System Cant Satisfy the Requested Bandwith. Please Input Again

View previous topic :: View adjacent topic
Author Message
Duco Ergo Sum
Amateur
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Mon Aug 18, 2014 8:56 am   Mail service subject: VPN Customer non connecting [SOLVED] Reply with quote

Hi at that place,

For the past week and a fleck I have been trying to connect to my function VPN, without success. The instructions for connecting presume the customer is a Windows 7 system.

The vpn is "IPSec (L2TP/IPSEC)" using a Pre-Shared Key.

For the purpose of this postal service I will employ simulated details and values:

gateway: vpn.office.com
PSK: vpn-office-com
username: your-login-username
password: your-login-countersign
domain (optional): part-name

What I accept tried so far, includes:

compiled every IPSEC kernel module -> No appreciable difference.

KVPN -> Gives an error racoon config error so a long list of other debug info which as information technology is security related I don't want post indiscriminately.

VPNC -> reports "No responce from target"
Cisco and regular UPD
I accept tried setting diverse ports to use, 47, l, 51, 443, 500, 1701, 1723, 10000

Strongswan -> the demon starts simply I cannot find evidence of a connection
ipsec.conf and ipsec.secret configured for the in a higher place details respectively.

I can only guess that this isn't a firewall upshot as a colleague who already connects to the vpn can only practice then using a virtual machine running Windows 7. My colleague says this is because of
firewall and routing issues from his Linux desktop. My assertion beingness that the virtual machines has to pass through the host and any other firewall in his network.

Please help...

Last edited by Duco Ergo Sum on Tue Oct fourteen, 2014 12:11 am; edited 1 fourth dimension in total

Dorsum to meridian

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Tue Aug nineteen, 2014 8:56 pm   Mail subject: Reply with quote

I wrote a Gentoo wiki article covering setting upwards the server side of information technology: https://wiki.gentoo.org/wiki/IPsec_L2TP_VPN_server . Because all the protocols (ipsec, lt2p and pppd) are peer-to-peer, configuring information technology on the client side has a lot of similarities.
Back to elevation

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 21, 2014 7:59 am   Post subject: Reply with quote

Thank you.

I call back what I need is the "Ipsec ID" (group id/name) parameter. I take a working Windows organisation at present so I'll interrogate that.

Dorsum to superlative

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Monday Aug 25, 2014 ten:twenty pm   Post bailiwick: Reply with quote

This is really frustrating.

I now take:


  • VPNC which times out without much indication of anything happening.
  • StrongSwan which starts merely I don't see whatever sign of a VPN nor have I institute a mode to test it.
  • OpenL2TP which I've had to install an overlay (booboo) to get. This doesn't seem to be able to initiate sessions, tunnel id not found, while tunnel testify - shows the tunnel I configured.
  • NetworkManager seems to permit a sub-set of functionality in its configuration of unlike sub-systems merely it protests that its unable to find an agent when I endeavour to first a session.

Additionally, I've experimented with Windows. The initial setup is catchy but the VPN works. No boosted data needed. With security in mind I'g sure, they've hidden the config details from prying eyes thus thwarting my programme to find the IP Sec ID there.

I am kickoff to question if it this is a propriety MS VPN implementation or could my system be just missing one picayune screw somewhere?

I have read the IPsec L2TP VPN server wiki folio and attempted to adjust its wisdom to my needs but unfortunately unsuccessfully.

Please tell me how I can exam a VPN connection, just to meet if it exists?

--
You know yous actually demand help when the voices tell you that yous're condign obsessed!

Dorsum to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Midweek Aug 27, 2014 three:39 am   Postal service bailiwick: Reply with quote

The offset, and near dificult layer, is the ipsec layer. Hither's a elementary config file you can adapt. Every bit the wiki page testify, uncomment the "include" line at the very lesser of /etc/ipsec.conf and create a /etc/ipsec.d/office.vpn.com.conf with content similar to the following:
Code:

conn vpnclient
type=send
authby=secret
pfs=no
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.office.com
rightprotoport=udp/l2tp
motorcar=add

Don't forgot to create a /etc/ipsec.d/part.vpn.com.secret file too:

Lawmaking:

vpn.office.com %whatsoever : PSK "vpn-office-com"

Then start the ipsec service, and bring upwards your connectedness with "ipsec auto --up vpnclient" If you go a line in the log similar to "STATE_QUICK_I2: Sent QI2, IPsec SA established...." then y'all have ipsec connectivity.

ipsec is the hard part. Once you've got that, the l2tp tunnel is much simpler.

Dorsum to pinnacle

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 28, 2014 12:48 am   Post subject: Reply with quote

Hullo Salahx,

Thanks for again answering, I am very grateful.

The command 'ipsec upward vpnclient' has been most illustrative. StrongSwan doesn't go a response from the office network either.

Code:

initiating IKE_SA vpn.part.com[one] to 17.xi.vii.5
generating IKE_SA_INIT asking 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending parcel: from 1.2.3.4[500] to 17.xi.vii.5[500] (996 bytes)
received packet: from 17.eleven.7.v[500] to one.two.iii.4[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 exchange on IKEv2 SA
retransmit 1 of request with message ID 0
sending parcel: from 1.2.three.4[500] to 17.11.7.5[500] (996 bytes)
received packet: from 17.eleven.vii.v[500] to one.two.3.four[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 substitution on IKEv2 SA
retransmit 2 of request with bulletin ID 0
sending packet: from one.two.3.iv[500] to 17.11.7.five[500] (996 bytes)
received parcel: from 17.eleven.vii.five[500] to i.two.3.4[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 exchange on IKEv2 SA
retransmit 3 of request with message ID 0
sending bundle: from 1.2.3.4[500] to 17.xi.7.five[500] (996 bytes)
received bundle: from 17.eleven.7.5[500] to ane.2.3.4[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 substitution on IKEv2 SA

[  ...  ]

giving up after 5 retransmits

And then now both VPNC and StrongSwan time out.

