Cyberoam - VPN Troubleshooting Guide
Cyberoam - VPN Troubleshooting Guide
Cyberoam - VPN Troubleshooting Guide
Thing to Know
1. IPSec and L2TP connection cannot be created with the same name as they are treated as same the connection
2. IP address range in L2TP configuration and PPTP configuration cannot be same
3. L2TP connection will be live till the Key life specified in the Connection. On key expiry, Server will disconnect the
Connection immediately but Client will take few minutes to get disconnected
4. Preshared key Authentication type is not supported for L2TP connection in Windows 2000
5. Cyberoam VPN IPSec Client requires:
Question
I am not able to establish the connection using Preshared key for authentication, what could be the problem?
Answer
You will not be able to establish the connection if you have used space as the last character in the preshared key.
Change the preshared key and try to establish the again.
Question
Why I am receiving <<Connection already exists>> error while trying to create L2TP connection?
Answer
If you are not able to create L2TP connection due to above error, it means either IPSec or L2TP connection is
already created with the same name. You will not be able to create L2TP and IPSec connections with the same
name. Change the connection name and try again.
Question
Why I am receiving <<Connection already exists>> error while trying to create IPSec connection?
Answer
If you are not able to create IPSec connection due to above error, it means either IPSec or L2TP connection is
already created with the same name. You will not be able to create L2TP and IPSec connections with the same
name. Change the connection name and try again.
Question
What does the error << security layer encountered a problem >> mean?
Answer
If you are not able to establish connection due to above error, it means, both Cyberoam VPN client and L2TP client
are installed on the same machine. You will not be able to establish the connection, if both clients are installed on
the same machine. Uninstall any one of the Client and try again.
Question
What does the number appended at the end of the Connection name indicate?
Answer
The number appended at the end of the Connection name indicates total number of Private Networks specified in
the Connection at the local and remote VPN servers and total number of connections that can be established.
For example,
If for the connection rw_psk, 2 local private networks and 3 remote private networks are specified then 6 (2*3) will
be appended to the connection name and will be displayed as rw_psk-6 in the VPN Log.
Total 6 connections can be established and Log entry will be as "rw_psk_1-1", "rw_psk_1-2", "rw_psk_1-3",
"rw_psk_1-4", "rw_psk_1-5", "rw_psk_1-6"
Question
What does ISAKMP SA established message in the VPN Log mean?
Answer
ISAKMP SA established means phase 1 connection is successfully established. Log will also display the
parameters defined for the phase 1.
Apr 28 11:54:44 1146205484 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #1: I did not send a certificate because I do
not have one.
Apr 28 11:54:44 1146205484 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #1: transition from state STATE_MAIN_R2
to state STATE_MAIN_R3
Apr 28 11:54:44 1146205484 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #1: STATE_MAIN_R3: sent MR3, ISAKMP
SA
established
{auth=OAKLEY_PRESHARED_KEY
cipher=oakley_3des_cbc_192
prf=oakley_md5
group=modp1024}
# auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024
# auth - authntication type
# cipher - encryption algorithm used for phase 1
# prf - authentication algorithm
# group - DH Group
1 = MODP768
2 = MODP1024
5 = MODP1536
14 = MODP2048
15 = MODP3072
16 = MODP4096
Question
I am receiving inbound IPsec SA installed, expecting QI2 message in the log, what does it mean?
Answer
inbound IPsec SA installed, expecting QI2 means phase 1 connection is successfully established and one way
tunnel i.e. incoming data tunnel is established.
Apr 28 11:54:44 1146205484 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #2: transition from state STATE_QUICK_R0
to state STATE_QUICK_R1
Apr 28 11:54:44 1146205484 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #2: STATE_QUICK_R1: sent QR1, inbound
IPsec SA installed, expecting QI2
Question
I am receiving IPsec SA established {ESP=>0x1cb63bdc <0x859e904a xfrm=3DES_0-HMAC_MD5 NATD=none
DPD=enabled} message in the log, what does it mean?
Answer
IPsec SA established {ESP=>0x1cb63bdc <0x859e904a xfrm=3DES_0-HMAC_MD5 NATD=none DPD=enabled}
means tunnel is successfully established
Apr 28 11:54:45 1146205485 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #2: Dead Peer Detection (RFC 3706):
enabled
Apr 28 11:54:45 1146205485 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #2: transition from state STATE_QUICK_R1
to state STATE_QUICK_R2
Apr 28 11:54:45 1146205485 pluto[18126]: "rw_psk_1-1"[1] 188.7.7.1 #2: STATE_QUICK_R2: IPsec SA
established {ESP=>0x1cb63bdc <0x859e904a xfrm=3DES_0-HMAC_MD5 NATD=none DPD=enabled}
# xfrm=3DES_0-HMAC_MD5 NATD=none DPD=enabled
# xfrm - encryption algo-authenticationalgo
# NATD - NATraversal is detected or not
# DPD - Dead Peer Detection is enabled or not
Question
Why I am not able to access any application even thought the tunnel is established?
