I am trying to configure ipsec Site-to-site VPN between the Head and branch offices. The Head office is a Sophos UTM SG 210 configured as the responder (Repond-Only), and the branch Firewall is a Sophos XGS configured as the initiator.
The Head office SG210 firewall had three other site-to-site VPN connections all in respond-Only mode to the SG210
After the configuration was established the following error Log kept showing:
Hi Izuchukwu Edeh,
Thank you for reaching out to Sophos Community.
Would you be so kind as to share also the logs from the Sophos Firewall?
Also are the configuration the exact match for both site?
For additional reference, kindly see below
Erick Jan
Global Community Engineer, Support & Services
Are you a Sophos Partner? | Product Documentation | @SophosSupport | Sign up for SMS Alerts
If a post solves your question, please use the 'Verify Answer' button.
The award-winning home for Sophos Support videos! - Visit Sophos Techvids
Hello Izuchukwu Edeh ,
Thank you for reaching out to the community, looks like a policy mismatch, request you to disable data compression, PFS and try again. I'd recommend create a custom policy rather than using any default policy. And may we know firmware version currently active on SG 210 ?
Thanks & Regards,
_______________________________________________________________
Vivek Jagad | Team Lead, Technical Support, Global Customer Experience
Log a Support Case | Sophos Service Guide
Best Practices – Support Case | Security Advisories
Compare Sophos next-gen Firewall | Fortune Favors the prepared
Sophos Community | Product Documentation | Sophos Techvids | SMS
If a post solves your question please use the 'Verify Answer' button.
Hey Izuchukwu Edeh the keylife of phase 1 for UTM 9 is 7800 where as on XG it is set to 3600
Thanks & Regards,
_______________________________________________________________
Vivek Jagad | Team Lead, Technical Support, Global Customer Experience
Log a Support Case | Sophos Service Guide
Best Practices – Support Case | Security Advisories
Compare Sophos next-gen Firewall | Fortune Favors the prepared
Sophos Community | Product Documentation | Sophos Techvids | SMS
If a post solves your question please use the 'Verify Answer' button.
The above pictures are the configurations of the two firewalls. Current firmware version:9.718-5Your firmware is up to date.
The XGS firewall is an Azure NVA.
I have set the keylife phase 1 to 7800 and phase 2 to 3600 on both firewalls but I still get the same error
Looks like a pre-shared key mismatch now, can you use something simple like alpha numeric...
Thanks & Regards,
_______________________________________________________________
Vivek Jagad | Team Lead, Technical Support, Global Customer Experience
Log a Support Case | Sophos Service Guide
Best Practices – Support Case | Security Advisories
Compare Sophos next-gen Firewall | Fortune Favors the prepared
Sophos Community | Product Documentation | Sophos Techvids | SMS
If a post solves your question please use the 'Verify Answer' button.
I did that already, but there is no change in the error message
As per the logs provided it shows the pre-share key mismatch
malformed payload in packet. Probable authentication failure (mismatch of preshared secrets?)
May I know the pre-share key you are using at both ends ?
Thanks & Regards,
_______________________________________________________________
Vivek Jagad | Team Lead, Technical Support, Global Customer Experience
Log a Support Case | Sophos Service Guide
Best Practices – Support Case | Security Advisories
Compare Sophos next-gen Firewall | Fortune Favors the prepared
Sophos Community | Product Documentation | Sophos Techvids | SMS
If a post solves your question please use the 'Verify Answer' button.
Am sure the preshared key is the same on all sides : ahuzfHRT76329KJgfs43DAs
pre-shared key looks good, try something very simple like just numeric only or alphabetic only and ensure to deactive the tunnel completely and then re-initiate it again. You can keep XG on respond only and UTM 9 to initiate the connection. Like mentioned here - Configure a Site-to-site IPsec VPN connection between Sophos Firewall and UTM using a preshared key
Thanks & Regards,
_______________________________________________________________
Vivek Jagad | Team Lead, Technical Support, Global Customer Experience
Log a Support Case | Sophos Service Guide
Best Practices – Support Case | Security Advisories
Compare Sophos next-gen Firewall | Fortune Favors the prepared
Sophos Community | Product Documentation | Sophos Techvids | SMS
If a post solves your question please use the 'Verify Answer' button.
A very Big thanks Mr. Vivek Jagad you are a very big life saver. Everything worked after i used the steps on the article. Thank you again for your fast responses.