Nutrient for thought.

Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Thu Aug 28, 2014 6:53 am   Mail subject: Reply with quote

Its seeing SOMETHING on the other side, its merely having trouble negotiating with information technology. It appears its trying to negoitate an IKEv2 connection, but we want IKEv1.

So lets tweak the config a fleck:

Code:

conn vpnclient
keyexchange=ikev1
type=send
authby=hugger-mugger
pfs=no
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
correct=vpn.office.com
rightprotoport=udp/l2tp
auto=add
Dorsum to elevation

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 28, 2014 8:49 am   Mail field of study: Reply with quote

Thanks.

We're making progress, new response message:

Code:

ipsec upward vpn.office.com
initiating Chief Mode IKE_SA vpn.part.com[1] to 17.eleven.vii.5
generating ID_PROT asking 0 [ SA V V V V ]
sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (220 bytes)
received package: from 17.11.7.5[500] to 1.2.three.iv[500] (160 bytes)
parsed INFORMATIONAL_V1 asking 0 [ North(NO_PROP) ]
received NO_PROPOSAL_CHOSEN error notify
establishing connection 'vpn.role.com' failed

My installed version of StrongSwan does not support the

Code:
psf=no
key word. Therefore this is what my config looks like at the moment:
Lawmaking:

conn vpn.office.com
keyexchange=ikev1
type=send
authby=secret
esp=des-sha1-modp1024
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.function.com
rightprotoport=udp/l2tp
auto=add
Back to top

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 28, 2014 9:12 am   Post field of study: Reply with quote

Looking in Windows

Command Panel - Administrative Tools - Windows Firewall with Advanced Security - Windows Firewall Properites (IPsec Settings) - Customize IPsec Defaults (Key substitution (Main Fashion) - Advanced [Customize]) - Customize Advanced Key Substitution Settings

Code:

Security methods:
Integrity       Encryption          Central exchange algorithm
SHA-1          AES-CBC 128     Diffie-Hellman Grouping ii (default)
SHA-1          3DES                 Diffie-Hellman Group two

I'grand off to work now but will experiment with these values when I get back.

Back to elevation

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Thu Aug 28, 2014 4:xiv pm   Post subject: Reply with quote

Its "pfs=no" non "psf=no". It doesn't thing anyway because the command is ignored under strongSwan and "no" is the default. You shouldn't need the "esp=des-sha1-modp1024" every bit information technology should choose the right method during proffer procedure. In fact that will negotate PFS which is Non what y'all want - Microsoft's IKEv1 daemon doesn't support PFS.

Note that Windows has TWO implementations of ipsec: the IKEv1 1 used for l2tp tunnel, and and IKEv2 one which is controlled via the ipsec snap-in. The windows Firewall and other ipsec settings refer to the latter, simply nosotros want to apply the former.

Dorsum to top

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Friday Aug 29, 2014 12:04 am   Post discipline: Reply with quote

Apologies, "psf" was a typo.

Yet, now mater how I try to configure the pfs option, I get the same result.

Code:

parsed INFORMATIONAL_V1 asking 0 [ Due north(NO_PROP) ]
received NO_PROPOSAL_CHOSEN error notify
establishing connection 'vpn.office.com' failed
Back to summit

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Fri Aug 29, 2014 12:14 am   Postal service subject: Reply with quote

pfs selection is ignored in strongSwan anyway. Simply that "esp" line has to exist removed, because i know its wrong. If the server Notwithstanding won't accept whatever proposals offered by strongswan, even without the "esp" line there an "ike-scan" package in portage that should requite some information on what proposals the gateway will accept.
Back to elevation

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Fri Aug 29, 2014 8:45 am   Mail subject: Reply with quote

Hi,

I have used IKE-Scan which prompted me to change my Config as below and this has generated the follow information.

ike-browse output

Code:

ike-scan --verbose vpn.office.com
DEBUG: pkt len=336 bytes, bandwidth=56000 bps, int=52000 us
Starting ike-browse i.nine with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/)
17.eleven.vii.5  Main Fashion Handshake returned HDR=(CKY-R=[Available On Request]) SA=(Enc=3DES Hash=SHA1 Group=ii:modp1024 Auth=PSK LifeType=Seconds LifeDuration=28800)
VID=[Available On Request] (IKE Fragmentation)

Ending ike-scan 1.nine: 1 hosts scanned in 0.037 seconds (27.14 hosts/sec).  1 returned handshake; 0 returned notify

