Hello,
i now switched from a XG105 (17.5.15) to a XG106 (18.0.5).
The XG is behind a ISP NAT Device with exposed Host configuration, so Port 4500 and 500 comes trough, i could check that with using the Connect Client on Windows 10.
My Mobile config looks like that:
<plist version="1.0"> <dict> <key>PayloadContent</key> <array> <dict> <key>IPSec</key> <dict> <key>AuthenticationMethod</key> <string>SharedSecret</string> <key>RemoteAddress</key> <string>IPAdress</string> <key>SharedSecret</key> <data>!?EASYKEY!$ #also tried with original long string</data> <key>XAuthEnabled</key> <integer>1</integer> <key>XAuthName</key> <string>username</string> </dict> <key>IPv4</key> <dict> <key>OverridePrimary</key> <integer>0</integer> </dict> <key>PayloadDescription</key> <string>Configures VPN settings, including authentication.</string> <key>PayloadDisplayName</key> <string>Sophos IPSEC settings</string> <key>PayloadIdentifier</key> <string>com.sophos.iphone.profile.vpn1</string> <key>PayloadOrganization</key> <string>Sophos</string> <key>PayloadType</key> <string>com.apple.vpn.managed</string> <key>PayloadUUID</key> <string>3D8B5E8B-FARA-3BG1-B451-AA0A9824A0BF</string> <key>PayloadVersion</key> <integer>1</integer> <key>Proxies</key> <dict/> <key>UserDefinedName</key> <string>IPSEC_Name</string> <key>VPNType</key> <string>IPSec</string> </dict> </array> <key>PayloadDescription</key> <string>Sophos profile for iPhone.</string> <key>PayloadDisplayName</key> <string>Sophos profile</string> <key>PayloadIdentifier</key> <string>com.sophos.iphone.profile</string> <key>PayloadOrganization</key> <string>Sophos</string> <key>PayloadRemovalDisallowed</key> <false/> <key>PayloadType</key> <string>Configuration</string> <key>PayloadUUID</key> <string>C8586117-4FF4-3840-A1D5-52E10AB757BA</string> <key>PayloadVersion</key> <integer>1</integer> </dict> </plist>
IPSec-logs:(when trying to connect from Mobile iOS Device):
2021-04-25 10:47:24 27[NET] <14> received packet: from 80.187.102.14[500] to 192.168.0.16[500] (848 bytes) 2021-04-25 10:47:24 27[ENC] <14> parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ] 2021-04-25 10:47:24 27[IKE] <14> received NAT-T (RFC 3947) vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-08 vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-07 vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-06 vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-05 vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-04 vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-03 vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-02 vendor ID 2021-04-25 10:47:24 27[IKE] <14> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID 2021-04-25 10:47:24 27[IKE] <14> received XAuth vendor ID 2021-04-25 10:47:24 27[IKE] <14> received Cisco Unity vendor ID 2021-04-25 10:47:24 27[IKE] <14> received FRAGMENTATION vendor ID 2021-04-25 10:47:24 27[IKE] <14> received DPD vendor ID 2021-04-25 10:47:24 27[IKE] <14> 80.187.102.14 is initiating a Main Mode IKE_SA 2021-04-25 10:47:24 27[ENC] <14> generating ID_PROT response 0 [ SA V V V V V ] 2021-04-25 10:47:24 27[NET] <14> sending packet: from 192.168.0.16[500] to 80.187.102.14[500] (180 bytes) 2021-04-25 10:47:24 07[NET] <14> received packet: from 80.187.102.14[500] to 192.168.0.16[500] (380 bytes) 2021-04-25 10:47:24 07[ENC] <14> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ] 2021-04-25 10:47:24 07[IKE] <14> local host is behind NAT, sending keep alives 2021-04-25 10:47:24 07[IKE] <14> remote host is behind NAT 2021-04-25 10:47:24 07[ENC] <14> generating ID_PROT response 0 [ KE No NAT-D NAT-D ] 2021-04-25 10:47:24 07[NET] <14> sending packet: from 192.168.0.16[500] to 80.187.102.14[500] (396 bytes) 2021-04-25 10:47:25 12[NET] <14> received packet: from 80.187.102.14[3608] to 192.168.0.16[4500] (108 bytes) 2021-04-25 10:47:25 12[ENC] <14> invalid ID_V1 payload length, decryption failed? 2021-04-25 10:47:25 12[ENC] <14> could not decrypt payloads 2021-04-25 10:47:25 12[IKE] <14> message parsing failed 2021-04-25 10:47:25 12[ENC] <14> generating INFORMATIONAL_V1 request 1878755533[ HASH N(PLD_MAL) ] 2021-04-25 10:47:25 12[NET] <14> sending packet: from 192.168.0.16[500] to 80.187.102.14[500] (92 bytes) 2021-04-25 10:47:25 12[IKE] <14> ID_PROT request with message ID 0 processing failed 2021-04-25 10:47:25 12[DMN] <14> [GARNER-LOGGING] (child_alert) ALERT: parsing IKE message from 80.187.102.14[3608] failed 2021-04-25 10:47:28 28[NET] <14> received packet: from 80.187.102.14[3608] to 192.168.0.16[4500] (108 bytes) 2021-04-25 10:47:28 28[ENC] <14> invalid ID_V1 payload length, decryption failed? 2021-04-25 10:47:28 28[ENC] <14> could not decrypt payloads 2021-04-25 10:47:28 28[IKE] <14> message parsing failed
Hope you have some suggestions.
Regards
This thread was automatically locked due to age.