Answer
This might happen if there is mismatch in the Connection Mode configured at the local and remote end.
Tunnel will be established even if Connection Mode is configured as Tunnel mode at the local end and as
Transport mode at the remote end but remote user will not be able to access any application.
Specify same Connection Mode at both the ends and try again.
Question
From where do I know how many users are using PPTP connection to establish VPN tunnel?
Answer
You can get the list of users using PPTP connection to establish VPN tunnel from VPN Report. You can view
report from Report > VPN > PPTP Connection Log
Question
From where do I view the PPTP logs?
Answer
You can view PPTP logs from Telnet Console. You can view date wise logs from option 8 VPN Management >
option 6 PPTP VPN Logs
Question
From where do I view the PPTP logs related to plugins?
Answer
To view the PPTP logs related to plugins, go to Telnet Console option 8 VPN Management > option 6 PPTP VPN
Logs and view the debug level logs.
Question
How do I know which users are using PPTP connection?
Answer
PPTP Connection Log will give the details of all the users using PPTP connection. Log on to Cyberoam Reports
and go to VPN > PPTP Connection Log to view the date wise connection details for all the users.
Question
From where do I get PPTP connection details?
Answer
PPTP Connection Log will give the details of all the PPTP connection. Log on to Cyberoam Reports and go to VPN
> PPTP Connection Log to view the date wise connection details for all the users.
Question
How do I configure Windows 2000 client for PPTP connection?
Answer
Refer to How To - Configure Windows 2000 client for PPTP connection
Sample Log
Apr 29 10:29:27 1146286767 pluto[1628]:
"test_multiple_psk-1"[1] 188.7.7.131 #1: next
payload type of ISAKMP Identification Payload
has an unknown value: 215
Apr 29 10:29:27 1146286767 pluto[1628]:
"test_multiple_psk-1"[1]
188.7.7.131
#1:
probable authentication failure (mismatch of
preshared secrets?): malformed payload in
packet
<<
policy
does
not
allow
OAKLEY_RSA_SIG authentication. >>
<<policy
does
not
OAKLEY_PRESHARED_KEY
authentication. >>
allow
<< no GROUP_DESCRIPTION>>
Recommendation
If you are not able to establish connection due
to this error, it means you are using different
preshared keys for multiple connections using
same IP address for the remote end. You will
be able to establish connection only if same
preshared key is used for all the connections.
Change the preshared key and try again.
<<
policy
mandates
Extended
Authentication (XAUTH) with RSA of
initiator (we are responder). Attribute
OAKLEY_AUTHENTICATION_METH
OD>>
OAKLEY_AUTHENTICATION_METHOD
<<
Oakley
Transform
[OAKLEY_3DES_CBC
(192),
OAKLEY_MD5,
OAKLEY_GROUP_MODP1024]
refused due to strict flag >>
<<
Signature
check
(on
@client1.elitecore.com) failed (wrong
key?); tried *AwEAAbc0R >>
and
try
to
establish
#
192.168.0.0/20===187.7.7.43[@server.eliteco
re.com]...188.7.7.7[@client1.elitecore.com] network definition
#
192.168.0.0/20===187.7.7.43[@server.eliteco
re.com]--187.7.7.254...%any[@client1.elitecore.com]
#
192.168.0.0/20===187.7.7.43[server@elitecor
e.com,XS+S=C]:17/80--187.7.7.254...%any[[email protected],XC
+S=C]:17/0
192.168.0.0/20===187.7.7.43[server@elitecor
e.com,XS+S=C]:17/85--187.7.7.254...%any[[email protected],XC
+S=C]:17/0
192.168.0.0/20 - internal network - specified
secure access
187.7.7.43 - server ip
[email protected] - Local ID
XS+S=C
specifies
user
authentication as server
17/80 - specifies protocol = udp and
port = 80
187.7.7.254 - gateway
%any - dynamic ip of remote
[email protected] - Remote ID
XC+S=C
specifies
user
authentication as client
17/0 - specifies protocol = udp and
port = any
May 01 17:10:44 1146483644 pluto[21903]:
"rw_psk_1-1"[6] 187.7.7.254 #12: NATTraversal: Result using draft-ietf-ipsec-nat-tike-02/03: peer is NATed
Cyberoam.
OAKLEY_LIFE_DURATION
length)>>
(variable
May 13 00:09:39 1147459179 pluto[6156]: |
length/value: 4
May 13 00:09:39 1147459179 pluto[6156]: |
long duration: 604800
May 13 00:09:39 1147459179 pluto[6156]:
"Verso-2" #548: peer requested 604800
seconds which exceeds our limit 86400
seconds.
Attribute
OAKLEY_LIFE_DURATION (variable length)