[ https://issues.apache.org/jira/browse/CLOUDSTACK-9212?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15107703#comment-15107703 ]
Adrian Sender commented on CLOUDSTACK-9212: ------------------------------------------- How to reproduce bug. 1. Install windows 7. 2. Configure network with internet facing public IP address. 3. Enable VPN on source nat address in CS. 4. Setup VPN client with user/pass and preshared key using the windows vpn wizard. 5. Internet facing VPN client on windows 7 fails to connect. 6. Put same windows 7 machine behind NAT, VPN works. Logs for public IP address, note the connection fails. root@r-4045-VM:~# cat /var/log/auth.log Jan 20 00:01:36 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008] Jan 20 00:01:36 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: received Vendor ID payload [RFC 3947] method set to=109 Jan 20 00:01:36 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109 Jan 20 00:01:36 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: ignoring Vendor ID payload [FRAGMENTATION] Jan 20 00:01:36 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable] Jan 20 00:01:36 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: ignoring Vendor ID payload [Vid-Initial-Contact] Jan 20 00:01:36 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: ignoring Vendor ID payload [IKE CGA version 1] Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: responding to Main Mode from unknown peer 128.250.116.181 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: STATE_MAIN_R1: sent MR1, expecting MI2 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): no NAT detected Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: STATE_MAIN_R2: sent MR2, expecting MI3 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: Main mode peer ID is ID_IPV4_ADDR: '128.250.116.181' Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp2048} Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: the peer proposed: 103.6.252.199/32:17/1701 -> 128.250.116.181/32:17/1701 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: responding to Quick Mode proposal {msgid:01000000} Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: us: 103.6.252.199<103.6.252.199>[+S=C]:17/1701 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: them: 128.250.116.181[+S=C]:17/1701 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: keeping refhim=4294901761 during rekey Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 Jan 20 00:01:36 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #68: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x1677a1c0 <0x241ef249 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=none} Jan 20 00:01:54 r-4045-VM sshd[8198]: Accepted publickey for root from 169.254.0.1 port 38084 ssh2 Jan 20 00:01:54 r-4045-VM sshd[8198]: pam_unix(sshd:session): session opened for user root by (uid=0) Jan 20 00:01:54 r-4045-VM sshd[8198]: pam_unix(sshd:session): session closed for user root Jan 20 00:02:11 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: received Delete SA(0x1677a1c0) payload: deleting IPSEC State #68 Jan 20 00:02:11 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: received and ignored informational message Jan 20 00:02:11 r-4045-VM pluto[4569]: "L2TP-PSK"[23] 128.250.116.181 #67: received Delete SA payload: deleting ISAKMP State #67 Jan 20 00:02:11 r-4045-VM pluto[4569]: packet from 128.250.116.181:500: received and ignored informational message Here is the same machine but I changed the networking so I am on NAT, no other configuration settings were changed. In this case I am able to connect to the Cloudstack Remote Access VPN. root@r-4045-VM:~# cat /var/log/auth.log Jan 19 23:34:10 r-4045-VM pluto[4569]: packet from 128.250.116.180:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008] Jan 19 23:34:10 r-4045-VM pluto[4569]: packet from 128.250.116.180:500: received Vendor ID payload [RFC 3947] method set to=109 Jan 19 23:34:10 r-4045-VM pluto[4569]: packet from 128.250.116.180:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109 Jan 19 23:34:10 r-4045-VM pluto[4569]: packet from 128.250.116.180:500: ignoring Vendor ID payload [FRAGMENTATION] Jan 19 23:34:10 r-4045-VM pluto[4569]: packet from 128.250.116.180:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable] Jan 19 23:34:10 r-4045-VM pluto[4569]: packet from 128.250.116.180:500: ignoring Vendor ID payload [Vid-Initial-Contact] Jan 19 23:34:10 r-4045-VM pluto[4569]: packet from 128.250.116.180:500: ignoring Vendor ID payload [IKE CGA version 1] Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: responding to Main Mode from unknown peer 128.250.116.180 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: STATE_MAIN_R1: sent MR1, expecting MI2 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: STATE_MAIN_R2: sent MR2, expecting MI3 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.82' Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[28] 128.250.116.180 #65: switched from "L2TP-PSK" to "L2TP-PSK" Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: deleting connection "L2TP-PSK" instance with peer 128.250.116.180 {isakmp=#0/ipsec=#0} Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: new NAT mapping for #65, was 128.250.116.180:500, now 128.250.116.180:4500 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp2048} Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: the peer proposed: 103.6.252.199/32:17/1701 -> 192.168.1.82/32:17/0 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: NAT-Traversal: received 2 NAT-OA. using first, ignoring others Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #66: responding to Quick Mode proposal {msgid:01000000} Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #66: us: 103.6.252.199<103.6.252.199>[+S=C]:17/1701 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #66: them: 128.250.116.180[192.168.1.82,+S=C]:17/1701 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #66: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #66: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #66: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 Jan 19 23:34:10 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #66: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0xe3a6868c <0xbfcf6dcb xfrm=AES_128-HMAC_SHA1 NATOA=192.168.1.82 NATD=128.250.116.180:4500 DPD=none} Jan 19 23:34:28 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: received Delete SA(0xe3a6868c) payload: deleting IPSEC State #66 Jan 19 23:34:28 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: received and ignored informational message Jan 19 23:34:28 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180 #65: received Delete SA payload: deleting ISAKMP State #65 Jan 19 23:34:28 r-4045-VM pluto[4569]: "L2TP-PSK"[29] 128.250.116.180: deleting connection "L2TP-PSK" instance with peer 128.250.116.180 {isakmp=#0/ipsec=#0} Jan 19 23:34:28 r-4045-VM pluto[4569]: packet from 128.250.116.180:4500: received and ignored informational message Jan 19 23:35:01 r-4045-VM CRON[7995]: pam_unix(cron:session): session closed for user root > Cannot Connect to VPN with Public IP on Windows 7 L2TP IPSEC VPN Client > ----------------------------------------------------------------------- > > Key: CLOUDSTACK-9212 > URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9212 > Project: CloudStack > Issue Type: Bug > Security Level: Public(Anyone can view this level - this is the > default.) > Components: Virtual Router > Affects Versions: 4.3.1, 4.5.1 > Environment: Cloudstack 4.3.x 4.5.1 > Xenserver 6.5 > Advanced Networking > Reporter: Adrian Sender > > Cannot connect to VR VPN using internet facing public IP address on client. > Can only connect when VPN client is using NAT -- This message was sent by Atlassian JIRA (v6.3.4#6332)