Specific Symptoms - D-Link NetDefend DFL-210 User Manual

Network security firewall ver 2.26.01
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

9.7.6. Specific Symptoms

An investigation as to why the tunnel only went down from one side is recommended. It could be
that DPD and/or Keep-Alive is only used on one side. Another possible cause could be that even
though it has received a DELETE packet, it has not deleted/removed the tunnel.
4. Payload_Malformed
This problem is very similar to the Incorrect pre-shared key problem described above. A possible
reason is that the PSK is of the wrong TYPE on either side (Passphrase or Hex key).
Verify that you are using the same type on both sides of the IPsec tunnel. If one side is using Hex
and the other Passphrase, this is most likely the error message that you will receive.
5. No public key found
This is a very common error message when dealing with tunnels that use certificates for
authentication.
Troubleshooting this error message can be very difficult as the possible cause of the problem can be
quite extensive. Also it is very important to keep in mind that when dealing with certificates you
may need to combine the ikesnoop logs with normal logs as ikesnoop does not give that much
information about certificates, while normal logs can provide important clues as to what the problem
could be. A good suggestion before you start to troubleshoot certificate based tunnels is to first
configure it as a PSK tunnel and then verify that it can successfully establish, then move on to using
Certificates. (Unless the configuration type prohibits that).
The possible causes are as follows:
The certificate on either side is not signed by the same CA server.
The certificate's validity time has expired or it has not yet started to be valid. The latter can
happen if the clock is set incorrectly on either the CA server or the NetDefend Firewall or they
are in different time zones.
The NetDefend Firewall is unable to reach the Certificate Revocation List (CRL) on the CA
server in order to verify if the certificate is valid or not. Double-check that the CRL path is valid
in the certificate's properties. (Using the CRL feature could be turned off.) Make sure also that
there is a DNS client configured in NetDefendOS in order for it to be able to correctly resolve
the path to the CRL.
If multiple similar or roaming tunnels exist and you want to separate them using ID lists, a
possible cause can be that none of the ID lists match the certificate properties of the connecting
user. Either the user is non-authorized or the certificate properties are wrong on the client or the
ID list needs to be updated with this user/information.
With L2TP, the client certificate is imported into the wrong certificate store on the Windows
client. When the client connects, it is using the wrong certificate.
9.7.6. Specific Symptoms
There are two specific symptoms that will be discussed in this section:
1. The tunnel can only be initiated from one side.
2. The tunnel is unable to be set up and the ikesnoop command reports a config mode XAuth
Note: L2TP with Microsoft Vista
With L2TP, Microsoft Vista tries by default to contact and download the CRL list,
while Microsft XP does not. This option can be turned off in Vista.
399
Chapter 9. VPN

Advertisement

Table of Contents
loading

Table of Contents