Watchguard Mobile VPN users connect but has no access.

Core 550 in drop in mode with the mobile ipsec vpn client. The client connects, gets a virtual ip address from the firebox, but cannot access any services allowed through the tunnel. For example, no one can ping the ip that is an allowed resource.

Here is the summary of my setup:

WMS, Fireware 10.2.8
Mobile VPN Client 10.10 Build 59
Authentication Server: Firebox-DB
Key Negotiation Type: Shared Secret

The VPN shows tx transmitted, zero rx bytes. Log file look OK to me.

Any thoughts appreciated.
5/5/2009 1:42:04 PMIPSec: Start building connection
5/5/2009 1:42:04 PMIke: Outgoing connect request AGGRESSIVE mode - gateway=x.x.x.61 : mobile_vpn_users
5/5/2009 1:42:04 PMIke: XMIT_MSG1_AGGRESSIVE - mobile_vpn_users
5/5/2009 1:42:04 PMIke: RECV_MSG2_AGGRESSIVE - mobile_vpn_users
5/5/2009 1:42:04 PMIPSec: Final Tunnel EndPoint is:x.x.x.061
5/5/2009 1:42:04 PMIke: IKE phase I: Setting LifeTime to 28800 seconds
5/5/2009 1:42:04 PMIke: Turning on XAUTH mode - mobile_vpn_users
5/5/2009 1:42:04 PMIke: IkeSa negotiated with the following properties -
5/5/2009 1:42:04 PM  Authentication=XAUTH_INIT_PSK,Encryption=DES3,Hash=SHA,DHGroup=1,KeyLen=0
5/5/2009 1:42:04 PMIke: mobile_vpn_users ->Support for NAT-T version - 2
5/5/2009 1:42:04 PMIke: Turning on NATD mode - mobile_vpn_users - 1
5/5/2009 1:42:04 PMIke: XMIT_MSG3_AGGRESSIVE - mobile_vpn_users
5/5/2009 1:42:04 PMIke: IkeSa negotiated with the following properties -
5/5/2009 1:42:04 PM  Authentication=XAUTH_INIT_PSK,Encryption=DES3,Hash=SHA,DHGroup=1,KeyLen=0
5/5/2009 1:42:04 PMIke: Turning on DPD mode - mobile_vpn_users
5/5/2009 1:42:04 PMIke: phase1:name(mobile_vpn_users) - connected
5/5/2009 1:42:04 PMSUCCESS: IKE phase 1 ready
5/5/2009 1:42:04 PMIPSec: Phase1 is Ready - IkeIndex=5
5/5/2009 1:42:04 PMIkeXauth: RECV_XAUTH_REQUEST
5/5/2009 1:42:04 PMIkeXauth: XMIT_XAUTH_REPLY
5/5/2009 1:42:05 PMIkeCfg: RECV_IKECFG_SET - mobile_vpn_users
5/5/2009 1:42:05 PMIkeCfg: XMIT_IKECFG_ACK - mobile_vpn_users
5/5/2009 1:42:05 PMIkeXauth: RECV_XAUTH_SET
5/5/2009 1:42:05 PMIkeXauth: XMIT_XAUTH_ACK
5/5/2009 1:42:05 PMIkeCfg: name <mobile_v> - IkeXauth: enter state open
5/5/2009 1:42:05 PMSUCCESS: Ike Extended Authentication is ready
5/5/2009 1:42:05 PMIPSec: Quick Mode is Ready: IkeIndex = 00000005 , VpnSrcPort = 4500
5/5/2009 1:42:05 PMIPSec: Assigned IP Address: x.x.x.52
5/5/2009 1:42:05 PMIPSec: DNS Server: x.x.x.46
5/5/2009 1:42:06 PMIkeQuick: XMIT_MSG1_QUICK - mobile_vpn_users
5/5/2009 1:42:06 PMIkeQuick: Received Notify(mobile_vpn_users) -> remote is reducing LifeTime to 28800
5/5/2009 1:42:06 PMIkeQuick: RECV_MSG2_QUICK - mobile_vpn_users
5/5/2009 1:42:06 PMIkeQuick: Turning on PFS mode(mobile_vpn_users) with group 1
5/5/2009 1:42:06 PMIkeQuick: XMIT_MSG3_QUICK - mobile_vpn_users
5/5/2009 1:42:06 PMIkeQuick: phase2:name(mobile_vpn_users) - connected
5/5/2009 1:42:06 PMSUCCESS: Ike phase 2 (quick mode) ready
5/5/2009 1:42:06 PMIPSec: Created an IPSEC SA with the following characteristics -
5/5/2009 1:42:06 PM  IpSrcRange=[x.x.x.52-x.x.x.52],IpDstRange=[x.x.x.46-x.x.x.46],IpProt=0,SrcPort=0,DstPort=0
5/5/2009 1:42:06 PMIPSec: connected: LifeDuration in Seconds = 20160 and in KiloBytes = 102400000
5/5/2009 1:42:06 PMIPSec: Connected to mobile_vpn_users on channel 1.
5/5/2009 1:42:06 PMPPP(Ipcp): connected to mobile_vpn_users with IP Address: x.x.x.052. : x.x.x.053.
5/5/2009 1:42:06 PMSUCCESS: IpSec connection ready
5/5/2009 1:42:17 PMSUCCESS: Link -> <mobile_vpn_users> IP address assigned to IP stack - link is operational.

