[Openswan Users] XAUTH problem
Dave Vree
mailing51 at hotmail.com
Mon Sep 22 21:06:47 EDT 2008
I had EXACTLY this same problem, except with a Sonicwall 4100. I posted
the question and got the answer a couple weeks back.
I got past it by adding "aggrmode=yes" to my connection definition.
Here's a few other things I did:
a) Named the leftid "GroupVPN" -- if I name the leftID anything else,
sonicwall won't connect...and yes I changed it in the secrets files too.
b) Took out leftsubnet in config file...not needed....leftIP/32 is default
c) Took out interfaces= in config file...not needed with netkey which is
default in Ubuntu with its 2.6 kernel
d) Took RSA line out of secrets file
e) left=%defaultroute
f) Took out xauth=yes as is no longer used
(http://readlist.com/lists/openswan.org/users/0/622.html)
g) CRITICAL: Go into the Sonicwall configuration utility and set the
following: VPN -> Settings -> GroupVPN configure -> Client tab->"Virtual
Adapter Settings" from "DHCP lease" to "DHCP lease or Manual Configuration"
Here is my config:
version 2.0 # conforms to second version of ipsec.conf specification
config setup
nat_traversal=yes
nhelpers=0
conn SonicWallOffice
type=tunnel # Needed for host-to-subnet
left=%defaultroute # this computer's external internet address
leftid=@GroupVPN # Can't be anything...needed to be this for Sonicwall
leftxauthclient=yes # Indicates the left side asks to be xauth authenticated
right= XX.YY.ZZ.AA # WAN IP address of SonicWALL
rightsubnet= 192.168.253.1/24 # Destination network (usually LAN subnet
of SonicWALL)
rightid=@blahblahblah # Peer ID - SonicWALL’s Unique Firewall Identifier
rightxauthserver=yes # Indicates the right side does the xauth
authentication
keyingtries=0 # Number of times ipsec should try to obtain a key 0=infinite
keyexchange=ike # This is the default (and only) value, here for
completeness
pfs=no # Perfect Forward Secrecy, default=yes (?????? why no)
auto=add # authorizes but doesn't start this connection at startup
auth=esp # Authenticate over ESP protocol (the default) as opposed to AH
esp=3des-md5 # ????????????? IKE Phase II Settings????
ike=3des-md5-modp1024 # ????????????? IKE Phase I Settings??? -modp1024
= DH group 2
authby=secret # Authenticate By - Preshared Secret (needed for sonicwall)
aggrmode=yes # Aggressive Mode Phase 1 negotiations (requires use of IKE)
include /etc/ipsec.d/examples/no_oe.conf
_________________________________________________________________
See how Windows connects the people, information, and fun that are part of your life.
http://clk.atdmt.com/MRT/go/msnnkwxp1020093175mrt/direct/01/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20080922/4f66b694/attachment.html
More information about the Users
mailing list