Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IPSEC VPN UTM to XG does not reconnect automatically

Morning All,

I've setup an IPSEC VPN between a UTM installation and a XG installation.  Everything works fine once I press the "connect" circle on the VPN tab in XG, but if the line breaks, the connection will not re-establish unless I press the "connect" circle again.

In UTM, this process is easy and automatic - not so it seems in XG.  What do I need to set on the XG to get this to work?  I've tried setting "action on restart" to respond only and initiate, but no joy.  I've also made sure the policy I'm using has "action when peer unreachable" set to "reinitiate".

Can anyone point me in the right direction please?

Many thanks.



This thread was automatically locked due to age.
Parents
  • I'm having similar problems, but with a Juniper JUNOS device on the other side. The Juniper SRX cluster has a few dozen VPN tunnels that are all using the same IKE and IPSEC config as the tunnel to the XG, but the tunnel to the XG won't reconnect after the initial IKE timeout value is reached (28800 seconds). So I get an e-mail every 8 hours that the VPN tunnel is down. I have yet to find a way to get it working. 

    A tunnel with near identical configuration between two XG devices seems to work fine, but swapping out the HA cluster of Junos devices at the datacenter isn't an option. 

     

    I've seen a lot of reference to enabling an advanced option of "enable probing of pre shared keys", but that option does not seem to exist in the XG menu. 

Reply
  • I'm having similar problems, but with a Juniper JUNOS device on the other side. The Juniper SRX cluster has a few dozen VPN tunnels that are all using the same IKE and IPSEC config as the tunnel to the XG, but the tunnel to the XG won't reconnect after the initial IKE timeout value is reached (28800 seconds). So I get an e-mail every 8 hours that the VPN tunnel is down. I have yet to find a way to get it working. 

    A tunnel with near identical configuration between two XG devices seems to work fine, but swapping out the HA cluster of Junos devices at the datacenter isn't an option. 

     

    I've seen a lot of reference to enabling an advanced option of "enable probing of pre shared keys", but that option does not seem to exist in the XG menu. 

Children
  • Thanks Andrew,

    That actually helps quite a bit.  I've found that if I set that option in the "Advanced" section of the UTM's IPSEC settings, I can get the connection to re-establish, both on line failure and on XG reboot, provided I set the XG VPN settings to "DefaultBranchOffice" policy and the connection to "re-initiate".

    Now, to see if I can get this setup working behind a NAT-ed Router...  :)