Hi everybody,
does anyone configured IPSec tunnel between Sophos and that stupid Kerio Control?
i followed this KB article, strictly step by step
Configuring an IPsec VPN tunnel with Astaro
but it does not work...
Live log from Sophos:
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #236: responding to Main Mode
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #236: Peer ID is ID_FQDN: 'firewall'
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #236: Dead Peer Detection (RFC 3706) enabled
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #236: sent MR3, ISAKMP SA established
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #236: received Delete SA payload: deleting ISAKMP State #236
2014:07:01-20:37:40 home pluto[11783]: packet from 91.218.***.***:500: received Vendor ID payload [XAUTH]
2014:07:01-20:37:40 home pluto[11783]: packet from 91.218.***.***:500: ignoring Vendor ID payload [RFC 3947]
2014:07:01-20:37:40 home pluto[11783]: packet from 91.218.***.***:500: received Vendor ID payload [Dead Peer Detection]
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #237: responding to Main Mode
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #237: Peer ID is ID_FQDN: 'firewall'
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #237: Dead Peer Detection (RFC 3706) enabled
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #237: sent MR3, ISAKMP SA established
2014:07:01-20:37:40 home pluto[11783]: "S_Kerio Connection" #237: received Delete SA payload: deleting ISAKMP State #237
and still going on
log from Kerio:
[01/Jul/2014 20:41:57] {charon} charon: 13[NET] sending packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 12[NET] received packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 12[ENC] parsed ID_PROT response 0 [ ID HASH ]
[01/Jul/2014 20:41:57] {charon} charon: 12[IKE] IDir '192.168.5.1' does not match to 'home'
[01/Jul/2014 20:41:57] {charon} charon: 12[IKE] deleting IKE_SA tunnel_4_1_1_1[2617] between 91.218.***.***[firewall]...91.218.***.***[%any]
[01/Jul/2014 20:41:57] {charon} charon: 12[IKE] deleting IKE_SA tunnel_4_1_1_1[2617] between 91.218.***.***[firewall]...91.218.***.***[%any]
[01/Jul/2014 20:41:57] {charon} charon: 12[IKE] sending DELETE for IKE_SA tunnel_4_1_1_1[2617]
[01/Jul/2014 20:41:57] {charon} charon: 12[ENC] generating INFORMATIONAL_V1 request 2297605289 [ HASH D ]
[01/Jul/2014 20:41:57] {charon} charon: 12[NET] sending packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {IPsec} TunnelsList|thread: 'ipsec up tunnel_4_4_1_1' returned 0
[01/Jul/2014 20:41:57] {charon} charon: 15[CFG] received stroke: initiate 'tunnel_4_5_1_1'
[01/Jul/2014 20:41:57] {charon} charon: 05[IKE] initiating Main Mode IKE_SA tunnel_4_1_1_1[2618] to 91.218.***.***
[01/Jul/2014 20:41:57] {charon} charon: 05[IKE] initiating Main Mode IKE_SA tunnel_4_1_1_1[2618] to 91.218.***.***
[01/Jul/2014 20:41:57] {charon} charon: 05[ENC] generating ID_PROT request 0 [ SA V V V ]
[01/Jul/2014 20:41:57] {charon} charon: 05[NET] sending packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 01[NET] received packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 01[ENC] parsed ID_PROT response 0 [ SA V V V V ]
[01/Jul/2014 20:41:57] {charon} charon: 01[IKE] received strongSwan vendor ID
[01/Jul/2014 20:41:57] {charon} charon: 01[IKE] received Cisco Unity vendor ID
[01/Jul/2014 20:41:57] {charon} charon: 01[IKE] received XAuth vendor ID
[01/Jul/2014 20:41:57] {charon} charon: 01[IKE] received DPD vendor ID
[01/Jul/2014 20:41:57] {charon} charon: 01[ENC] generating ID_PROT request 0 [ KE No ]
[01/Jul/2014 20:41:57] {charon} charon: 01[NET] sending packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 10[NET] received packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 10[ENC] parsed ID_PROT response 0 [ KE No ]
[01/Jul/2014 20:41:57] {charon} charon: 10[ENC] generating ID_PROT request 0 [ ID HASH ]
[01/Jul/2014 20:41:57] {charon} charon: 10[NET] sending packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 13[NET] received packet: from 91.218.***.***[500] to 91.218.***.***[500]
[01/Jul/2014 20:41:57] {charon} charon: 13[ENC] parsed ID_PROT response 0 [ ID HASH ]
[01/Jul/2014 20:41:57] {charon} charon: 13[IKE] IDir '192.168.5.1' does not match to 'home'
I dont undestand why it tells me that IDir 192.168.5.1 does not match to home, it comes from Local Interface in Connections how it is in that KB...
What is wrong?
Thanx in advance, V.