USG40 L2TP IPSEC VPN : PHASE 2 LOCAL POLICY MISMATCH

Sébastien
Sébastien Posts: 41  Freshman Member
First Comment Friend Collector Fourth Anniversary
edited April 2021 in Security
Hi everyone,

I'm trying to set up an L2TP/IPSEC VPN on a USG40, the basic network config is as follow :
  • WAN connected to a VSDL router, fixed IP 192.168.1.250
  • UDP ports 500, 1701 and 4500 redirected to 192.168.1.250
  • All LAN ports in LAN1 zone subnet 10.0.0.0/24
  • ZyWall IP 10.0.0.1
Here is the error IKE log :

410
2020-05-28 21:18:15
info
IKE
ISAKMP SA [L2TP_VPN_GW] is disconnected
192.168.1.250:4500
 109.143.170.251:4500
IKE_LOG
411
2020-05-28 21:18:15
info
IKE
Received delete notification
 109.143.170.251:4500
192.168.1.250:4500
IKE_LOG
412
2020-05-28 21:18:15
info
IKE
Recv:[HASH][DEL]
 109.143.170.251:4500
192.168.1.250:4500
IKE_LOG
413
2020-05-28 21:18:15
info
IKE
Send:[HASH][NOTIFY:NO_PROPOSAL_CHOSEN]
192.168.1.250:4500
 109.143.170.251:4500
IKE_LOG
414
2020-05-28 21:18:15
info
IKE
[SA] : No proposal chosen
192.168.1.250:4500
 109.143.170.251:4500
IKE_LOG
415
2020-05-28 21:18:15
info
IKE
[ID] : Tunnel [L2TP_VPN_CON] Phase 2 Local policy mismatch
192.168.1.250:4500
 109.143.170.251:4500
IKE_LOG
416
2020-05-28 21:18:15
info
IKE
Recv:[HASH][SA][NONCE][ID][ID][PRV][PRV]
 109.143.170.251:4500
192.168.1.250:4500
IKE_LOG
417
2020-05-28 21:18:15
info
IKE
Phase 1 IKE SA process done
192.168.1.250:4500
 109.143.170.251:4500
IKE_LOG


The VPN connection config is attached as images (screen caps).

It has been set up following another post found on this forum but it does not work.

I tried connecting using Android 10 client and Windows 10 integrated client.

Can you help me ?

Thanks a lot,

Sebastien

EDIT

Attachment doesn't seem to work, here a are the links to screen caps: 




Accepted Solution

All Replies

  • jasailafan
    jasailafan Posts: 193  Master Member
    5 Answers First Comment Friend Collector Sixth Anniversary
    The USG40 is placed behind NAT.
    You should follow the guide to configure the wan IP of VSDL router as "Local Policy".
  • Sébastien
    Sébastien Posts: 41  Freshman Member
    First Comment Friend Collector Fourth Anniversary
    Thanks for your reply.

    Yes it is behind a NAT and your article is interesting.

    If I read it correctly the local policy for phase 2 should be the WAN public IP, not the USG40 WAN IP.

    This is a problem for my scenario because the public IP is dynamic. To bypass this, I create a FQDN object pointing to my VSDL router but I can't select that type of object for phase 2 local policy (not shown in the list).

    Is there a way to do the same thing with a dynamic publicv address you think ?

    Regards,

    Sebastien
  • Sébastien
    Sébastien Posts: 41  Freshman Member
    First Comment Friend Collector Fourth Anniversary
    Yes it is ! I found the solution : I set up the local policy to an IP object, type HOST, value 0.0.0.0.

    My L2TP is now working for local network, but no access to Internet when VPN conencted despite the security rules allow traffic between the IP Sec zone and any other zones.

    So a ping to 10.0.0.0/24 subnet is OK but not to 8.8.8.8.

    Please note that I had to configure the IP pool to the subnet 10.0.2.0/24 but as ping works to 10.0.0.1 I suppose it is not a routing issue.

    Nothing in the logs saying that ping from 10.0.2.1 to 8.8.8.8 packets are blocked.

    Thanks for your help.

  • Sébastien
    Sébastien Posts: 41  Freshman Member
    First Comment Friend Collector Fourth Anniversary
    Thank you PeterUK that was the answer, I have created a Policy Route from L2TP Zone to SNAT on the outgoing interface and bingo Internet is there. Works perfectly for my smartphone beside SSL VPN.  =)
  • Lukas
    Lukas Posts: 13  Freshman Member
    First Comment Friend Collector First Anniversary
    Hello Sébastien, I have very similar problem right now.
    Could you please send me your configuration, because I am stuck in the situation, that the IPsec tunnel is established, but then the client (Windows 7) starts waiting for some response and after 20-30 seconds ends up with error 809 (remote server does not respond).
    If you could help me anyhow I would be very greatful.
  • HSComputers
    HSComputers Posts: 3  Freshman Member
    First Comment Sixth Anniversary
    Hello Lukas, are you running the IKE and AuthIP IPsec Keying Modules service on Windows? The service must be enabled and running.
  • Sébastien
    Sébastien Posts: 41  Freshman Member
    First Comment Friend Collector Fourth Anniversary
    Hello Lukas, what do the logs say on the USG ? This is where you should begin your investigation because problems could look the same but be very different. Could you post the logs when you try to connect the tunnel ?

    There is also a trick to allow Windows client to connect to an IPSec tunnel behind a NAT-T, please look at https://support.microsoft.com/en-us/help/926179/how-to-configure-an-l2tp-ipsec-server-behind-a-nat-t-device-in-windows for more information.

    Regards,

    Sebastien

Security Highlight