Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Cannot connect to L2TP over IPSec from macOS or iOS clients

$
0
0

Hi all,

 

I recently upgraded a number of OS X and iOS 9 devices on my network to macOS and iOS 10, which removed the support for PPTP. This was fine as I'd intended to move away from PPTP shortly anyway.

 

Unfortunately I haven't been able to get L2TP over IPSec to connect from any device since I configured the new service. I've confirmed that BTMM is disabled on all devices. 

 

Here's the test config (on 1.6.0 firmware) I've deployed by following the tutorial at https://help.ubnt.com/hc/en-us/articles/204950294-EdgeMAX-L2TP-Server:

 

andrew@core# show vpn l2tp remote-access                                        
 authentication {                                                               
     local-users {                                                              
         username andrew {                                                      
             password nope                                        
         }                                                                      
     }                                                                          
     mode local                                                                 
 }                                                                              
 client-ip-pool {                                                               
     start 192.168.0.101                                                        
     stop 192.168.0.110                                                         
 }                                                                              
 dns-servers {                                                                  
     server-1 192.231.203.132                                                   
     server-2 192.231.203.3                                                     
 }                                                                              
 ipsec-settings {                                                               
     authentication {                                                           
         mode pre-shared-secret                                                 
         pre-shared-secret doublenope
     }                                                                          
     ike-lifetime 3600                                                          
 }  

The ports for IKE, L2TP, NAT-T and the ESP protocol are allowed through the firewall:

andrew@core# show firewall                                                      
 all-ping enable                                                                
 broadcast-ping disable                                                         
 ipv6-receive-redirects disable                                                 
 ipv6-src-route disable                                                         
 ip-src-route disable                                                           
 log-martians enable                                                            
 name WAN_IN {                                                                  
     default-action drop                                                        
     description ""                                                             
     rule 1 {                                                                   
         action accept                                                          
         log disable                                                            
         protocol all                                                           
         state {                                                                
             established enable                                                 
             invalid disable                                                    
             new disable                                                        
             related enable                                                     
         }                                                                      
     }                                                                          
     rule 3 {                                                                   
         action drop                                                            
         log disable                                                            
         protocol all
         state {
             established disable
             invalid enable
             new disable
             related disable
         }
     }
 }
 name WAN_LOCAL {
     default-action drop
     description ""
     rule 1 {
         action accept
         log disable
         protocol all
         state {
             established enable
             invalid disable
             new disable
             related enable
         }
     }
     rule 2 {
         action accept
         description "VPN GRE"
         destination {
             port 47
         }
         log disable
         protocol tcp
     }
     rule 3 {
         action accept
         description PPTP
         destination {
             port 1723
         }
         log disable
         protocol tcp
     }
     rule 4 {
         action accept
         description ESP
         log disable
         protocol esp
     }
     rule 5 {
         action accept
         description L2TP
         destination {
             port 1701,4500
         }
         log disable
         protocol udp
     }
     rule 6 {
         action accept
         description "IKE IPSec"
         destination {
             port 500
         }
         log enable
         protocol udp
     }
     rule 7 {
         action accept
         destination {
             address 192.168.0.0/24
         }
         ipsec {
             match-ipsec
         }
         log disable
         protocol all
         source {
             address 192.168.1.0/24
         }
     }
     rule 8 {
         action accept
         log disable
         protocol 50
     }
     rule 9 {
         action drop
         log disable
         protocol all
         state {
             established disable
             invalid enable
             new disable
             related disable
         }
     }
 }
 options {
     mss-clamp {
         interface-type pppoe
         interface-type pptp
         interface-type tun
         mss 1412
     }
 }
 receive-redirects disable
 send-redirects enable
 source-validation disable
 syn-cookies enable

 

Are there any obvious snafu's in my config that are leaping out at anyone? Really struggling with this one...

 

P.S. I have a working IPSec Site-to-Site tunnel operating between two sites. Could this be causing an issue?


Viewing all articles
Browse latest Browse all 20028

Trending Articles