Hi all
I'm having an issue with IPsec side-to-side VPN tunnels since I had to exchange a vdsl router on one side.
The prior router had a IP forwarding function, the new one does only support port forwarding (DMZ function, where all ports are forwarded to a privat UTM IP as 192.168.1.1). So the change is, that the prior router passed the public IP to the UTM 9.5 and the new router does forward all ports to the private UTM IP 192.168.1.1. Use NAT traversal is activated.
BTW: On the other side there's a same router, which does also do NAT and worked flawless, till we exchanged the second router. Couldn't find any relevant differences between the two UTM configurations on both sides.
Check: If I'm initiating a portscan from the internet, the UTM does drop the packets, which means, the UTM is accessible from internet.
Issue
The side-to-side IPsec live log shows the following entries, if trying to initiate a connection by transferring payload:
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: received Vendor ID payload [strongSwan]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: ignoring Vendor ID payload [Cisco-Unity]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: received Vendor ID payload [XAUTH]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: received Vendor ID payload [Dead Peer Detection]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: received Vendor ID payload [RFC 3947]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2017:10:03-19:18:51 utm-name pluto[7679]: packet from <utm-remote-ip>:1030: initial Main Mode message received on <utm-local-ip>:500 but no connection has been authorized with policy=PUBKEY
Any idea, why the tunnels do no more establish and how to solve the issue? What have I missed?
This thread was automatically locked due to age.