Hi.
I followed the Guidebook on docs.astaro.org for X509_Host_to_net VPN's. As a result, using Sentinel from home, I can succesfully make the VPN connection. Unfortunately, I can't access the Internal LAN file server, which is the reason for the VPN. I can't ping it or SSH to it and seemingly don't have any traffic between my Remote PC and the Network behind ASL at the Office.
My particulars:
ASL with latest patches and 3 NICS,
External: 66.92.xxx.19
DMZ 192.168.3.1
Internal 192.168.2.1
My goal is to eventually connect to an IP Based Netware 6 Server via the VPN.
Here's the ASL VPN Config:
Connections: VPN is Enabled and NAT Traversal is enabled.
So my Connection summary looks like:
Name Type Local Remote Endpoints
Roadwarrior Roadwarrior External Any (and yes it is enabled, green)
FDetails look like:
Roadwarrior type VPN
IPSec Policy – AES_PFS
Auto Packet Filter is On
Endpoint Definition:
Local Endpoint is External
Remote Endpoint is Any
Subnet Definition:
Local Subnet is Internal_Network_
Remote Subnet is None
Remote Keys: Auto_packet Filter is on with an address: 192.168.4.10 which is not an IP on any Interface.
My SSH Sentinel Config:
Security Gateway : 66.92.xxx.19
Remote Network: Office Internal (192.168.2.0)
Aquire Virtual IP is On:
Specified Manually: 192.168.4.10
(I tried changing this on both sentinel and ASL to a valid Internal LAN IP with no benefit)
IKE Proposal:
Encryption Algorithm: 3DES
Interity Function: MD5
IKE Mode: main mode
IKE Group: MODP 1536 (Group 5)
IPSec Proposal:
Encryption Algorithm: AES-128
Integrity Function: HMAC-MD5
IPSec mode: tunnel
PFS Group: MODP 1535 (Group 5)
Advanced Options on Sentinel Rule Properties:
Pass NAT Devices using NAT Traversal
At first I didn't make any packet filter changes because my impression (mistaken perhaps) was that by enabling Auto Packet Filter, it wasn't needed. Later I tried adding a rule allowing all traffic between the Cert Key for my remote client and the Internal LAN, with no change in access as a result.
I also tried different Auto Assign IP's, ie giving my Sentinel Client an IP on the Internal LAN. No joy.
Well that's probably too long as it is. Any help in getting to see the LAN would be appreciated. I do notice that when I do an IPCPONFIG on the remote WinXP machine, that there is no Default Gateway specified for the IPSec connection.. There is of course a default gateway for my physical NIC adapter to get to Internet.
I'll be happy to provide more info. Thanks for your help.
By the way. The remote PC is behind a standard Linksys Cable/DSL Router.
This thread was automatically locked due to age.