Hey Guys n Gals,
Im setting up an IPSec VPN Tunnel between an ASG 120 and a Watchguard Firebox SOHO 6, I have seen several people around the forums speak of this set up so it must be possible but I can't get it to work.
ASG120 Setup:
Remote Gateway>
Gateway Type: Initiate Connection
Gateway 192.168.1.10
Authentication Type: Preshared Key
Remote Networks: (A network defined as the remote class C network 192.168.111.0/24)
IPSec Connection:
Remote Gateway: The above gateway!
Local Interface: Internal
Local Networks: Internal Network
Auto Packet Filter: Ticked
Policy: My Customer Policy
My Custom Policy>
IKE encryption algorithm: DES
IKE authentication algorithm: MD5
IKE SA lifetime: 7800
IKE DH group: Group 1
IPSec encryption algorithm: DES
IPSec authentication algorithm: MD5
IPSec SA lifetime: 3600
IPSec PFS group: None
WatchGuard Firebox SOHO 6 Manual VPN Settings:
Phase 1>
Mode: Main Mode
Remote IP: 192.168.1.254 (ASG 120)
Local ID: 192.168.1.10
Remote ID: 192.168.1.254
Authentication: MD5-HMAC
Encryption: DES-CBC
Negotiation expiration in kilobytes: 0
Negotiation expiration in house: 24
DH Group: 1
Generate IKE Keep Alive Messages: Ticked
Phase 2>
Authentication: MD5-HMAC
Encryption: DES-CBC
Key expiration in kilobytes: 8192
Key expiration on hours: 24
Local Network: Local LAN Range
Remote Network: ASG120 LAN Rage
The problem I'm facing is that my ASG120 isn't exactly giving any specific error for not connecting, the live log is here:
pastebin - collaborative debugging tool
The WatchGuard is logging the following error:
Main Mode processing failed
Unable to fill local ID
Unable to find gw by hisid
Rejecting peer XAUTH request: not configured
Then the following line is repeated every so ofton on the WatchGuard:
Rejecting peer XAUTH request: not configured
I'm not sure looking at the ASG Live Log what is actually the problem!
This thread was automatically locked due to age.