dslreports logo
uniqs
10
chinatti
join:2002-09-01
Westford, MA

chinatti

Member

Re: Zywall L2TP VPN problems due to ?no L2TP IPSEC protection?

Same behavior from an android device, so it looks like this is something on the zywall side...

After some more debugging, I found this in the debug log on the zywall. Looks like the IPSEC tunnel comes up, but there is some sort of L2TP layer issue. Any suggestions as to where to look to resolve this?


995 2014-11-07 10:58:16 6.6.6.6:1701 3.3.3.3:57537 debug l2tp-over-ipsec L2TP_LOG Terminating tunnel request thread.
996 2014-11-07 10:58:16 debug ike IKE_LOG Reason: No IPSec protection for the L2TP tunnel
997 2014-11-07 10:58:16 debug ike IKE_LOG Message: Tunnel request rejected
998 2014-11-07 10:58:16 debug l2tp-over-ipsec L2TP_LOG Remote L2TP peer 3.3.3.3:57537
999 2014-11-07 10:58:16 debug l2tp-over-ipsec L2TP_LOG Local L2TP peer 6.6.6.6:1701
1000 2014-11-07 10:58:16 debug l2tp-over-ipsec L2TP_LOG L2TP [Responder, incoming-call] negotiation failed:
1001 2014-11-07 10:58:16 6.6.6.6:1701 3.3.3.3:57537 debug l2tp-over-ipsec L2TP_LOG No IPSec protection for L2TP tunnel
1002 2014-11-07 10:58:16 6.6.6.6:1701 3.3.3.3:57537 debug l2tp-over-ipsec L2TP_LOG Looking up IPSec SA for the L2TP tunnel
1003 2014-11-07 10:58:13 3.3.3.3:57537 debug l2tp-over-ipsec L2TP_LOG Retransmit L2TP packet: outage: 1, ack_count=0, timeout=2, #packets=1
1004 2014-11-07 10:58:11 3.3.3.3:57537 debug l2tp-over-ipsec L2TP_LOG Retransmit L2TP packet: outage: 1, ack_count=0, timeout=2, #packets=1
1005 2014-11-07 10:58:09 3.3.3.3:57537 debug l2tp-over-ipsec L2TP_LOG Retransmit L2TP packet: outage: 1, ack_count=0, timeout=2, #packets=1
SG79
join:2009-05-27
New York, NY

SG79

Member

What type of encryption are you using? I had to change my encryption cypher (decrease strength) to get the VPN to work with Android / iOS devices.
chinatti
join:2002-09-01
Westford, MA

chinatti

Member

I tried several different changes to encryption settings while trying to debug this, and nothing seemed to work. Also, from the logs, it looks like the IPSEC tunnel does get established, and it's running into a problem with the L2TP layer after the tunnel is up (so that would seem to me that the cipher are OK - but maybe I don't fully understand how this works)...

But in any event, I currently have the following ciphers enabled:

Phase1:
Neg Mode: Main
1. 3DES-SHA1
2. AES128-SHA1
Key Group: DH2

Phase2:
Encaps: Transport
1. AES256-SHA1
2. AES128-SHA1
3. 3DES-SHA1
PFS: none

If you don't mind posting what you're using successfully, that would be great! Also, I assume you have this working on FW 4.10(AAAA.1)? Did you have the VPN configured before upgrading? I had to do the "double-upgrade" from (if I remember correctly), 3.10->3.20, and then 3.20->4.10. Before the upgrade I had a regular IPSEC tunnel working with the Shrewsoft client from Win7, and also an L2TP/IPSEC tunnel working from both IOS and Android. After the double-upgrade, the Shrewsoft was still working, but IOS/Android is now broken....

Thanks!
frantid
join:2014-09-14
iceland

frantid

Member

For me, USG 40 4.10(AAA.1) using my Samsung Note2 4.3 android. I have AES256 MD5, AES256 SHA1, 3DES SHA1. Local policy address object for host 0.0.0.0

For the vpn gateway,
negotiation main
AES256 SHA1
AES256 MD5
key group dh2
Nat traversal checked
My address - interface address object of my WAN interface.

The key for me was the my address setting in the gateway. I had to use an address object of type interface, my wan Interface. It seems my version of Android only sends the VPN servers address (the USG) in the negotiation. Until I set that my negotiation would fail.
chinatti
join:2002-09-01
Westford, MA

chinatti

Member

Thanks. Unfortunately matching your settings didn't help for me .... Argh.

Can anyone post the relevant settings for a Zywall 110 with a working L2TP VPN between FW v4.10(AAAA.1) and IOS 8.1?

Thanks....