New Config

Code:

conn vpn.office.com
keyexchange=ikev1
type=transport
authby=secret
ike=3des-sha1-modp1024
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.office.com
rightprotoport=udp/l2tp
motorcar=add together

ipsec output

Code:

ipsec up vpn.role.com
initiating Primary Way IKE_SA vpn.office.com[three] to 17.xi.7.5
generating ID_PROT request 0 [ SA V V Five V ]
sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (184 bytes)
received package: from 17.11.7.5[500] to 1.2.iii.4[500] (116 bytes)
parsed ID_PROT response 0 [ SA Five V ]
received typhoon-ietf-ipsec-nat-t-ike-02\n vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT asking 0 [ KE No NAT-D NAT-D ]
sending packet: from 1.2.3.4[500] to 17.11.vii.5[500] (244 bytes)
received packet: from 17.11.7.v[500] to ane.2.3.4[500] (304 bytes)
parsed ID_PROT response 0 [ KE No Five V V 5 NAT-D NAT-D ]
received Cisco Unity vendor ID
received XAuth vendor ID
received unknown vendor ID: [Bachelor On Asking]
received unknown vendor ID: [Available On Request]
generating INFORMATIONAL_V1 request [Available On Request] [ Due north(INVAL_KE) ]
sending packet: from 1.ii.3.four[500] to 17.eleven.7.5[500] (56 bytes)
establishing connection 'vpn.role.com' failed

Charon Log

Code:

Aug 29 09:xiv:39 sveta charon: 02[CFG] received stroke: initiate 'vpn.office.com'
Aug 29 09:14:39 sveta charon: xiii[IKE] initiating Main Way IKE_SA vpn.office.com[3] to 17.xi.7.5
Aug 29 09:14:39 sveta charon: xiii[IKE] initiating Main Fashion IKE_SA vpn.office.com[three] to 17.xi.vii.5
Aug 29 09:14:39 sveta charon: xiii[ENC] generating ID_PROT request 0 [ SA V V V 5 ]
Aug 29 09:xiv:39 sveta charon: thirteen[Internet] sending packet: from one.2.3.iv[500] to 17.11.7.5[500] (184 bytes)
Aug 29 09:14:39 sveta charon: 06[NET] received package: from 17.11.7.5[500] to 1.ii.3.4[500] (116 bytes)
Aug 29 09:fourteen:39 sveta charon: 06[ENC] parsed ID_PROT response 0 [ SA V V ]
Aug 29 09:fourteen:39 sveta charon: 06[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Aug 29 09:fourteen:39 sveta charon: 06[IKE] received FRAGMENTATION vendor ID
Aug 29 09:14:39 sveta charon: 06[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Aug 29 09:14:39 sveta charon: 06[Net] sending packet: from 1.2.3.4[500] to 17.xi.7.5[500] (244 bytes)
Aug 29 09:14:40 sveta charon: 05[Internet] received packet: from 17.11.seven.5[500] to one.ii.3.4[500] (304 bytes)
Aug 29 09:14:forty sveta charon: 05[ENC] parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
Aug 29 09:14:forty sveta charon: 05[IKE] received Cisco Unity vendor ID
Aug 29 09:14:40 sveta charon: 05[IKE] received XAuth vendor ID
Aug 29 09:fourteen:40 sveta charon: 05[ENC] received unknown vendor ID: [Available On Request]
Aug 29 09:xiv:40 sveta charon: 05[ENC] received unknown vendor ID: [Bachelor On Request]
Aug 29 09:14:forty sveta charon: 05[ENC] generating INFORMATIONAL_V1 request [Available On Request] [ N(INVAL_KE) ]
Aug 29 09:xiv:40 sveta charon: 05[NET] sending packet: from 1.ii.three.four[500] to 17.xi.seven.5[500] (56 bytes)
Dorsum to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Fri Aug 29, 2014 3:12 pm   Postal service subject field: Reply with quote

OK now its accepting the proposal but its having trouble with the PSK. Information technology probably has to practice with how the VPN server is ideifying itself. Then lets change the secrets file to
Code:
 : PSK "vpn-part-com"

This will make strongSwan use the fundamental for all connections.
Back to peak

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Fri Aug 29, 2014 9:51 pm   Post subject: Reply with quote

Awesome! Cheers!
Lawmaking:

ipsec upwards vpn.office.com
initiating Primary Manner IKE_SA vpn.role.com[1] to 17.11.7.5
generating ID_PROT asking 0 [ SA V 5 Five V ]
sending packet: from ane.2.3.4[500] to 17.11.vii.5[500] (184 bytes)
received packet: from 17.11.7.v[500] to 1.2.3.4[500] (116 bytes)
parsed ID_PROT response 0 [ SA Five Five ]
received draft-ietf-ipsec-nat-t-ike-02\due north vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
sending packet: from ane.2.three.4[500] to 17.eleven.vii.five[500] (244 bytes)
received bundle: from 17.eleven.7.v[500] to 1.ii.3.four[500] (304 bytes)
parsed ID_PROT response 0 [ KE No V V 5 V NAT-D NAT-D ]
received Cisco Unity vendor ID
received XAuth vendor ID
received unknown vendor ID: [Bachelor On Request]
received unknown vendor ID: [Available On Request]
local host is behind NAT, sending keep alives
generating ID_PROT request 0 [ ID HASH ]
sending packet: from i.2.3.4[4500] to 17.11.vii.5[4500] (68 bytes)
received packet: from 17.11.7.5[4500] to 1.ii.3.4[4500] (84 bytes)
parsed ID_PROT response 0 [ ID HASH 5 ]
received DPD vendor ID
IDir '17.xi.seven.5' does non match to 'vpn.role.com'
deleting IKE_SA vpn.office.com[i] between 1.2.iii.4[ane.2.iii.4]...17.11.7.v[%any]
sending DELETE for IKE_SA vpn.office.com[ane]
generating INFORMATIONAL_V1 asking [Available On Asking] [ HASH D ]
sending packet: from 1.2.three.four[4500] to 17.11.seven.v[4500] (84 bytes)
connectedness 'vpn.part.com' established successfully

I have pinged my office PC and did not become whatever returned packets. I haven't attempted to fix the L2TP layer notwithstanding but your guide says that is insufficiently easy.

