Hey dude. Thanks for replying.

The reason we're choosing OpenVPN is because we can configure the server and
clients
to communicate to the server at 443/TCP which pretty much guarantees that road
warriors and
NAT'd office employees could all reach through any firewall. (Ok, that's a
broad statement,
but any firewall that blocks connecting to 443/TCP outbound is really not
gonna be in scope
as far as I'm concerned;) )

But so, while we gain that feature, what did you find difficult about
administering an
OpenVPN instance?

--
James McGoodwin


From: Ryan Slack <r...@evine.ca<mailto:r...@evine.ca>>
Date: Friday, November 21, 2014 at 10:52 AM
To: James McGoodwin <jmcgood...@kobo.com<mailto:jmcgood...@kobo.com>>
Subject: Re: Concurrent L2TP/IPSEC connections for Windows Clients behind a
shared NAT


On Nov 21, 2014 8:10 AM, "James McGoodwin"
<jmcgood...@kobo.com<mailto:jmcgood...@kobo.com>> wrote:
>
> Thanks for your feedback and confirmation Yasuoka.
>
> I'm glad you're able to reproduce the issue, it's been a difficult one to
> try
> to explain to google;) Took me longer than I'd care to admit to finally
> pin
> down the specifics so I could even pose this question to the group.
>
> I think for the time being we may push our windows clients over to an
> Openvpn solution.
>

I went the same path in supporting windows road warriors, isakmpd to openvpn,
but have since found that supporting the windows native ike2 VPN via iked to
be less work/issues. ymmv

> Again, thanks very much for your feedback and hopefully this will help
> others identify the problem in their implementations faster in the
> Future.
>
> ((Isakmpd/npppd still works smashingly for a single windows client, so
> from a work-from-home or road-warrior point of view it's perfect. In a
> shared office environment however, Windows clients contend for that
> single available port. Ridiculous. ))
>
> James McGoodwin
>
>
>
>
> On 11/18/14, 7:45 PM, "YASUOKA Masahiko"
<yasu...@yasuoka.net<mailto:yasu...@yasuoka.net>> wrote:
>
> >On Sat, 15 Nov 2014 00:48:44 +0000
> >James McGoodwin <jmcgood...@kobo.com<mailto:jmcgood...@kobo.com>> wrote:
> >> However Windows clients are limited to only one connection at a
> >> time.  Subsequent connections cause the current session to die and
> >> be replaced by the new one.
> >(snip)
> >> In short, many security associations (for each windows client) but only
> >>one
> >> actual flow.
> >>
> >> Isakmpd doesn?t have a way to distinguish between the connections as it
> >> renegotiates their keys.
> >
> >I could repeat the problem.  When rekeying, only one of the
> >connections can keep the IPsec session and others are dropped.  It
> >seems isakmpd NAT-T has an issue.
> >
> >I also would like to fix it.  But I need to learn the isakmpd code.
> >It may take time.
> >
> >--yasuoka

Reply via email to