ID payload
>> [404bf439522ca3f6]
>> 003 "sonicwall" #2: received Vendor ID payload [XAUTH]
>> 003 "sonicwall" #2: received Vendor ID payload [Dead Peer Detection]
>> 003 "sonicwall" #2: NAT-Traversal: Result using
>> draft-ietf-ipsec-nat-t-ike-02/03: i am NATed
>> 108 "sonicwall" #2: STATE_MAIN_I3: sent MI3, expecting MR3
>> 003 "sonicwall" #2: Mode Config message is unacceptable because it is
>> for an incomplete ISAKMP SA (state=STATE_MAIN_I3)
>> 010 "sonicwall" #2: STATE_MAIN_I3: retransmission; will wait 20s for
>> response
>> 004 "sonicwall" #2: STATE_MAIN_I4: ISAKMP SA established
>> {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
>> group=modp1024}
>> 003 "sonicwall" #2: next payload type of ISAKMP Hash Payload has an
>> unknown value: 255
>> 003 "sonicwall" #2: malformed payload in packet
>> 003 "sonicwall" #2: next payload type of ISAKMP Hash Payload has an
>> unknown value: 255
>> 003 "sonicwall" #2: malformed payload in packet
>>
>> Can someone please help me out?
>>
>> Thanks,
>> Rick Knight
>> _______________________________________________
>> Users at openswan.org
>> http://lists.openswan.org/mailman/listinfo/users
>> Building and Integrating Virtual Private Networks with Openswan:
>> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>>
More information about the Users
mailing list