Solved

Sonicwall Group VPN policy, not getting IP address

Posted on 2006-11-02
7
397 Views
Last Modified: 2010-04-08
Hello, I have Sonicwall SOHO3 and trying to setup the Group VPN. I'am able to connect to the network, but I am not getting a local IP or able to ping any of the network devices.
Below are some of the general setting and a log example.

Any help would be much appreciated.

Thanks,
shawn

•  Model: SOHO3 (CPU: Toshiba 3927 H2 / 133 Mhz)
•  Firmware version: 6.6.0.6

DHCP over VPN is enabled, I’m passing it through to our windows 2000 server

Unique Firewall Identifier  
        
 
Enable VPN              
 
Disable all VPN Windows Networking (NetBIOS) broadcast              
 
Enable Fragmented Packet Handling              
 
Enable NAT Traversal              
Keep Alive interval (seconds)    
        
 
Enable IKE Dead Peer Detection              
              Dead Peer Detection Interval (seconds)       

       Failure Trigger Level (missed heartbeats)       

             
 
Clean up Active tunnels when Peer Gateway
DNS name resolves to a different IP Address              

VPN User Authentication Settings
Allow these services to bypass user authentication on VPN SAs:         

   
 
Allow these address ranges to bypass user authentication on VPN SAs:  
(begin  :  length)           

 :    
 

VPN Bandwidth Management
 
Settings below will not take effect until enabled on Advanced Ethernet page.
 Enable VPN Bandwidth Management

VPN guaranteed bandwidth        Kbps

VPN maximum bandwidth        Kbps

VPN bandwidth priority       


VPN Policies
 
Disabled        Name        Gateway                Destinations        Phase 2 Encryption/Authentication                  
      GroupVPN
                     ESP 3DES HMAC SHA1 (IKE)              

SAs enabled: 1      SAs defined: 1      SAs Allowed: 11



Security Association       

IPSec Keying Mode         

Disable This SA       

 

Security policy
Phase 1 DH Group       

SA Life time (secs)       

 

Phase 1 Encryption/Authentication       

Phase 2 Encryption/Authentication       

Shared Secret       


Require authentication of
VPN clients via XAUTH:           

Enable Windows Networking
(NetBIOS) broadcast       

Apply NAT and firewall rules       

Forward packets to remote VPNs       

Enable Perfect Forward Secrecy       

Phase 2 DH Group       

Default LAN Gateway       

User Name and Password Caching
 
  Cache XAUTH User Name and Password on Client:    

