Reflexion will be End-of-life on March 31,2023. See Sophos Reflexion EoL FAQs to learn more.
Disclaimer: This information is provided as-is without any guarantees. Please contact Sophos Professional Services if you require assistance with your specific environment.
This knowledge base article explains how to set up an IPsec connection from the Sophos UTM to Microsoft Azure.
This article goes through each step required to have a functional virtual network to connect to Azure. Please adapt these steps to fit your existing environment.The following sections are covered:
Applies to the following Sophos products and versionsSophos UTM
The example below describes the steps to build a new environment but can be easily adapted to an existing environment.
The Virtual Network defines the address space used in Azure, as well as what subnets are in that network.
The Virtual Network Gateway defines the external IP with which VPN tunnels can be created. It also defines which networks can be accessed by those VPNs.
The Local network gateway specifies the public IP and private IP's of local networks that may establish a connection to Azure.
The connection defines a specific VPN tunnel and which networks may access it.
The UTM will be set up like any normal IPsec tunnel except that we must make an encryption policy specific to Azure's requirements.
This defines the remote address the UTM will connect to.
The IPsec Policy defines the encryption and other security parameters used by the IPsec tunnel. Azure has specific requirements and we have found that these settings work best.
This creates the IPsec tunnel by selecting a Remote Gateway, Policy, and defining which local networks can access the tunnel.
Previous article ID: 126995
Hello everyone! we are in a complicated situation, we follow the guide step by step, but we still cannot connect the VPN, sophos cannot establish the tunnel, could you support us?
These are the device data:
Model: SG210 Firmware:
9.711-5
Pattern: 210117
¡Hola! Oscar and welcome to the UTM Community!
We need to see the relevant lines from the IPsec log.
1. Confirm that Debug is not enabled. 2. Disable the IPsec Connection. 3. Start the IPsec Live Log and wait for it to begin to populate. 4. Enable the IPsec Connection. 5. Copy here about 60 lines from enabling through the error.
Cheers - Bob
S_LaVita/MC4 PRODUCCION"" #950" received Vendor ID payload [XAUTH]S_LaVita/MC4 PRODUCCION"" #950" ignoring Vendor ID payload [6b46ba7c9447cf06e011347356018ec6]S_LaVita/MC4 PRODUCCION"" #950" ignoring Vendor ID payload [Cisco VPN 3000 Series]S_LaVita/MC4 PRODUCCION"" #950" received Vendor ID payload [Dead Peer Detection]S_LaVita/MC4 PRODUCCION"" #950" Peer ID is ID_IPV4_ADDRS_LaVita/MC4 PRODUCCION"" #950" Dead Peer Detection (RFC 3706) enabledS_LaVita/MC4 PRODUCCION"" #950" ISAKMP SA establishedS_LaVita/MC4 PRODUCCION"" #951" initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP {using isakmp#950}S_LaVita/MC4 PRODUCCION"" #951"" ignoring informational payload type IPSEC_RESPONDER_LIFETIME"S_LaVita/MC4 PRODUCCION"" #951"" sent QI2 IPsec SA established {ESP=>0x2775eb48 <0xbfb239ec DPD}" forgetting secrets loading secrets from ""/etc/ipsec.secrets""" loaded PSK secret for 181.188.189.2 200.87.138.178 loaded PSK secret for 181.188.189.2 44.207.17.74 loaded PSK secret for 181.188.189.2 181.115.185.226 loaded PSK secret for 181.188.189.2 20.25.85.153 loaded PSK secret for 192.168.252.2 192.168.252.1 loaded PSK secret for 181.188.189.2 %any loaded PSK secret for 181.188.189.2 190.129.69.40 loaded PSK secret for 181.188.189.2 190.216.243.86 listening for IKE messages forgetting secrets loading secrets from ""/etc/ipsec.secrets""" loaded PSK secret for 181.188.189.2 200.87.138.178 loaded PSK secret for 181.188.189.2 44.207.17.74 loaded PSK secret for 181.188.189.2 181.115.185.226 loaded PSK secret for 181.188.189.2 20.25.85.153 loaded PSK secret for 192.168.252.2 192.168.252.1 loaded PSK secret for 181.188.189.2 %any loaded PSK secret for 181.188.189.2 190.129.69.40 loaded PSK secret for 181.188.189.2 190.216.243.86 loading ca certificates from '/etc/ipsec.d/cacerts' loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA.pem' loading aa certificates from '/etc/ipsec.d/aacerts' loading ocsp certificates from '/etc/ipsec.d/ocspcerts' loading attribute certificates from '/etc/ipsec.d/acerts' Changing to directory '/etc/ipsec.d/crls' no default route - cannot cope with %defaultroute!!!S_AZURE VPN CC""" deleting connectionS_AZURE VPN CC"" #948" deleting state (STATE_MAIN_I1)added connection description ""S_AZURE VPN CC"""S_AZURE VPN CC"" #952" initiating Main Mode added connection description ""S_AZURE VPN CC""" added connection description ""S_AZURE VPN CC""" forgetting secrets loading secrets from ""/etc/ipsec.secrets""" loaded PSK secret for 181.188.189.2 200.87.138.178 loaded PSK secret for 181.188.189.2 44.207.17.74 loaded PSK secret for 181.188.189.2 181.115.185.226 loaded PSK secret for 192.168.252.2 192.168.252.1 loaded PSK secret for 181.188.189.2 %any loaded PSK secret for 181.188.189.2 190.129.69.40 loaded PSK secret for 181.188.189.2 190.216.243.86 listening for IKE messages forgetting secrets loading secrets from ""/etc/ipsec.secrets""" loaded PSK secret for 181.188.189.2 200.87.138.178 loaded PSK secret for 181.188.189.2 44.207.17.74 loaded PSK secret for 181.188.189.2 181.115.185.226
That doesn't look like logs from a Sophos UTM, Oscar.
