Hello,
Trying to setup IPSec VPN on a ER-POE 1.8.5. Trying to connect with an IOS device and getting the error "Negotiation with the VPN server failed". Not sure what I am missing, any suggestions on how to debug? Sanitized configuration attached.
Thanks!!!!
-Nate
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action accept description "Allow IKE for Remote VPN Server" destination { port 500 } log enable protocol udp } rule 30 { action accept description "Allow L2TP for Remote VPN Server" destination { port 1701 } log enable protocol udp } rule 40 { action accept description "Allow ESP for Remote VPN Server" log enable protocol esp } rule 50 { action accept description "Allow Nat-T for Remote VPN Server" destination { port 4500 } log enable protocol udp } rule 60 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mac ******** poe { output off } speed auto } ethernet eth1 { address 192.168.1.1/24 description lan duplex auto poe { output off } speed auto } ethernet eth2 { description wlan duplex auto poe { output off } speed auto } ethernet eth3 { description wlan duplex auto poe { output 48v } speed auto } ethernet eth4 { description wlan duplex auto poe { output 24v } speed auto } loopback lo { } switch switch0 { address 192.168.2.1/24 description wlan mtu 1500 switch-port { interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } vif 20 { address 192.168.3.1/24 mtu 1500 } } } service { dhcp-server { disabled false dynamic-dns-update { enable true } hostfile-update enable shared-network-name family { authoritative disable subnet 192.168.3.0/24 { default-router 192.168.3.1 dns-server 208.67.222.222 dns-server 208.67.220.220 lease 86400 start 192.168.3.10 { stop 192.168.3.100 } } } shared-network-name lan { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.38 { stop 192.168.1.230 } unifi-controller2 ******* } } shared-network-name wlan { authoritative disable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 192.168.2.1 lease 86400 start 192.168.2.20 { stop 192.168.2.100 } unifi-controller ****** } } } dns { dynamic { interface eth0 { service dyndns { host-name all.dnsomatic.com login *********** password ********** server updates.dnsomatic.com } } } forwarding { cache-size 150 listen-on eth1 listen-on switch0 listen-on switch0.20 options log-queries options listen-address=192.168.1.1 } } gui { http-port 80 https-port 443 older-ciphers enable } mdns { reflector repeater { interface eth1 interface switch0 } } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name wan-router login { ......... } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipv4 { vlan enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/Denver traffic-analysis { custom-category SocialMedia { name Facebook } dpi enable export enable } } vpn { ipsec { auto-firewall-nat-exclude disable ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { ******** } mode local } client-ip-pool { start 192.168.1.231 stop 192.168.1.235 } dhcp-interface eth0 dns-servers { server-1 192.168.1.1 } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret *************** } ike-lifetime 3600 } } } }