Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
networksteamIMS
Contributor
Jump to solution

Issue with mobile access client connecting to 3rd party ipsec vpn servers

Hi all,

I have an issue with mobile access client not connecting to 3rd party ipsec vpn servers

image.png

Scenario:

  • We have an ipsec between main office and a 3rd party site
  • Mobile clients are connected to Main office
  • Main office server 10.20.20.20 is able to connect to the 3rd party server 172.16.1.1
  • Mobile access client 10.10.10.10 is not able to connect to the 3rd party server 172.16.1.1
  • Mobile access client is able to go anywhere but just not the 3rd party site via ipsec
  • Double checked the network policy is allowing and also NAT policy
  • But all traffic from mobile access client 10.10.10.10 is not matching any policies and being dropped at the bottom cleanup rule as shown on the output from fw ctl zdebug drop

 

PS running on an Open server R81.10 take 181

 

Anything I missed....?

 

Regards,

Bill.

0 Kudos
1 Solution

Accepted Solutions
simonemantovani

First of all ...  in your local encryption domain you need to add the nat ip address (as you configured) and also the network assigned to the mobile clients (or in case the 10.0.0.0/8).

And even after this change, the policy is not matched, then remove the VPN community from the policy.

View solution in original post

8 Replies
simonemantovani

Hello

could you provide some screenshot, about policies, vpn configuration (in particular encryption domains) for the 3rd party vpn?

0 Kudos
networksteamIMS
Contributor

Network policy

image.png

NAT

image.png

VPN community

 

image.png

Encryption domain

image.png

0 Kudos
simonemantovani

First of all ...  in your local encryption domain you need to add the nat ip address (as you configured) and also the network assigned to the mobile clients (or in case the 10.0.0.0/8).

And even after this change, the policy is not matched, then remove the VPN community from the policy.

networksteamIMS
Contributor

Thanks for your reply. I have just added them into a new network group and had it assigned to the vpn community but no luck.

by the way my local server 10.20.20.20 is already able to reach the remote server with this setup.

 

Regards,

Bill.

0 Kudos
simonemantovani

Did you also removed the VPN community from the rule?

0 Kudos
networksteamIMS
Contributor

@simonemantovani  Legend! it worked after removing the VPN community from the policy. Dont suppose you could share why this happen?

0 Kudos
simonemantovani

well ... this is one of the magic of that field .. No I'm joking, in my opinion, firewall wasn't matching that rule for the remote access vpn, removing the VPN community told the firewall to consider every clear traffic and also every encrypted traffic (both remote access and site-to-site vpn).

Alternatvely, configuring to rules (one for remote access and one for the site to site vpn) would probably solve the issue.

I'm glad I could help you.

CaseyB
Advisor

You need to add the third-party network to the Remote Access encryption domain.

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events