-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 08:00 -0600 02/20/2006, Julian Y. Koh wrote: >This isn't totally helpful for you since we use Cisco 3000 concentrators, >but the built-in L2TP/IPSec clients on Windows and Mac OS X work fine with >those devices. The only caveat is that the Mac OS X L2TP/IPSec client >doesn't work through NAT with Cisco 3000s unless you update your client to >Mac OS X >10.4.5. I've been asking for this compatibility for well over a year from >both Cisco and Apple. It was the last stumbling block in our effort to get >rid of PPTP.
A bunch of people have asked for more details about our Cisco concentrator and client setup. Our Windows users have been doing L2TP/IPSec since the summer. Instructions are at <http://www.it.northwestern.edu/oncampus/vpn/native/native-config-win.html>. Here are the old instructions that I wrote up for Mac OS X 10.3.x; they should still be mostly valid. It looks like 10.4.x has some new options for "VPN on demand", so that it will only bring up the VPN connection when you connect to certain hosts. Probably more complex than we want to make things for our users, but it might be fun to play around with on an individual basis to see how it works. > >1.) Mac OS X 10.3.x > > Open Internet Connect > Select "New VPN Connection" under the File menu. > In the window that appears, select "L2TP over IPSec", click Continue. > From the Configuration pop-up menu, select "Edit Configurations..." > Enter whatever you want for "Description" > Enter <insert your VPN address here> for "Server Address" > Enter your netid for "Account Name:" > Select "Use Password" for "Authentication", and enter your netid > password if you want it saved in your Keychain. > Enter <insert your preshared key here> for "Shared Secret" > Click OK; you should be back at the main Internet Connect screen. > Click "Connect" to attempt a connection. > If you have a Connection Log window open, you should see something like >this: > >==================== >Mon Apr 11 17:25:31 2005 : L2TP: starting racoon... >Mon Apr 11 17:25:34 2005 : L2TP connecting to server <name>... >Mon Apr 11 17:25:38 2005 : L2TP connection established. >Mon Apr 11 17:25:38 2005 : Using interface ppp0 >Mon Apr 11 17:25:38 2005 : Connect: ppp0 <--> socket[34:18] >Mon Apr 11 17:25:41 2005 : acsp resetci called >Mon Apr 11 17:25:44 2005 : local IP address <blah> >Mon Apr 11 17:25:44 2005 : remote IP address <blah> >Mon Apr 11 17:25:44 2005 : primary DNS address <blah> >Mon Apr 11 17:25:44 2005 : secondary DNS address <blah> >Mon Apr 11 17:25:48 2005 : Terminating on signal 15. >Mon Apr 11 17:25:48 2005 : Connection terminated. >Mon Apr 11 17:25:48 2005 : Connect time 0.2 minutes. >Mon Apr 11 17:25:48 2005 : Sent 901 bytes, received 1645 bytes. >Mon Apr 11 17:25:48 2005 : L2TP disconnecting... >Mon Apr 11 17:25:49 2005 : L2TP disconnected >======================= As far as the concentrator config is concerned, I don't know if I'll hit all the necessary points, but here goes. We're using RADIUS authentication, with an Active Directory backend, IP addresses assigned by the RADIUS server. Concentrator software version 4.1.7.H. Configuration->User Management->Base Group->General Tab Check box for L2TP over IPSec in Tunneling Protocols Configuration->User Management->Base Group->IPSec Tab IPSec SA = ESP-L2TP-TRANSPORT (see below) Tunnel Type = Remote Access Default Preshared Key = <insert your preshared key here> Configuration->User Management->Base Group->Client Config Tab Check box for IPSec over UDP IPSec over UDP Port = 10000 Configuration->User Management->Base Group->PPTP/L2TP Tab L2TP Authentication Protocols = MSCHAPv2 Uncheck all boxes for L2TP Encryption and Compression Configuration->Policy Management->Traffic Management->SAs Modify/create IPSec SA named ESP-L2TP-TRANSPORT Inheritance: From Rule Authentication Algorithm: ESP/MD5/HMAC-128 Encryption Algorithm: 3DES-168 Encapsulation Mode: Transport Perfect Forward Secrecy: Disabled Lifetime Measurement: Time Data Lifetime: 10000 Time Lifetime: 3600 IKE Peer: 0.0.0.0 Negotiation Mode: Main Digital Certificate: None (Use Preshared Keys) Certificate Transmission: Identity Certificate only IKE Proposal: CiscoVPNClient-3DES-MD5 Configuration->Tunneling and Security->L2TP Everything here should just be default, but: Check box for "Enabled" Max Tunnel Idle Time: 60 seconds Control Window Size: 4 packets Control Retransmit Interval: 1 second Control Retransmit Limit: 4 Max Tunnels: 0 Max Sessions/Tunnel: 0 Hello Interval: 60 seconds Configuration->Tunneling and Security->IPSec->IKE Proposals Modify/Create/Activate IKE Proposal named CISCOVPNClient-3DES-MD5 Authentication Mode: Preshared Keys (XAUTH) Authentication Algorithm: MD5/HMAC-128 Encryption Algorithm: 3DES-168 Diffie-Hellman Group: Group 2 (1024-bits) Lifetime Measurement: Time Data Lifetime: 10000 Time Lifetime: 86400 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.4 (Build 4042) Comment: <http://bt.ittns.northwestern.edu/julian/pgppubkey.html> iQA/AwUBQ/zQjw5UB5zJHgFjEQKAbgCbB9+nANxtctQ5wVw3Sc1P9u2ulj8Anjj3 nNKgOkf3oxpc/mMuV+MU6swc =Q7DA -----END PGP SIGNATURE----- -- Julian Y. Koh <mailto:[EMAIL PROTECTED]> Network Engineer <phone:847-467-5780> Telecommunications and Network Services Northwestern University PGP Public Key:<http://bt.ittns.northwestern.edu/julian/pgppubkey.html> ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.