DrayTek UK Users' Community Forum
Help, Advice and Solutions from DrayTek Users
LAN To LAN VPN using Draytek 2820 and Watchguard Firebox
- jonno232
- Topic Author
- Offline
- New Member
Less
More
- Posts: 1
- Thank you received: 0
24 Feb 2010 12:42 #60748
by jonno232
LAN To LAN VPN using Draytek 2820 and Watchguard Firebox was created by jonno232
Hi,
I am having an issue seting up a IPSEC Lan to Lan VPN from a Draytek 2820 to Watchguard firewall. I have started to troubleshoot this and have enable syslog on the draytek. Could someone explain this message?
02-24-2010 12:21:59 Local1.Notice 172.168.5.1 Feb 24 12:21:48 Vigor: NAT-Traversal: Using draft-ietf-ipsec-nat-t-ike-02/03, no NAT detected
The VPN connection but passes no traffic.
Many Thanks
I am having an issue seting up a IPSEC Lan to Lan VPN from a Draytek 2820 to Watchguard firewall. I have started to troubleshoot this and have enable syslog on the draytek. Could someone explain this message?
02-24-2010 12:21:59 Local1.Notice 172.168.5.1 Feb 24 12:21:48 Vigor: NAT-Traversal: Using draft-ietf-ipsec-nat-t-ike-02/03, no NAT detected
The VPN connection but passes no traffic.
Many Thanks
Please Log in or Create an account to join the conversation.
- zogsterjack
- Offline
- New Member
Less
More
- Posts: 1
- Thank you received: 0
27 May 2010 11:01 #62148
by zogsterjack
Replied by zogsterjack on topic Did you rectify this problem? 2820 LTL with Watchguard Fireb
Jonno232
Can I ask, did you get this sorted? I have exactly the same issue and got very excited when I saw your post subject, only to deflate somewhat when I saw no responses.
Hope you did solve the problem and can share your findings.
Many thanks in advance
Can I ask, did you get this sorted? I have exactly the same issue and got very excited when I saw your post subject, only to deflate somewhat when I saw no responses.
Hope you did solve the problem and can share your findings.
Many thanks in advance
Please Log in or Create an account to join the conversation.
- albionuk
- Offline
- New Member
Less
More
- Posts: 3
- Thank you received: 0
17 Jul 2010 13:19 #62905
by albionuk
Cheers,
Glyn
Replied by albionuk on topic LAN To LAN VPN using Draytek 2820 and Watchguard Firebox
I managed to get a Draytek 2820 VPN going between a Watchguard X750e and an X20e.
Let me know if you need me to post the settings.
Cheers
Glyn
Let me know if you need me to post the settings.
Cheers
Glyn
Cheers,
Glyn
Please Log in or Create an account to join the conversation.
- testsubject
- Offline
- New Member
Less
More
- Posts: 1
- Thank you received: 0
02 Aug 2010 11:05 #63099
by testsubject
Replied by testsubject on topic LAN To LAN VPN using Draytek 2820 and Watchguard Firebox
albionuk - Do you have the setting for the LAN to LAN VPN??
I have got a WatchGuard x750e running XTM v11.3 and a Vigor 2820 and I cannot get this working.
Many thanks
I have got a WatchGuard x750e running XTM v11.3 and a Vigor 2820 and I cannot get this working.
Many thanks
Please Log in or Create an account to join the conversation.
- albionuk
- Offline
- New Member
Less
More
- Posts: 3
- Thank you received: 0
05 Aug 2010 12:43 #63172
by albionuk
Cheers,
Glyn
Replied by albionuk on topic LAN To LAN VPN using Draytek 2820 and Watchguard Firebox
Done in a rush but let me know if this helps.
LAN to LAN on the Draytek
Open your VPN Profile
1 Common Settings
Call Direction (Dial-Out)
Tick Always on if required (I have)
2 Dial Out Settings
IPSec Tunnel (Selected)
Server IP/Host Name for VPN (EXTERNAL IP of Watchgurad)
IKE Authentication Method (Pre-Shared Key)
Click on IKE Pre-Shared Key Button and set desired Key
IPSec Security Method
High(ESP) = 3DES with Authentication
Click on Advanced
IKE phase 1 mode = Main Mode
IKE phase 1 proposal = 3DES_SHA1_G1
IKE phase 2 proposal = 3DES_SHA1
IKE phase 1 Key lifetime = 3600
IKE phase 2 key lifetime = 3600
Perfect Forward Secret = Disable
3. Dial In settings
Check IPSec Tunnel
Check Specify Remote VPN Gateway
Enter in Peer VPN Server IP (Watchguards firewall IP)
IKE Authentication Method
Pre-Shared Key
Click IKE Pre-Shared Key and enter same key as before
IPSec Security Method
Only Check - High(ESP) 3DES
4 TCP/IP Network Settings
My WAN IP (Draytek External IP)
Remote Gateway (Watchguards External IP)
Remote Network IP (Internal network range eg. 192.168.3.0)
Remote Network Mask (eg. 255.255.255.0)
Rip Direction = TX/RX Both
From first subnet to remote = Route
Draytek Settings complete.
