Choose style:

Author Topic: Help with IPSec/L2TP VPN server please  (Read 11019 times)

0 Members and 1 Guest are viewing this topic.

Offline SecureComp

  • Backer
  • *
  • Posts: 541
  • Thanks: 1
  • Registered : 05/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: Help with IPSec/L2TP VPN server please
« Reply #15 on: December 29, 2015, 04:36:11 pm »
All of my experience with VPN's are with Sonicwalls, but that hasn't really helped me here.
That's cool, SonicWalls are good stuff.

The debug info on the Almond+ will not look familiar. I will grab a screen shot of a sample connect and disconnect and post it up. May not get it done until tomorrow.  Then you can look at a known good sample and compare it to your info.

The basic info you shared (though system logs would be more helpful at this point) makes me wonder if you are getting through to your A+ from the outside at all. The puzzling thing is, you ARE able to connect using a different method. So really, in the logs, we should see the connect attempt and a specific reason for the failure. Not a generic, can't connect to the server kind of message.

Quote

I swear I read the Local IP was supposed to be the same as the routers LAN IP.
Depend on the VPN software, you can actually specify which IP to use, static, DHCP allocated, etc. on a per client basis.
But yes, the Local IP is that of the router.  Changing it to something else should have forced another error which would show up in the system log.

When you change it to something else, go ahead and test your PPTP connection and watch it fail, then check the System Logs. Then change it back to the local IP of the router, watch the successful connect in the System logs with PPTP and then watch the connect attempt with IPSec in the logs.

Quote

 Also I do have the VPN enabled.

Had to ask. Often the simple things are overlooked.

Quote
I changed it to a known unused one ouside my DHCP and I still get the errors both on LTE and Wi-Fi (Wi-Fi is a different IP scheme)

For now, let's stick with the LTE debug.

Being on a separate WiFi network but still behind the A+ (if that's what you are talking about) leads to route debugging and we'd need to verify a number of things. So the easiest way to proceed is debugging from a network that is absolutely on the other side of the Interweb from your residential ISP. IF you mean a WiFi network at a different location, work, friend, family, etc. then it should be fine though you do run the risk of some funky routing stuff creating problems, it is unlikely. I am using my VPN from a dozen remote locations, using several different ISPs, behind a fistful of different routers/networks/firewalls.  All of them do exactly what they should, allow me to tunnel as needed.


Quote
I guess I can bring my A+ to work and try it on an open WAN port we use for testing, because I know no ports are blocked there.
If you can, that'd be great.  Though IF the issue is with any of your firewall mods on the A+, anticipate similar results.
Quote

IOS has always been the latest public release.
Brave Soul. I lag back a dot release or two until it is well baked in the public soak.  8)

Quote
I think I mentioned it, but PPTP does work.
Which makes me think 2 things.
You must be hitting the Server with the initial connect attempt and the debug logs should show it OR a firewall/iptables/routing mod has hosed up some basic functionality.

Quote

I haven't made any real changes to my A+ past port forwards, none of which are for IPSec or L2TP. Even deleted them all to be sure.

Haha "real" changes. Port Forwarding can crush you when dynamically allocated ports get called. Do you uPnP turned on?

When deleting, there is deleting and then there is deleting.
Which interface do you use for your mods?
Web Interface?
OpenWRT?
Command Line?

Last thought AND Last Resort, and this is a risky one, so proceed with your own best judgement.
Create a separate "test" user id/password combo.
PM me the details and I will try a remote test and look at local debug info.
Probably better off contacting Securifi Tech Support before doing this, you have no idea who folks are on a forum and I sure wouldn't let a stranger into my "house". But I'll make the offer because you seem to be struggling a bit with this.  Your call.
Kickstarter Backer
Securifi Wiki Editor and Beta Tester, Not a Securifi employee
Almond+, many sensors, IOS App, Android Apps and Widgets

Offline tinkerman

  • Backer
  • *
  • Posts: 10
  • Thanks: 0
  • Registered : 15/10/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: Help with IPSec/L2TP VPN server please
« Reply #16 on: December 29, 2015, 07:28:20 pm »
not sure if this affects you but from my experience AT&T blocks L2TP on LTE, so you might want to test first with just a PC. you really should be getting more  informative logs. i would use a linux client on this as i can get more verbose messages from the connecting side.

or you can just go openvpn.

Offline SecureComp

  • Backer
  • *
  • Posts: 541
  • Thanks: 1
  • Registered : 05/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: Help with IPSec/L2TP VPN server please
« Reply #17 on: December 30, 2015, 02:52:21 am »
not sure if this affects you but from my experience AT&T blocks L2TP on LTE, so you might want to test first with just a PC. you really should be getting more  informative logs. i would use a linux client on this as i can get more verbose messages from the connecting side.

or you can just go openvpn.

Absolutely a LINUX client would provide great debug info.

Even if you are using a Windows PC, you can load a VM setup and boot an o/s flavor of your choice.

Sprint and Verizon have not blocked anything needed for establishing a VPN in my experience. 3G/4G LTE

Kickstarter Backer
Securifi Wiki Editor and Beta Tester, Not a Securifi employee
Almond+, many sensors, IOS App, Android Apps and Widgets

Offline SecureComp

  • Backer
  • *
  • Posts: 541
  • Thanks: 1
  • Registered : 05/08/2014
    YearsYearsYearsYearsYearsYearsYearsYearsYearsYears
Re: Help with IPSec/L2TP VPN server please
« Reply #18 on: January 22, 2016, 11:32:47 am »
Just as a followup to this;

IOS 9.x broke a lot of IPSec VPNs

The betas for 9.1.x and 9.2.x did not fix the problem.
The release versions of IOS 9.1.x and 9.2.1 have not fixed the problem.

Stay with IOS 8.3.x or 8.4.x if you want IPSec VPN working with your Almond+

This problem is not limited to the Almond+, many other networking products have experienced this issue.
Kickstarter Backer
Securifi Wiki Editor and Beta Tester, Not a Securifi employee
Almond+, many sensors, IOS App, Android Apps and Widgets

 

Page created in 0.089 seconds with 24 queries.

bottleneck