2022:07:13-13:12:03 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #950: received Vendor ID payload [XAUTH]2022:07:13-13:12:03 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #950: ignoring Vendor ID payload [6b46ba7c9447cf06e011347356018ec6]2022:07:13-13:12:03 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #950: ignoring Vendor ID payload [Cisco VPN 3000 Series]2022:07:13-13:12:04 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #950: received Vendor ID payload [Dead Peer Detection]2022:07:13-13:12:04 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #950: Peer ID is ID_IPV4_ADDR: '181.115.185.226'2022:07:13-13:12:04 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #950: Dead Peer Detection (RFC 3706) enabled2022:07:13-13:12:04 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #950: ISAKMP SA established2022:07:13-13:12:04 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #951: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP {using isakmp#950}2022:07:13-13:12:04 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #951: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME2022:07:13-13:12:04 puerta pluto[8279]: "S_LaVitalicia/MC4 PRODUCCION" #951: sent QI2, IPsec SA established {ESP=>0x2775eb48 <0xbfb239ec DPD}2022:07:13-13:14:17 puerta pluto[8279]: forgetting secrets2022:07:13-13:14:17 puerta pluto[8279]: loading secrets from "/etc/ipsec.secrets"2022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 200.87.138.1782022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 44.207.17.742022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 181.115.185.2262022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 20.25.85.1532022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 192.168.252.2 192.168.252.12022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 %any2022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 190.129.69.402022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 190.216.243.862022:07:13-13:14:17 puerta pluto[8279]: listening for IKE messages2022:07:13-13:14:17 puerta pluto[8279]: forgetting secrets2022:07:13-13:14:17 puerta pluto[8279]: loading secrets from "/etc/ipsec.secrets"2022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 200.87.138.1782022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 44.207.17.742022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 181.115.185.2262022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 20.25.85.1532022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 192.168.252.2 192.168.252.12022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 %any2022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 190.129.69.402022:07:13-13:14:17 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 190.216.243.862022:07:13-13:14:17 puerta pluto[8279]: loading ca certificates from '/etc/ipsec.d/cacerts'2022:07:13-13:14:17 puerta pluto[8279]: loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA.pem'2022:07:13-13:14:17 puerta pluto[8279]: loading aa certificates from '/etc/ipsec.d/aacerts'2022:07:13-13:14:17 puerta pluto[8279]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts'2022:07:13-13:14:17 puerta pluto[8279]: loading attribute certificates from '/etc/ipsec.d/acerts'2022:07:13-13:14:17 puerta pluto[8279]: Changing to directory '/etc/ipsec.d/crls'2022:07:13-13:14:17 puerta ipsec_starter[10695]: no default route - cannot cope with %defaultroute!!!2022:07:13-13:14:17 puerta pluto[8279]: "S_AZURE VPN CC": deleting connection2022:07:13-13:14:17 puerta pluto[8279]: "S_AZURE VPN CC" #948: deleting state (STATE_MAIN_I1)2022:07:13-13:14:17 puerta pluto[8279]: added connection description "S_AZURE VPN CC"2022:07:13-13:14:17 puerta pluto[8279]: "S_AZURE VPN CC" #952: initiating Main Mode2022:07:13-13:14:17 puerta pluto[8279]: added connection description "S_AZURE VPN CC"2022:07:13-13:14:17 puerta pluto[8279]: added connection description "S_AZURE VPN CC"2022:07:13-13:14:46 puerta pluto[8279]: forgetting secrets2022:07:13-13:14:46 puerta pluto[8279]: loading secrets from "/etc/ipsec.secrets"2022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 200.87.138.1782022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 44.207.17.742022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 181.115.185.2262022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 192.168.252.2 192.168.252.12022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 %any2022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 190.129.69.402022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 190.216.243.862022:07:13-13:14:46 puerta pluto[8279]: listening for IKE messages2022:07:13-13:14:46 puerta pluto[8279]: forgetting secrets2022:07:13-13:14:46 puerta pluto[8279]: loading secrets from "/etc/ipsec.secrets"2022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 200.87.138.1782022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 44.207.17.742022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 181.188.189.2 181.115.185.2262022:07:13-13:14:46 puerta pluto[8279]: loaded PSK secret for 192.168.252.2 192.168.252.1
no default route - cannot cope with %defaultroute!!!
This could be a configuration problem on either side. Insert here pictures of the Edits of the IPsec Connection and Remote Gateway.
https://community.sophos.com/resized-image/__size/1280x960/__key/communityserver-components-multipleuploadfilemanager/dce03f02_2D00_34cb_2D00_4217_2D00_b1cb_2D00_4cb4f9f3839c-262616-complete/VPN.png
Sorry Bob, i couldn´t upload the image but this is the current configuration
The link says I'm not allowed to access what you uploaded, Oscar. You should be able to simply drag-n-drop pictures into your post.
Hi bob thank you, i am receiving a message: an error occured, Try again or contact your administrator, thats because i upload as a link.
i am trying with different formats, gif, jpg, png but is the same result. Is this a know issue?
Never an issue, Lior.