These lines though exercise worry me:

Code:

IDir '17.11.vii.5' does not match to 'vpn.office.com'
deleting IKE_SA vpn.function.com[i] between 1.2.3.4[i.2.3.iv]...17.xi.7.5[%any]
sending DELETE for IKE_SA vpn.office.com[1]
Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Fri Aug 29, 2014 11:03 pm   Postal service subject area: Reply with quote

Were most there, simply were non at that place all the same. This goes dorsum with "how the server is identifty itself" problem with the PSK: Instead of identify itself via its name (vpn.case.com), it does so by its IP address (17.11.7.5).

Nosotros simply need to make one tweak:

Code:

conn vpn.part.com
keyexchange=ikev1
blazon=transport
authby=surreptitious
ike=3des-sha1-modp1024
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.office.com
rightprotoport=udp/l2tp
rightid=17.xi.7.5
auto=add

Or failing that, change the value of "right=" from "vpn.role.com" to "17.11.7.five" instead. Notation y'all still can't do annihilation with the connexion yet, as merely L2TP packets volition be passed beyond the ipsec link (thus you cannot ping anything across the link).

Dorsum to pinnacle

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Sat Aug 30, 2014 5:21 pm   Post bailiwick: Reply with quote

Perfect, next pace L2TP!
Code:

ipsec up vpn.part.com
initiating Main Mode IKE_SA vpn.office.com[1] to 17.xi.7.5
generating ID_PROT request 0 [ SA V Five Five 5 ]
sending packet: from ane.ii.three.4[500] to 17.xi.7.5[500] (184 bytes)
received packet: from 17.eleven.7.v[500] to 1.two.3.4[500] (116 bytes)
parsed ID_PROT response 0 [ SA V V ]
received draft-ietf-ipsec-nat-t-ike-02\due north vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
sending packet: from 1.2.three.4[500] to 17.11.7.5[500] (244 bytes)
received parcel: from 17.11.7.5[500] to 1.2.3.4[500] (304 bytes)
parsed ID_PROT response 0 [ KE No V 5 V V NAT-D NAT-D ]
received Cisco Unity vendor ID
received XAuth vendor ID
received unknown vendor ID: [Bachelor On Request]
received unknown vendor ID: [Available On Request]
local host is behind NAT, sending keep alives
generating ID_PROT request 0 [ ID HASH ]
sending packet: from one.two.iii.4[4500] to 17.11.vii.five[4500] (68 bytes)
received packet: from 17.eleven.vii.five[4500] to i.2.three.four[4500] (84 bytes)
parsed ID_PROT response 0 [ ID HASH V ]
received DPD vendor ID
IKE_SA vpn.function.com[ane] established between one.2.iii.four[1.2.iii.4]...17.xi.seven.5[17.eleven.7.5]
generating QUICK_MODE request [Available On Request] [ HASH SA No ID ID NAT-OA NAT-OA ]
sending packet: from 1.two.iii.iv[4500] to 17.11.vii.5[4500] (220 bytes)
received packet: from 17.11.vii.five[4500] to 1.2.3.4[4500] (180 bytes)
parsed QUICK_MODE response [Available On Request] [ HASH SA No ID ID North((24576)) NAT-OA ]
received 28800s lifetime, configured 0s
CHILD_SA vpn.office.com{1} established with SPIs [Available On Request] [Available On Request] and TS one.ii.iii.4/32[udp/l2tp] === 17.eleven.seven.five/32[udp/l2tp]

connection 'vpn.office.com' established successfully

Thanks. I expect every bit soon as I try L2TP I'll be back here dislocated every bit ever. Either way, I'll report back.

Dorsum to top

View user's profile Send private message

Duco Ergo Sum
Amateur
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Saturday Aug 30, 2014 x:04 pm   Post subject: Reply with quote

I thought this might happen.

/etc/xl2tp/xl2tpd.conf

Code:

[global]                                                                ; Global parameters:
port = 1701                                                     ; * Demark to port 1701
; auth file = /etc/l2tpd/l2tp-secrets   ; * Where our challenge secrets are
access control = no                                     ; * Refuse connections without IP friction match
; rand source = dev                     ; Source for entropy for random
;                                       ; numbers, options are:
;                                       ; dev - reads of /dev/urandom
;                                       ; sys - uses rand()
;                                       ; egd - reads from egd socket
;                                       ; egd is non yet implemented
;
[lns default]                                                   ; Our fallthrough LNS definition
; ip range = 192.168.0.1-192.168.0.20   ; * Allocate from this IP range
; ip range = lac1-lac2                                  ; * And anything from lac1 to lac2'southward IP
; lac = 192.168.1.4 - 192.168.1.8               ; * These tin can connect as LAC's
; no lac = untrusted.marko.cyberspace                  ; * This guy can't connect
; hidden chip = no                                               ; * Use subconscious AVP's?
local ip = ane.2.3.4                             ; * Our local IP to use
; reject hallmark = no                    ; * Refuse authentication altogether
require authentication = yes                    ; * Require peer to authenticate
unix authentication = no                                ; * Use /etc/passwd for auth.
name = vpn.office.com                                                ; * Report this every bit our hostname
pppoptfile = /etc/ppp/options.l2tpd         ; * ppp options file

/etc/ppp/options.l2tpd

Code:

noccp
auth
crtscts
mtu 1410
mru 1410
nodefaultroute
lock
proxyarp
silent

I started xl2tpd with: /etc/init.d/xl2tpd outset

Then nothing, I'1000 sure I'm missing something this is a client after all and your instructions are for a server. So close!

Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Sun Aug 31, 2014 viii:46 am   Post subject area: Reply with quote

Configuring an l2tp the customer is a dissimilar that the server - thakfully customer side is even easier:

The /etc/xl2tpd/xl2tpd.conf is even simpler and then the server i:

Code:

[lac vpnclient]
lns = vpn.role.com
pppoptfile = /etc/ppp/options.xl2tpd.customer

You may not need the /etc/ppp/options.xl2tpd.client file (in which case annotate that line out), just if yous exercise, here's ane that should piece of work:

Code:

ipcp-have-local
ipcp-accept-remote
refuse-eap
require-mschap-v2
noccp
noauth
mtu 1410
mru 1410
nodefaultroute
usepeerdns
lock
#debug

Start up the xl2tpd service, then initiate a connectedness:

Lawmaking:
xl2tpd-control connect vpnclient OFFICE-NAME\\your-login-username your-login-password

Note Ii backslashes (the OFFICE-NAME\\ role may be optinal)

xl2tpd may fail with " open_controlfd: Unable to open /var/run/xl2tpd/l2tp-control for reading". If you run across this, just practice a "mkdir /var/run/xl2tpd"

Note that xl2tpd-command will always only return "00 OK", to actually see if information technology works, you need to check the organisation logs.

Back to top

View user's profile Send private message

Duco Ergo Sum
Amateur
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Sun Aug 31, 2014 xi:58 pm   Post subject: Reply with quote

Hi,

I take at present tried a number of variations on a theme. Mostly where vpn.office.com could mean the url vpn.office.com or the ipsec connection name VPN.Function.COM, capitalise to emphasis the distinciton
of these two roles. Also with and without Function-Proper noun\\login-proper noun login-password and in combination with including excluding options.xl2tpd.client.

/etc/xl2tpd/xl2tpd.conf

Code:

[lac vpnclient]
lns = vpn.office.com
pppoptfile = /etc/ppp/options.xl2tpd.client

/etc/ppp/options.xl2tpd.customer

Code:

ipcp-accept-local
ipcp-take-remote
refuse-eap
require-mschap-v2
noccp
noauth
mtu 1410
mru 1410
nodefaultroute
usepeerdns
lock
Code:

xl2tpd-control connect vpnclient OFFICE-NAME\\your-login-username your-login-password
Code:

Sep  i 00:39:58 sveta xl2tpd[4845]: Connecting to host vpn.office.com, port 1701
Sep  1 00:40:01 sveta cron[4865]: (OhCaptian) CMD (test -x /usr/sbin/run-crons && /usr/sbin/run-crons)
Sep  1 00:twoscore:03 sveta xl2tpd[4845]: Maximum retries exceeded for tunnel 16278.  Closing.
Sep  i 00:40:03 sveta xl2tpd[4845]: Connection 0 airtight to 17.11.vii.5, port 1701 (Timeout)
Sep  1 00:40:08 sveta xl2tpd[4845]: Unable to deliver endmost message for tunnel 16278. Destroying anyhow.

If I get the opportunity, I volition be more than methodical in the morning.

Back to elevation

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Monday Sep 01, 2014 four:02 am   Postal service subject: Reply with quote

xl2tpd and strongswan are unconnect, thus the "lns" value in the LAC department is just the server's domain name or IP address. In this case though, its not seeing the L2TP LNS (server) on the other side . This usually means the ipsec tunnel is down. Bank check and restart the tunnel if needed.

To see if information is going over the tunnel:

Lawmaking:
tcpdump proto 50
You lot won't see anything cross the tunnel until xl2tpd-connect is started. You lot should run into packets going in both directions. If non, either the tunnel is downward, strongSwan is configured wrong or something (like a local firewall) is getting in the way.
In dissimilarity, no l2tp packets should seen in the clear:
Lawmaking:
tcpdump udp port 1701
This command should produce NO output when xl2tpd-connect is invoked. If information technology does either the tunnel is down, or strongSwan is configured wrong.
Back to peak

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Tue Sep 02, 2014 9:09 am   Mail service field of study: Reply with quote

Hi,

I have tried multifariousness configurations of xl2tp. Just to add together to the confusion my mobo has two lan ports and wifi, I fear now this characteristic is coming dorsum to confuse me and my set-upwardly. 'eno1' is the lan port which is would be eth0 and is currently the only operational network connexion in this machine.

It appears that tcpdump is looking at 'bond0' so non finding annihilation. Could xl2tp be doing the aforementioned?

tcpdump -i eno1 produces the same output as below.

Make connexion

Lawmaking:

# xl2tpd-control connect vpnclient vpn.part.com\\Uname Upassword
00 OK

Test proto fifty

Code:

# tcpdump proto 50
tcpdump: WARNING: bond0: no IPv4 address assigned
error : ret -i
tcpdump: verbose output suppressed, utilize -v or -vv for full protocol decode
listening on bond0, link-type EN10MB (Ethernet), capture size 65535 bytes
0 packets captured
0 packets received by filter
0 packets dropped by kernel

Test udp port 1701

Code:

# tcpdump udp port 1701
tcpdump: WARNING: bond0: no IPv4 address assigned
error : ret -ane
tcpdump: verbose output suppressed, use -v or -vv for total protocol decode
listening on bond0, link-type EN10MB (Ethernet), capture size 65535 bytes
0 packets captured
0 packets received past filter
0 packets dropped by kernel