Open Watchguards Policy Manager
Go to VPN
B O Gateway
Add
GENERAL SETTINGS
Credential Method
Use Pre-Shared Key = Same key as used in draytek
Gateway Endpoints
Add
Local Gateway
By IP Address = (Watchguards External IP)
Remote Gateway
Static IP Address = (Draytek External IP)
By IP Address = (Draytek External IP)
Click OK
PHASE 1 SETTINGS
Mode = Main
NAT Traversal = Ticked and set to 20
IKE Keep-alive = Unchecked
Dead Peer Detection = Traffic idle timeout 20 and Max retries 5.
Nicola Merritt
Transform Settings
Authentication = SHA1
Encryption = 3DES
SA Life = 8 Hour
Key Group = Diffie-Hellman Group1
Create a new tunnel and here are the settings
Gateway = (Tunnel you just created)
Addresses
Local = Local Network address for watchguard e.g. 192.168.6.0/24
Remote = Remote Network Address for Draytek e.g. 192.168.3.0/24
Phase 2 Settings
PFS = Unchecked
IPSec Proposals
ESP-3DES-SHA1
Ok and apply the settings to the firewall and test the vpn…
LAN to LAN on the Draytek
Open your VPN Profile
1 Common Settings
Call Direction (Dial-Out)
Tick Always on if required (I have)
2 Dial Out Settings
IPSec Tunnel (Selected)
Server IP/Host Name for VPN (EXTERNAL IP of Watchgurad)
IKE Authentication Method (Pre-Shared Key)
Click on IKE Pre-Shared Key Button and set desired Key
IPSec Security Method
High(ESP) = 3DES with Authentication
Click on Advanced
IKE phase 1 mode = Main Mode
IKE phase 1 proposal = 3DES_SHA1_G1
IKE phase 2 proposal = 3DES_SHA1
IKE phase 1 Key lifetime = 3600
IKE phase 2 key lifetime = 3600
Perfect Forward Secret = Disable
3. Dial In settings
Check IPSec Tunnel
Check Specify Remote VPN Gateway
Enter in Peer VPN Server IP (Watchguards firewall IP)
IKE Authentication Method
Pre-Shared Key
Click IKE Pre-Shared Key and enter same key as before
IPSec Security Method
Only Check - High(ESP) 3DES
4 TCP/IP Network Settings
My WAN IP (Draytek External IP)
Remote Gateway (Watchguards External IP)
Remote Network IP (Internal network range eg. 192.168.3.0)
Remote Network Mask (eg. 255.255.255.0)
Rip Direction = TX/RX Both
From first subnet to remote = Route
Draytek Settings complete.
Open Watchguards Policy Manager
Go to VPN
B O Gateway
Add
GENERAL SETTINGS
Credential Method
Use Pre-Shared Key = Same key as used in draytek
Gateway Endpoints
Add
Local Gateway
By IP Address = (Watchguards External IP)
Remote Gateway
Static IP Address = (Draytek External IP)
By IP Address = (Draytek External IP)
Click OK
PHASE 1 SETTINGS
Mode = Main
NAT Traversal = Ticked and set to 20
IKE Keep-alive = Unchecked
Dead Peer Detection = Traffic idle timeout 20 and Max retries 5.
Nicola Merritt
Transform Settings
Authentication = SHA1
Encryption = 3DES
SA Life = 8 Hour
Key Group = Diffie-Hellman Group1
Create a new tunnel and here are the settings
Gateway = (Tunnel you just created)
Addresses
Local = Local Network address for watchguard e.g. 192.168.6.0/24
Remote = Remote Network Address for Draytek e.g. 192.168.3.0/24
Phase 2 Settings
PFS = Unchecked
IPSec Proposals
ESP-3DES-SHA1
Ok and apply the settings to the firewall and test the vpn…
Cheers,
Glyn
Please Log in or Create an account to join the conversation.
Moderators: Chris, Sami
Copyright © 2024 DrayTek