I setup a L2TP over IPsec on my UTM (9.353-4). The interface I bound the VPN is an ethernet bridge interface
The connection from my test clients (iPhone iOS 9.2.1 and Macbook 10.10.5) failed.
|--internal workstation ----- vpn UTM firewall (ethernet bridged) ----- internet router ----- vpn client (public IP) --|
|------------------------------------ private IPs (192.168.x.x) -------------- | ------------- public IPs --------------|
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: received Vendor ID payload [RFC 3947]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: ignoring Vendor ID payload [FRAGMENTATION 80000000]
2016:02:12-21:20:59 dcfw220 pluto[19842]: packet from 62.203.x.x:9333: received Vendor ID payload [Dead Peer Detection]
2016:02:12-21:20:59 dcfw220 pluto[19842]: "L_for ras-user"[27] 62.203.x.x:9333 #54: responding to Main Mode from unknown peer 62.203.x.x:9333
2016:02:12-21:20:59 dcfw220 pluto[19842]: "L_for ras-user"[27] 62.203.x.x:9333 #54: NAT-Traversal: Result using RFC 3947: both are NATed
2016:02:12-21:20:59 dcfw220 pluto[19842]: | NAT-T: new mapping 62.203.x.x:9333/4500)
2016:02:12-21:20:59 dcfw220 pluto[19842]: "L_for ras-user"[27] 62.203.x.x:4500 #54: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2016:02:12-21:20:59 dcfw220 pluto[19842]: "L_for ras-user"[27] 62.203.x.x:4500 #54: Peer ID is ID_IPV4_ADDR: '192.168.x.x'
2016:02:12-21:20:59 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: deleting connection "L_for ras-user"[27] instance with peer 62.203.x.x {isakmp=#0/ipsec=#0}
2016:02:12-21:20:59 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Dead Peer Detection (RFC 3706) enabled
2016:02:12-21:20:59 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sent MR3, ISAKMP SA established
2016:02:12-21:21:00 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: cannot respond to IPsec SA request because no connection is known for 62.203.x.x/32===192.168.x.x:4500[192.168.x.x]:17/1701...62.203.x.x:4500[192.168.x.x]:17/%any==={192.168.x.x/32}
2016:02:12-21:21:00 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_ID_INFORMATION to 62.203.x.x:4500
2016:02:12-21:21:03 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:03 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:06 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:06 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:10 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:10 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:13 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:13 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:16 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:16 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:20 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:20 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:23 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:23 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:26 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:26 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:30 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x0b624fd9 (perhaps this is a duplicated packet)
2016:02:12-21:21:30 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: sending encrypted notification INVALID_MESSAGE_ID to 62.203.x.x:4500
2016:02:12-21:21:30 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500 #54: received Delete SA payload: deleting ISAKMP State #54
2016:02:12-21:21:30 dcfw220 pluto[19842]: "L_for ras-user"[28] 62.203.x.x:4500: deleting connection "L_for ras-user"[28] instance with peer 62.203.x.x {isakmp=#0/ipsec=#0}
To verify the configuration I test the VPN from the LAN and in this case both test clients can establish the VPN successfully.
|--internal workstation ----- vpn UTM firewall (ethernet bridged) ----- vpn client (private IP) ----- internet router --|
|------------------------------------ private IPs (192.168.x.x) -------------- | ------------- public IPs --------------|
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: received Vendor ID payload [RFC 3947]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
2016:02:12-20:52:53 dcfw220 pluto[19842]: packet from 192.168.x.x:500: received Vendor ID payload [Dead Peer Detection]
2016:02:12-20:52:53 dcfw220 pluto[19842]: "L_for ras-user"[26] 192.168.x.x #52: responding to Main Mode from unknown peer 192.168.x.x
2016:02:12-20:52:53 dcfw220 pluto[19842]: "L_for ras-user"[26] 192.168.x.x #52: NAT-Traversal: Result using RFC 3947: no NAT detected
2016:02:12-20:52:53 dcfw220 pluto[19842]: "L_for ras-user"[26] 192.168.x.x #52: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2016:02:12-20:52:53 dcfw220 pluto[19842]: "L_for ras-user"[26] 192.168.x.x #52: Peer ID is ID_IPV4_ADDR: '192.168.x.x'
2016:02:12-20:52:53 dcfw220 pluto[19842]: "L_for ras-user"[26] 192.168.x.x #52: Dead Peer Detection (RFC 3706) enabled
2016:02:12-20:52:53 dcfw220 pluto[19842]: "L_for ras-user"[26] 192.168.x.x #52: sent MR3, ISAKMP SA established
2016:02:12-20:52:54 dcfw220 pluto[19842]: "L_for ras-user"[3] 192.168.x.x #53: responding to Quick Mode
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Plugin aua.so loaded.
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: AUA plugin initialized.
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Plugin ippool.so loaded.
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Plugin pppol2tp.so loaded.
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: pppd 2.4.5 started by (unknown), uid 0
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Using interface ppp0
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Connect: ppp0 <-->
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Overriding mtu 1500 to 1380
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Overriding mru 1500 to mtu value 1380
2016:02:12-20:52:54 dcfw220 pppd-l2tp[20523]: Overriding mtu 1500 to 1380
2016:02:12-20:52:54 dcfw220 pluto[19842]: "L_for ras-user"[3] 192.168.x.x #53: IPsec SA established {ESP=>0x0d178550 <0xd8982de2 DPD}
2016:02:12-20:52:56 dcfw220 pppd-l2tp[20523]: Cannot determine ethernet address for proxy ARP
2016:02:12-20:52:56 dcfw220 pppd-l2tp[20523]: local IP address 10.242.3.1
2016:02:12-20:52:56 dcfw220 pppd-l2tp[20523]: remote IP address 10.242.3.2
2016:02:12-20:52:57 dcfw220 pppd-l2tp[20523]: id="2201" severity="info" sys="SecureNet" sub="vpn" event="Connection started" username="ras-user" variant="l2tp" srcip="192.168.x.x" virtual_ip="10.242.3.2" ras-user
As the VPN is working from the LAN but not from the internet I guess the VPN client and VPN server configuration is correct.
The verify the internet connection I installed a new VPN gateway behind the UTM. The configuration on the VPN test clients have not be changed. The UTM firewall passthrough IKE and ISAKMP. The VPN established with success.
|--internal workstation ----- vpn gateway ----- UTM firewall (ethernet bridged) ----- internet router (NAT) ----- vpn client (public IP) --|
|------------------------------------------ private IPs (192.168.x.x) ------------------------ | --------------- public IPs ----------------|
So my question is why phase 2 of IKE fail with the error message "cannot respond to IPsec SA request because no connection is known for..."? And how to fix it?
Thanks for your thoughts.
This thread was automatically locked due to age.