Some network devices

Code:

# ifconfig
bond0: flags=5123<UP,Broadcast,MASTER,MULTICAST>  mtu 1500
ether ce:71:b2:5a:c2:1d  txqueuelen 0  (Ethernet)
RX packets 0  bytes 0 (0.0 B)
RX errors 0  dropped 0  overruns 0  frame 0
TX packets 0  bytes 0 (0.0 B)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

eno1: flags=4163<UP,Circulate,RUNNING,MULTICAST>  mtu 1500
inet 1.2.3.four  netmask 255.255.255.0  broadcast 10.1.1.255
inet6 fd00::ca60:ff:fecc:4614  prefixlen 64  scopeid 0x0<global>
inet6 fe80::ca60:ff:fecc:4614  prefixlen 64  scopeid 0x20<link>
ether c8:lx:00:cc:46:fourteen  txqueuelen 1000  (Ethernet)
RX packets 14060  bytes 14971920 (14.2 MiB)
RX errors 0  dropped iii  overruns 0  frame 0
TX packets 10353  bytes 1465328 (ane.3 MiB)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
device interrupt 20  memory #x########-########

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
inet 127.0.0.ane  netmask 255.0.0.0
inet6 ::1  prefixlen 128  scopeid 0x10<host>
loop  txqueuelen 0  (Local Loopback)
RX packets 40  bytes 16841 (sixteen.4 KiB)
RX errors 0  dropped 0  overruns 0  frame 0
TX packets 40  bytes 16841 (16.four KiB)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

Log

Code:

