Troubleshoot IPsec VPN and failover groups - Sophos Firewall (2024)

Page permalink

Always use the following permalink when referencing this page. It will remain unchanged in future help versions.

https://docs.sophos.com/nsg/sophos-firewall/19.5/Help/en-us/webhelp/onlinehelp/index.html?contextId=site-to-site-VPN-troubleshooting-IPsec

To troubleshoot site-to-site IPsec VPN connections and failover groups, you can check the logs, IPsec profiles, and connection properties.

Check logs and configurations

Logs

The firewall uses the following files in /log to trace the IPsec events:

  • strongswan.log: IPsec VPN service log
  • charon.log: IPsec VPN charon (IKE daemon) log
  • strongswan-monitor.log: IPsec daemon monitoring log
  • dgd.log: Dead Gateway Detection (DGD) and VPN failover log

This page helps with troubleshooting errors that relate to this error message: IPsec connection could not be established

Open the following log file: /log/strongswan.log

IPsec connections

To troubleshoot a failover group, see the additional properties of the group's IPsec connections and their IPsec profiles.

  1. To see the additional properties of IPsec connections, go to Site-to-site VPN > IPsec.
  2. Under IPsec connections, click Show additional properties above the name column and select the properties you want to see in the IPsec connection list.

    Troubleshoot IPsec VPN and failover groups - Sophos Firewall (1)

IPsec profiles

  1. To see the additional properties of the IPsec profile used in a connection, go to Profiles > IPsec profiles.
  2. Click Show additional properties above the name column and select the additional properties you want to see.

    Troubleshoot IPsec VPN and failover groups - Sophos Firewall (2)

Troubleshoot IPsec connections and failover groups

See the following issues and their resolution.

Remote peer refuses Phase 1 proposal

The strongSwan log shows the following error message: Remote peer is refusing our Phase 1 proposals

Cause: Mismatched phase 1 proposals between the two peers.

  1. Make sure the VPN configuration on both firewalls has the same settings for the following:

    • Phase 1: Encryption, authentication, and DH group.
    • Gateway address: The peer gateway address you've entered on the local firewall matches the listening interface in the remote configuration.
    • Other settings: Local and remote IDs.
  2. If all the settings match, the remote firewall administrator must check the configuration at their end since the remote firewall has refused the connection.

Remote peer doesn't authenticate

The strongSwan log shows the following messages:

We have successfully exchanged Encryption and Authentication algorithms, we are now negotiating the Phase 1 SA encryption (hashing) key

Remote peer reports we failed to authenticate

Cause: The remote firewall couldn't authenticate the local request because the ID types don't match. Example: You've configured the local firewall's IPsec connection with Local ID set to IP address, but the remote firewall is configured to expect a DNS name.

  1. Check the logs on the remote firewall to make sure the mismatch of ID types has resulted in the error.
  2. Update the local and remote ID types and IDs with matching values on both firewalls.

Decryption error

Logs show the following error messages:

Error on decryption of the exchange

Information field of the IKE request is malformed or not readable

Cause: The cause is likely to be a preshared key mismatch between the two firewalls.

Rarely, the ISP or an upstream appliance, such as a router or another firewall, may corrupt the packet.

  1. Make sure the preshared key matches in the VPN configuration on both firewalls.
  2. If the preshared key matches, verify with the ISP or on the upstream devices if they've corrupted the packet.
  3. Make sure the WAN interface's MTU and MSS settings match the values given by the ISP.

Remote peer reports no match on the acceptable proposals

The strongSwan log shows the following messages:

Phase 1 is up

Initiating establishment of Phase 2 SA

Remote peer reports no match on the acceptable proposals

The remote firewall shows the following error message: NO_PROPOSAL_CHOSEN

Cause: Mismatched phase 2 proposal.

  1. Make sure the phase 2 settings for encryption and authentication algorithms and DH group match on both firewalls.
  2. If they match, check the remote firewall logs for the cause.

Invalid ID

The strongSwan log shows the following messages:

Phase 1 is up

Remote peer reports INVALID_ID_INFORMATION

Cause:

  1. Sign in to the CLI and click 5 for Device management and then click 3 for Advanced shell.
  2. Enter the following command: ipsec statusall

    You can see that the SA (Security Association) isn't shown. See the following image:

    Troubleshoot IPsec VPN and failover groups - Sophos Firewall (3)

  3. Enter the following command: ip xfrm policy

    The output doesn't show the phase 2 SAs. During the phase 2 negotiation, the local and remote subnets specified on the firewalls didn't match. For example, the remote firewall expects 192.168.0.0/24, but the local firewall tries to negotiate using 192.168.1.0/24.

  4. Make sure the configured subnets match on both firewalls.

  5. If the subnets match, the remote administrator must check the remote firewall's logs if the error persists.

IPsec connections established but traffic stops later

One or more IPsec connections are established between Sophos Firewall and a third-party firewall. Traffic stops flowing after some time.

  1. Sign in to the CLI console. See Accessing Command Line Console.
  2. Type 5 to select Device Management, then type 3 to select Advanced Shell.
  3. Enter the following command: ipsec statusall

    The output shows that IPSec SAs have been established.

  4. Optional: For route-based VPN, enter the following command: ip xfrm state

    The output shows the transform sets for the VPN exist, that is, the SAs match.

  5. Check one or more of the following possible causes and resolutions:

    Cause: Third-party remote firewall uses traffic-based rekeying.

    Resolution: Sophos Firewall only supports time-based rekeying. If you've configured traffic-based rekeying on the third-party remote firewall, change it to time-based rekeying.