Open in new window

Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Rob WilliamsCommented:
Two thoughts:
1) If the site from which the client is connecting uses the same subnet as the site to which they are connecting, such as both using something like 192.168.100.x, this will happen.
2) Many firewalls, including the windows firewall, will create exceptions for certain services, but often only for the local subnet, so remote VPN clients, which are on a different subnet, are blocked. Try disabling any software firewalls that may be enabled on the resource to which you are trying to connect.
DrewBryant1961Author Commented:

Thanks for the reply.

1. I have tried this from 2 different networks; the same thing happens on both, The source network ip range differ from the destination network. Because the Watchguard is in drop In mode, the destination ip network is public.

2. I have disabled/removed any firewall products that were running. The same events happen whether they were running or not.

I have tried using the Mobile VPN from 2 different desktops on  2 different  (source) networks with 2 different versions of the Mobile VPN client. The default "Any" rule is enabled for Mobile VPN users, however I added a explicit rule for pings and rdp connections. It made no difference.

I recreated the ipsec configuration and wgx profile on the Watchguard side; no change.

Rob WilliamsCommented:
Have a look at the link below. It is for the Netgear client, but it is the same SafeNet client as the Watchguard MUVPN. In the first screen shot under "ID type" any chance you have set this as an IP instead of a subnet? If so it will connect to that IP only. It should be set to subnet, and the last character set to '0' to represent 'any' device on that subnet assuming a LAN subnet mask of
Webinar: Cyber Crime Becomes Big Business

The rising threat of malware-as-a-service is not one to be overlooked. Malware-as-a-service is growing and easily purchased from a full-service cyber-criminal store in a “Virus Depot” fashion. Join us in our upcoming webinar as we discuss how to best defend against these attacks!

DrewBryant1961Author Commented:

It looks like that section refers to the allowed resources or allowed access on remote network.  The Watchguard 10.10 client is slightly different than the older Watchguard client in the sample.

It is set to an IP address rather than the entire subnet; all of the resources I'm trying to access are on that address.
Rob WilliamsCommented:
The only other thought I have is if a single IP then have you set the subnet mask as
DrewBryant1961Author Commented:

Rob WilliamsCommented:
Hopefully others more familiar with the Watchguards will join in.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
DrewBryant1961Author Commented:

I posted the same question on the Watchguard support forum. Another guy said he had something similar happening to him.

The key IMO is zero Rx bytes.with no firewall running on the client side.
DrewBryant1961Author Commented:
This is resolved.

When a Watchguard is in drop-in mode, in order to use the muvpn ipsec client you need to create a secondary private network on the interface you are connecting to. In my case, I was trying to access resources on the trusted (LAN) interface so I added as a secondary network.

Add IP addresses on that network to the virtual IP address range and then import the updated profile to the Watchguard client.

Once all that is done the client can access machines on the LAN interface.

Thanks for your efforts.
Rob WilliamsCommented:
Glad to hear you were able to resolve.
Thank you DrewBryant1961 both for the points and posting your findings.
Hi DrewBryant1961,
i have a question about your solution. I have the same problem. My notebook and workstation work fine with the MUVPN Client. Only my Workstation at home have trouble, with the vpn client. No RX -
Do you add the private subnet to untrustet interface or to the trustet interface as a secondary network ? Must the subnet be the same like the subnet which is already working on my trusted interface ?


Hi Rattlesnake,
I know this is an very old thread, but I have the same problem.
My Laptop works fine with MUVPN via LAN at home, but with mobile broadband, I can connect to the firewall but not getting a RDP or even a ping to the client in office.


It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software Firewalls

From novice to tech pro — start learning today.