Sep  two 08:55:31 sveta xl2tpd[4128]: xl2tpd version xl2tpd-one.three.1 started on sveta PID:4128
Sep  2 08:55:31 sveta xl2tpd[4128]: Written past Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Sep  2 08:55:31 sveta xl2tpd[4128]: Forked by Scott Balmos and David Stipp, (C) 2001
Sep  2 08:55:31 sveta xl2tpd[4128]: Inherited by Jeff McAdams, (C) 2002
Sep  2 08:55:31 sveta xl2tpd[4128]: Forked again by Xelerance (world wide web.xelerance.com) (C) 2006
Sep  2 08:55:31 sveta xl2tpd[4128]: Listening on IP address 0.0.0.0, port 1701
Sep  two 08:55:37 sveta charon: 09[IKE] sending keep live to 17.eleven.7.5[4500]
Sep  2 08:55:49 sveta charon: 10[Internet] received bundle: from 17.11.7.5[4500] to 1.2.3.iv[4500] (84 bytes)
Sep  2 08:55:49 sveta charon: ten[ENC] parsed INFORMATIONAL_V1 request [Available On Request] [ HASH N(DPD) ]
Sep  2 08:55:49 sveta charon: x[ENC] generating INFORMATIONAL_V1 request [Available On Request] [ HASH North(DPD_ACK) ]
Sep  2 08:55:49 sveta charon: 10[NET] sending package: from 1.two.iii.4[4500] to 17.xi.7.5[4500] (92 bytes)
Sep  ii 08:55:59 sveta xl2tpd[4128]: Connecting to host vpn.function.com, port 1701
Sep  2 08:55:59 sveta xl2tpd[4128]: Connection established to 17.11.seven.v, 1701.  Local: [Bachelor On Request], Remote: [Bachelor On Request] (ref=0/0).
Sep  two 08:55:59 sveta xl2tpd[4128]: Calling on tunnel [Available On Request]
Sep  2 08:55:59 sveta xl2tpd[4128]: Telephone call established with 17.xi.vii.v, Local: [Available On Request], Remote: [Available On Request], Serial: 1 (ref=0/0)
Sep  2 08:55:59 sveta xl2tpd[4128]: start_pppd: I'm running:
Sep  2 08:55:59 sveta xl2tpd[4128]: "/usr/sbin/pppd"
Sep  2 08:55:59 sveta xl2tpd[4128]: "passive"
Sep  2 08:55:59 sveta xl2tpd[4128]: "nodetach"
Sep  2 08:55:59 sveta xl2tpd[4128]: ":"
Sep  2 08:55:59 sveta xl2tpd[4128]: "name"
Sep  2 08:55:59 sveta xl2tpd[4128]: "vpn.office.com\Uname"
Sep  ii 08:55:59 sveta xl2tpd[4128]: "plugin"
Sep  2 08:55:59 sveta xl2tpd[4128]: "passwordfd.so"
Sep  2 08:55:59 sveta xl2tpd[4128]: "passwordfd"
Sep  2 08:55:59 sveta xl2tpd[4128]: "8"
Sep  2 08:55:59 sveta xl2tpd[4128]: "file"
Sep  2 08:55:59 sveta xl2tpd[4128]: "/etc/ppp/options.l2tpd.lns"
Sep  2 08:55:59 sveta xl2tpd[4128]: "ipparam"
Sep  two 08:55:59 sveta xl2tpd[4128]: "17.eleven.7.five"
Sep  2 08:55:59 sveta xl2tpd[4128]: "plugin"
Sep  2 08:55:59 sveta xl2tpd[4128]: "pppol2tp.so"
Sep  2 08:55:59 sveta xl2tpd[4128]: "pppol2tp"
Sep  2 08:55:59 sveta xl2tpd[4128]: "ix"
Sep  2 08:55:59 sveta pppd[4138]: Plugin passwordfd.so loaded.
Sep  ii 08:55:59 sveta pppd[4138]: Can't open up options file /etc/ppp/options.l2tpd.lns: No such file or directory
Sep  2 08:55:59 sveta xl2tpd[4128]: child_handler : pppd exited for call [Available On Request] with code 2
Sep  2 08:55:59 sveta xl2tpd[4128]: call_close: Call [Available On Asking] to 17.xi.7.v asunder
Sep  ii 08:55:59 sveta xl2tpd[4128]: Terminating pppd: sending TERM point to pid 4138
Sep  2 08:55:59 sveta xl2tpd[4128]: get_call: can't notice call [Available On Request] in tunnel [Available On Request]
(ref=0/0)
Sep  two 08:55:59 sveta xl2tpd[4128]: get_call: can't find phone call [Bachelor On Asking] in tunnel [Available On Request]
(ref=0/0)
Sep  two 08:55:59 sveta xl2tpd[4128]: check_control: Received out of order control packet on tunnel [Available On Request] (got 3, expected four)
Sep  two 08:55:59 sveta xl2tpd[4128]: handle_packet: bad control bundle!
Sep  two 08:55:59 sveta charon: 13[NET] received packet: from 17.eleven.seven.5[4500] to ane.2.3.4[4500] (68 bytes)
Sep  two 08:55:59 sveta charon: xiii[ENC] parsed INFORMATIONAL_V1 request [Bachelor On Request] [ HASH D ]
Sep  two 08:55:59 sveta charon: 13[IKE] received DELETE for ESP CHILD_SA with SPI ca6241bf
Sep  ii 08:55:59 sveta charon: xiii[IKE] endmost CHILD_SA VPN.OFFICE.COM{1} with SPIs [Available On Request] (318 bytes) [Available On Request] (398 bytes) and TS ane.2.3.4/32[udp/l2tp] ===
17.11.7.5/32[udp/l2tp]
Sep  two 08:55:59 sveta charon: 13[IKE] closing CHILD_SA VPN.OFFICE.COM{1} with SPIs [Available On Request] (318 bytes) [Bachelor On Request] (398 bytes) and TS 1.2.iii.four/32[udp/l2tp] ===
17.11.vii.five/32[udp/l2tp]
Sep  2 08:55:59 sveta charon: 08[NET] received packet: from 17.xi.7.5[4500] to 1.2.iii.4[4500] (84 bytes)
Sep  2 08:55:59 sveta charon: 08[ENC] parsed INFORMATIONAL_V1 asking [Available On Request] [ HASH D ]
Sep  two 08:55:59 sveta charon: 08[IKE] received DELETE for IKE_SA VPN.OFFICE.COM[1]
Sep  two 08:55:59 sveta charon: 08[IKE] deleting IKE_SA VPN.OFFICE.COM[one] between one.two.iii.iv[1.2.3.4]...17.xi.seven.five[17.11.7.five]
Sep  2 08:55:59 sveta charon: 08[IKE] deleting IKE_SA VPN.OFFICE.COM[1] between one.2.3.4[1.two.iii.iv]...17.11.7.5[17.11.7.five]
Sep  2 08:56:21 sveta kernel: [  387.050043] device bond0 entered promiscuous fashion
Sep  2 08:56:41 sveta kernel: [  406.710209] device bond0 left promiscuous mode
Sep  2 08:56:51 sveta kernel: [  417.080010] device bond0 entered promiscuous mode
Sep  2 08:57:04 sveta xl2tpd[4128]: Maximum retries exceeded for tunnel [Available On Request].  Closing.
Sep  2 08:57:04 sveta xl2tpd[4128]: Connexion [Available On Request] closed to 17.11.seven.five, port 1701 (Timeout)
Sep  ii 08:57:09 sveta xl2tpd[4128]: Unable to deliver closing bulletin for tunnel [Available On Asking]. Destroying anyway.
Sep  2 08:57:11 sveta kernel: [  436.160583] device bond0 left promiscuous manner
Sep  2 08:57:15 sveta kernel: [  441.038056] device bond0 entered promiscuous mode
Sep  2 08:57:21 sveta kernel: [  446.590475] device bond0 left promiscuous way
Sep  2 08:57:36 sveta kernel: [  461.822270] device bond0 entered promiscuous mode
Sep  2 08:57:54 sveta kernel: [  479.973547] device bond0 left promiscuous mode
Sep  2 08:58:06 sveta kernel: [  491.341755] device bond0 entered promiscuous fashion
Sep  two 08:58:thirteen sveta kernel: [  498.971002] device bond0 left promiscuous style
Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Tue Sep 02, 2014 v:01 pm   Mail subject: Reply with quote

We're making progress. According to the log, it seeing the l2tp server on the other end. That means the ipsec is up and configurated properly, and traffic is flowing across it..At present the trouble is pppd. pppd is getting some extraneous options from somewhere. Namely, the nonexistent "/etc/ppp/options.l2tpd.lns" is causing pppd to exit. However it shouldn't even be looking for that.

Very picayune configuration should be needed on the l2tp side,, merely in that location may exist one tweak we need:

Code:

[lac vpnclient]
lns = vpn.role.com
pppoptfile = /etc/ppp/options.xl2tpd.client
name = your-login-username

Some Cisco admission concentrators need the "name" thing, but normally, its not needed. However, adding information technology won't hurt. Everything else in /etc/xl2tpd/xl2tpd.conf should exist gone or commented out.