    Cause: Two or more IPsec connections have the same local and remote subnets (including Any-Any configurations) but aren't in the same failover group.

    Resolution: Multiple IPsec connections with the same local and remote subnets (including Any-Any configurations) only work if the IPsec connections are in the same failover group. To resolve this issue, do as follows:

    1. Go to Site-to-site VPN > IPsec.
    2. Under IPsec connections, click Show additional properties.
    3. Select Local subnet and Remote subnet.
    4. Click OK.

      The Local subnet and Remote subnet columns appear. Check the IPsec connections that have similar local and remote subnet configurations.

      Example:

      Troubleshoot IPsec VPN and failover groups - Sophos Firewall (4)

    5. Configure the IPsec connections with similar local and remote subnets configurations in the same failover group. See Add a failover group.

    6. If you don't want to configure them in the same failover group, you must change those IPsec connections' local and remote subnet configurations and make sure they aren't similar.

    Cause: For route-based VPN, two or more XFRM interfaces are configured with an IP address that belongs to the same network address or have overlapping subnets.

    Resolution: Each XFRM interface must be in a unique network address and can't have overlapping subnets.

    For example, if xfrm1 is configured with 192.168.0.1/24 and xfrm2 is configured with 192.168.0.6/24, they're in the same network address, so a routing issue occurs. Another example is if xfrm1 is configured with 192.168.0.1/16 and xfrm2 is configured with 192.168.0.6/24, the subnets overlap, so a routing issue occurs.

    To resolve this issue, go to Network > Interfaces and change the IP address configuration of the XFRM interfaces that are in the same network or have overlapping subnets. See Edit the xfrm interface (HO).

    Cause: For policy-based VPN, the idle timeout is set on the remote firewall.

    Resolution: Turn off the idle timeout on the remote firewall.

    Cause: Key exchange collisions.

    Resolution: To prevent key exchange collisions, do as follows:

    1. Set the initiator's phase 1 and phase 2 key life values lower than the responder's.
    2. Set the phase 2 key life lower than the phase 1 value in both firewalls.

      Example:

      Key life Firewall 1 Firewall 2
      Phase 1 12600 seconds 10800 seconds
      Phase 2 5400 seconds 3600 seconds

IPsec connection is disconnected because the associated interface is turned off

If your site-to-site IPsec connection is disconnected, check if you have turned off the associated interface.

If you've turned off the associated interface:

  • Site-to-site IPsec connection initiators immediately disconnect the connection.
  • Site-to-site IPsec connection responders and remote access connections disconnect the connection when inactivity or Dead Peer Detection (DPD) time-out occurs.
Troubleshoot IPsec VPN and failover groups - Sophos Firewall (2024)
Top Articles
Republic – Annenberg Classroom
9 Best Tether (USDT) Wallets in 2024
Jordanbush Only Fans
Davita Internet
Craigslist Free En Dallas Tx
Craigslist Niles Ohio
12 Rue Gotlib 21St Arrondissem*nt
Mychart Mercy Lutherville
Phone Number For Walmart Automotive Department
How To Be A Reseller: Heather Hooks Is Hooked On Pickin’ - Seeking Connection: Life Is Like A Crossword Puzzle
Wells Fargo Careers Log In
David Packouz Girlfriend
J Prince Steps Over Takeoff
Lycoming County Docket Sheets
[PDF] INFORMATION BROCHURE - Free Download PDF
Degreeworks Sbu
WWE-Heldin Nikki A.S.H. verzückt Fans und Kollegen
Peraton Sso
Curtains - Cheap Ready Made Curtains - Deconovo UK
Kvta Ventura News
Sky X App » downloaden & Vorteile entdecken | Sky X
Images of CGC-graded Comic Books Now Available Using the CGC Certification Verification Tool
라이키 유출
CVS Near Me | Columbus, NE
Acts 16 Nkjv
Azpeople View Paycheck/W2
12 Top-Rated Things to Do in Muskegon, MI
SuperPay.Me Review 2023 | Legitimate and user-friendly
Dtlr Duke St
Exl8000 Generator Battery
Regina Perrow
When His Eyes Opened Chapter 3123
Ts Modesto
Bj's Tires Near Me
LG UN90 65" 4K Smart UHD TV - 65UN9000AUJ | LG CA
Kgirls Seattle
Puffco Peak 3 Red Flashes
Pepsi Collaboration
Bianca Belair: Age, Husband, Height & More To Know
Prior Authorization Requirements for Health Insurance Marketplace
Infinite Campus Farmingdale
Chathuram Movie Download
Deepwoken: How To Unlock All Fighting Styles Guide - Item Level Gaming
Bustednewspaper.com Rockbridge County Va
'The Nun II' Ending Explained: Does the Immortal Valak Die This Time?
Hawkview Retreat Pa Cost
Playboi Carti Heardle
Mail2World Sign Up
Marine Forecast Sandy Hook To Manasquan Inlet
Costco Tire Promo Code Michelin 2022
How to Choose Where to Study Abroad
Texas Lottery Daily 4 Winning Numbers
Latest Posts
Article information

Author: Duncan Muller

Last Updated:

Views: 6095

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Duncan Muller

Birthday: 1997-01-13

Address: Apt. 505 914 Phillip Crossroad, O'Konborough, NV 62411

Phone: +8555305800947

Job: Construction Agent

Hobby: Shopping, Table tennis, Snowboarding, Rafting, Motor sports, Homebrewing, Taxidermy

Introduction: My name is Duncan Muller, I am a enchanting, good, gentle, modern, tasty, nice, elegant person who loves writing and wants to share my knowledge and understanding with you.