On Mon, 14 Oct 2019, Stefan Sperling wrote:

On Mon, Oct 14, 2019 at 05:55:58PM +1100, Damian McGuckin wrote:
Because I had a working L2TP server setup on $L2TP, I was not going to
go into its pf.conf, ipsec.conf, or anything else. But here is npppd.conf

    ike passive esp transport \
        proto udp from egress to any port 1701 \
        main auth "hmac-sha1" enc "3des" group modp1024 \
        quick auth "hmac-sha1" enc "3des" group modp1024 \
        psk "MYSECRET"

As an aside, you should avoid use of 3des because it is effecively plaintext.

I take your point about 3des but I was starting from a known configuration which works (albiet with the external interface hacing a Public IP)

There are ways to make even Windows clients use actual crypto with IPsec if
needed, though last I checked it could not be done from the GUI but required
powershell commands. (I don't have a URL handy, sorry, but this information
wasn't very hard to find when I needed it.)

Thanks. I will investigate. This has to work with iPads as well. Yuk!

You could try to pin-point the problem a bit more, starting with diagnostics
at the IPsec layer. Check debug logs from isakmpd, check ipsectl -sa, etc.

OK.

I suspect getting IPsec SAs going with both peers behind NAT is tricky.

I agree.

See my subsequent post where I replaced 'egress' above with the external IP (of the subsequently NAT'd npppd server). Closer. But not quite there.

Thanks - Damian

Reply via email to