 
Client Connections
 
  Allow Traffic to    

 
   Set Default Route as this Gateway

   Use DHCP to obtain Virtual IP for this Connection

   Require Distributed Security Client for this Connection

 
Client Initial Provisioning
 
   Use Default Key for Simple Client Provisioning



LOG’s

2006 Nov 02 12:24:26:328      Information      <local host>      The connection "company name" has been enabled.
2006 Nov 02 12:24:26:348      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 12:24:26:550      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 12:24:26:551      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 12:24:26:552      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 12:24:26:584      Information      x.x.x.x      User authentication information is needed to complete the connection.
2006 Nov 02 12:24:30:585      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 12:24:30:776      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 12:24:30:777      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 12:24:30:785      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 12:24:30:837      Information      x.x.x.x      User authentication has succeeded.
2006 Nov 02 12:24:30:887      Information      x.x.x.x      The configuration for the connection is up to date.
2006 Nov 02 12:24:30:926      Information      x.x.x.x      Starting ISAKMP phase 2 negotiation with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP.
2006 Nov 02 12:24:31:125      Information      x.x.x.x      The SA lifetime for phase 2 is 28800 seconds.
2006 Nov 02 12:24:31:126      Information      x.x.x.x      Phase 2 with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP has completed.
2006 Nov 02 12:26:29:556      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 12:26:29:757      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 12:26:29:758      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 12:26:29:759      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 12:26:29:791      Information      x.x.x.x      User authentication information is needed to complete the connection.
2006 Nov 02 12:26:51:808      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 12:26:51:999      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 12:26:51:1000      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 12:26:51:1001      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 12:26:52:050      Information      x.x.x.x      User authentication has succeeded.
2006 Nov 02 12:26:52:110      Information      x.x.x.x      The configuration for the connection is up to date.
2006 Nov 02 12:26:52:219      Information      x.x.x.x      Starting ISAKMP phase 2 negotiation with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP.
2006 Nov 02 12:26:52:409      Information      x.x.x.x      The SA lifetime for phase 2 is 28800 seconds.
2006 Nov 02 12:26:52:410      Information      x.x.x.x      Phase 2 with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP has completed.
2006 Nov 02 12:45:11:499      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 12:45:11:680      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 12:45:11:681      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 12:45:11:689      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 12:45:11:714      Information      x.x.x.x      User authentication information is needed to complete the connection.
2006 Nov 02 13:22:57:367      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 13:22:57:578      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 13:22:57:579      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 13:22:57:580      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 13:22:57:639      Information      x.x.x.x      User authentication has succeeded.
2006 Nov 02 13:22:57:690      Information      x.x.x.x      The configuration for the connection is up to date.
2006 Nov 02 13:22:57:729      Information      x.x.x.x      Starting ISAKMP phase 2 negotiation with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP.
2006 Nov 02 13:22:57:938      Information      x.x.x.x      The SA lifetime for phase 2 is 28800 seconds.
2006 Nov 02 13:22:57:939      Information      x.x.x.x      Phase 2 with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP has completed.
2006 Nov 02 13:25:50:927      Information      <local host>      The connection "company name" has been disabled.
2006 Nov 02 13:30:02:589      Information      <local host>      The connection "company name" has been enabled.
2006 Nov 02 13:30:02:729      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 13:30:02:920      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 13:30:02:921      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 13:30:02:922      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 13:30:02:964      Information      x.x.x.x      User authentication information is needed to complete the connection.
2006 Nov 02 13:30:07:375      Information      x.x.x.x      Starting ISAKMP phase 1 negotiation.
2006 Nov 02 13:30:07:587      Information      x.x.x.x      NAT Detected: Local host is behind a NAT device.
2006 Nov 02 13:30:07:588      Information      x.x.x.x      The SA lifetime for phase 1 is 28800 seconds.
2006 Nov 02 13:30:07:589      Information      x.x.x.x      Phase 1 has completed.
2006 Nov 02 13:30:07:648      Information      x.x.x.x      User authentication has succeeded.
2006 Nov 02 13:30:07:698      Information      x.x.x.x      The configuration for the connection is up to date.
2006 Nov 02 13:30:07:767      Information      x.x.x.x      Starting ISAKMP phase 2 negotiation with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP.
2006 Nov 02 13:30:07:966      Information      x.x.x.x      The SA lifetime for phase 2 is 28800 seconds.
2006 Nov 02 13:30:07:967      Information      x.x.x.x      Phase 2 with x.x.x.x/255.255.255.255:BOOTPC:BOOTPS:UDP has completed.
2006 Nov 02 13:34:08:702      Information      <local host>      The connection "company name" has been disabled.
0
Comment
Question by:smcelroy
  • 3
  • 2
7 Comments
 
LVL 7

Expert Comment

by:jasonpaine
ID: 17862967
Go to the dhcp > dhcp over vpn > central gateway
check send dhcp request to the server below add windows server ip address
dhcp setup menu
check enable this dhcp range
create user > give access from vpn client with xauth and access from vpn


on the client settings page
cache xauth user name  > single session
and check the box to obtain virtual ip address.
0
 
LVL 7

Accepted Solution

by:
jasonpaine earned 250 total points
ID: 17863891
also, is this a first time configuration or did you get an IP address from the lan before and it stopped working?
0
 

Author Comment

by:smcelroy
ID: 17877630
Hi Jason, I will give this  a try tonight and get back to you.

this is a first time config.

shawn
0
 
LVL 7

Expert Comment

by:jasonpaine
ID: 17901000
how is the vpn configuration coming along.
0
 

Author Comment

by:smcelroy
ID: 18093340
my apoligize, This dropped to the back burner and I forgot about it.

Jason Paine, thanks for the help.

shawn
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now