This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Cert help needed, to get cisco VPN clients working

Hi folks, I need help getting some cisco clients connected to my UTM. Specifically these are iPads with a cisco IPsec profile on them. Basically, I'm really bad with certificates. I do not understand why this isn't working. I'll throw in some screenshots too. 

 

Here's what I did:

 

1. Generate new cert in the UTM, all default settings with just my country, city, and org in it. 2048 bit keysize, VPN ID: Distinguished name.

 

2. Create a new local user in the UTM.

 

3. Set this user's authentication cert as the one I just generated.

 

 

4. Head into remote access -> cisco VPN client. Set it to my wan interface, server certificate is the local x509 cert (default). Selected my desired LAN devices, and put that new user into the users and groups. AUTO firewall rules ON.

 

 

5. Download that generated cert from the utm.

 

5. Create new profile for iPad in my MDM, tell it to connect to my wan IP. set the username.

 

6. Upload the cert to the ipad, tell it to use that for authentication.

 

So, to summarize: there are two certificates in play here. One, the serverside cert, which is the default x509. The other, which is a cert I manually generated, is pushed to the ipad.

 

when I attempt to connect with the iPad, it fails to connect with the error: "Could not validate the server certificate"

 

and here is the livelog:

 

 
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: received Vendor ID payload [RFC 3947]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: received Vendor ID payload [XAUTH]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [Cisco-Unity]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: ignoring Vendor ID payload [FRAGMENTATION 80000000]
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8419: received Vendor ID payload [Dead Peer Detection]
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[10] 174.224.20.149:8419 #371: responding to Main Mode from unknown peer 174.224.20.149:8419
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[10] 174.224.20.149:8419 #371: NAT-Traversal: Result using RFC 3947: peer is NATed
2019:02:25-15:06:16 utm-2 pluto[8684]: | NAT-T: new mapping 174.224.20.149:8419/8439)
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[10] 174.224.20.149:8439 #371: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[10] 174.224.20.149:8439 #371: Peer ID is ID_DER_ASN1_DN: 'C=us, L=omitted, O=omitted, CN=ipad'
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[10] 174.224.20.149:8439 #371: crl not found
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[10] 174.224.20.149:8439 #371: certificate status unknown
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[5] 174.224.20.149:8439 #371: deleting connection "D_for ipad to daniel-lt-3"[10] instance with peer 174.224.20.149 {isakmp=#0/ipsec=#0}
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[5] 174.224.20.149:8439 #371: we have a cert and are sending it
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[5] 174.224.20.149:8439 #371: Dead Peer Detection (RFC 3706) enabled
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[5] 174.224.20.149:8439 #371: sent MR3, ISAKMP SA established
2019:02:25-15:06:16 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[5] 174.224.20.149:8439 #371: sending XAUTH request
2019:02:25-15:06:16 utm-2 pluto[8684]: packet from 174.224.20.149:8439: Informational Exchange is for an unknown (expired?) SA
2019:02:25-15:06:26 utm-2 pluto[8684]: ERROR: asynchronous network error report on eth2 for message to 174.224.20.149 port 8439, complainant 174.224.20.149: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
2019:02:25-15:07:26 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[5] 174.224.20.149:8439 #371: max number of retransmissions (2) reached STATE_XAUTH_R1
2019:02:25-15:07:26 utm-2 pluto[8684]: "D_for ipad to daniel-lt-3"[5] 174.224.20.149:8439: deleting connection "D_for ipad to daniel-lt-3"[5] instance with peer 174.224.20.149 {isakmp=#0/ipsec=#0}

 

Why do you think it isn't working? Thank you!



This thread was automatically locked due to age.
Parents
  • Hi Daniel,

    If you still need help after Doug's response, please Edit your opening post and insert your images into the post instead of linking to an outside site. We can't know if that external site is properly protected. The only malware I've gotten in over 10 years was from an external link to a picture in this forum several years ago.  Thanks in advance!

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • hey bob, totally understandable. I edited my post and changed a few minor details.

     

    Semi-unrelated: the reason why I have step 1 is because my UTM isn't letting me download auto-generated userauth certs. the download button is literally broken, I have tried in 3 different browsers. But for some reason when I manually generate a cert it lets me download it. I believe this is a known bug. I'm on an SG310 running 9.510-5, hopefully the 9.6 update will release soon that fixes that.

     

    But anyways, any insight you have to this ipad vpn problem would be appreciated.  Still having the issue no matter what combination of certificates I try. I have not yet tried the autogenerated cert for "user:ipad" for the reason above.

     

    Daniel

  • I'll be back later for the main issue in this thread, but, yes 9.601 does fix the bug.  In the meantime, Modify a certificate at the command line so that it can be downloaded in WebAdmin in 9.510.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • thanks so much for this, my google searches did not turn that up. I renamed the user cert, downloaded it, and pushed it out to the iPad, which replaced the manually generated usercert that I was using before.

     

    I also changed the server cert to an externally signed (by a CA service we use) certificate that matched the hostname that the iOS device was connecting to. Apparently that's a requirement, I was having the iPad connect to our direct IP before. That's a no-no.

     

    I'm not sure which change fixed it, but it lit right up. You're a lifesaver! I'll mark this as solved.

Reply
  • thanks so much for this, my google searches did not turn that up. I renamed the user cert, downloaded it, and pushed it out to the iPad, which replaced the manually generated usercert that I was using before.

     

    I also changed the server cert to an externally signed (by a CA service we use) certificate that matched the hostname that the iOS device was connecting to. Apparently that's a requirement, I was having the iPad connect to our direct IP before. That's a no-no.

     

    I'm not sure which change fixed it, but it lit right up. You're a lifesaver! I'll mark this as solved.

Children
No Data