Thanks for your feedback and confirmation Yasuoka. I’m glad you’re able to reproduce the issue, it’s been a difficult one to try to explain to google;) Took me longer than I’d care to admit to finally pin down the specifics so I could even pose this question to the group.
I think for the time being we may push our windows clients over to an Openvpn solution. Again, thanks very much for your feedback and hopefully this will help others identify the problem in their implementations faster in the Future. ((Isakmpd/npppd still works smashingly for a single windows client, so from a work-from-home or road-warrior point of view it’s perfect. In a shared office environment however, Windows clients contend for that single available port. Ridiculous. )) James McGoodwin On 11/18/14, 7:45 PM, "YASUOKA Masahiko" <yasu...@yasuoka.net> wrote: >On Sat, 15 Nov 2014 00:48:44 +0000 >James McGoodwin <jmcgood...@kobo.com> wrote: >> However Windows clients are limited to only one connection at a >> time. Subsequent connections cause the current session to die and >> be replaced by the new one. >(snip) >> In short, many security associations (for each windows client) but only >>one >> actual flow. >> >> Isakmpd doesn?t have a way to distinguish between the connections as it >> renegotiates their keys. > >I could repeat the problem. When rekeying, only one of the >connections can keep the IPsec session and others are dropped. It >seems isakmpd NAT-T has an issue. > >I also would like to fix it. But I need to learn the isakmpd code. >It may take time. > >--yasuoka