Dorsum to summit

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Wed Sep 03, 2014 12:41 am   Post subject: Reply with quote

I discovered a typo in the /etc/ppp/options.xl2tpd.client path namely the missing 'x'. Likewise I have added the user proper noun as you take advised and no joy.
Code:

[lac vpnclient]
lns = vpn.role.com
pppoptfile = /etc/ppp/options.[b]x[/b]l2tpd.client
name = Uname

pppoptfile = /etc/ppp/options.xl2tpd.client

Lawmaking:

ipcp-accept-local
ipcp-have-remote
pass up-eap
require-mschap-v2
noccp
noauth
mtu 1410
mru 1410
nodefaultroute
usepeerdns
lock

Using a sparse xl2tpd.conf no comments only the config we need the following log entry is produced.

Code:

Sep  3 01:28:26 sveta xl2tpd[4750]: setsockopt recvref[30]: Protocol non available
Sep  iii 01:28:26 sveta xl2tpd[4750]: Using l2tp kernel support.
Sep  3 01:28:26 sveta xl2tpd[4752]: xl2tpd version xl2tpd-1.3.1 started on sveta PID:4752
Sep  3 01:28:26 sveta xl2tpd[4752]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Sep  3 01:28:26 sveta xl2tpd[4752]: Forked by Scott Balmos and David Stipp, (C) 2001
Sep  3 01:28:26 sveta xl2tpd[4752]: Inherited past Jeff McAdams, (C) 2002
Sep  three 01:28:26 sveta xl2tpd[4752]: Forked again by Xelerance (www.xelerance.com) (C) 2006
Sep  3 01:28:26 sveta xl2tpd[4752]: Listening on IP address 0.0.0.0, port 1701
Sep  3 01:28:thirty sveta xl2tpd[4752]: Connecting to host vpn.role.com, port 1701
Sep  3 01:28:35 sveta xl2tpd[4752]: Maximum retries exceeded for tunnel 41.  Closing.
Sep  three 01:28:35 sveta xl2tpd[4752]: Connection 0 closed to 17.xi.7.five, port 1701 (Timeout)
Sep  3 01:28:35 sveta kernel: [ 5494.780053] device eno1 entered promiscuous mode
Sep  iii 01:28:39 sveta kernel: [ 5498.420761] device eno1 left promiscuous mode
Sep  3 01:28:40 sveta xl2tpd[4752]: Unable to evangelize closing bulletin for tunnel 41. Destroying anyway.

I have even tried swapping the [lac vpnclien]' for [lac VPN.Role.COM], it simply served to prove that the config is read at the start up of xl2ptd.

Dorsum to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Wed Sep 03, 2014 12:58 am   Mail subject area: Reply with quote

The name used for the lac isn't important. Its not seeing the l2tp server once again. Be sure the strongSwan connection is upwardly, and try again. If it notwithstanding won'r work, stop strongswan and xl2tp, in another windows do a "ip xfrm monitor", starts strongswan and xl2tpd. Connect via strongSwan and the window "ip xfrm monitor" should display some stuff. Make a connection with xl2tpd-connect and more stuff will announced in the other window (alarm: this command outputs the secrets keys for the ipsec connection. The real keys have been replaced with 0'south)

Something like this:

Code:

Updated src 192.168.10.108 dst 192.168.10.17
proto esp spi 0xc3e3e289 reqid 4 style transport
replay-window 32
auth-trunc hmac(sha1) 0x000000000000000000000000000000000000000 96
enc cbc(aes) 0x0000000000000000000000000000000
sel src 192.168.10.108/32 dst 192.168.10.17/32
src 192.168.ten.17 dst 192.168.10.108
proto esp spi 0xcdfbb1d9 reqid 4 mode ship
replay-window 32
auth-trunc hmac(sha1) 0x000000000000000000000000000000000000000 96
enc cbc(aes) 0x0000000000000000000000000000000
sel src 192.168.10.17/32 dst 192.168.10.108/32
src 192.168.10.17/32 dst 192.168.10.108/32 proto udp sport 1701 dport 1701
dir out action block priority 7936 ptype main
src 192.168.10.108/32 dst 192.168.x.17/32 proto udp sport 1701 dport 1701
dir in activity cake priority 7936 ptype main
Updated src 192.168.10.17/32 dst 192.168.ten.108/32 proto udp sport 1701 dport 1701
dir out priority 1792 ptype main
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid four mode transport
Updated src 192.168.10.108/32 dst 192.168.ten.17/32 proto udp sport 1701 dport 1701
dir in priority 1792 ptype main
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid iv manner transport
Async event  (0x20)  timer expired
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async consequence  (0x20)  timer expired
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async consequence  (0x20)  timer expired
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async upshot  (0x20)  timer expired
src 192.168.10.17 dst 192.168.10.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async consequence  (0x10)  replay update
src 192.168.10.17 dst 192.168.ten.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async upshot  (0x10)  replay update
src 192.168.x.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async issue  (0x10)  replay update
src 192.168.10.17 dst 192.168.10.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async effect  (0x10)  replay update
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async result  (0x10)  replay update
src 192.168.10.17 dst 192.168.10.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async event  (0x10)  replay update
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async event  (0x10)  replay update
src 192.168.ten.108 dst 192.168.x.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
....
Back to top

View user's profile Send private message

Display posts from previous:  
You cannot mail service new topics in this forum
You cannot reply to topics in this forum
Y'all cannot edit your posts in this forum
Yous cannot delete your posts in this forum
Y'all cannot vote in polls in this forum

locklearclearders.blogspot.com

Source: https://forums.gentoo.org/viewtopic-t-998042-start-0.html

0 Response to "System Cant Satisfy the Requested Bandwith. Please Input Again"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel