Can't get site-to-site vpn to work with Unifi Dream Machine

0

greetings all,

Could someone give me a hint on what could be the issue here? on both logs, A.A.A.A is the public IP of AWS VPN

On Ubiquiti Dream Machine, logs go in a loop with this:

2024-01-16T18:37:32-05:00 Dream-Machine charon[5739]: 16[IKE] initiating IKE_SA 65a7104beedfdb7f7046dfad[1093] to A.A.A.A

2024-01-16T18:37:32-05:00 Dream-Machine charon[5739]: 16[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]

2024-01-16T18:37:32-05:00 Dream-Machine charon[5739]: 14[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]

2024-01-16T18:37:32-05:00 Dream-Machine ubios-udapi-server[4413]: ipsec: IPsec tunnel (site-to-site) 65a7104beedfdb7f7046dfad IKE SA trying to wake up

2024-01-16T18:37:32-05:00 Dream-Machine charon[5739]: 14[IKE] establishing CHILD_SA 65a7104beedfdb7f7046dfad{860}

2024-01-16T18:37:32-05:00 Dream-Machine charon[5739]: 14[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]

2024-01-16T18:37:32-05:00 Dream-Machine charon[5739]: 06[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]

On AWS end I have the following logs:

2024-01-16T18:38:49.000-05:00 {"event_timestamp":1705448329,"details":"received packet: from cgw-0ab1734978a22649f [UDP 4500] to A.A.A.A [UDP 4500] (368 bytes)","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

2024-01-16T18:38:49.000-05:00 {"event_timestamp":1705448329,"details":"AWS tunnel processed request (id=1) for IKE_AUTH exchange","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

2024-01-16T18:38:49.000-05:00 {"event_timestamp":1705448329,"details":"AWS tunnel is searching for matching peer configurations between A.A.A.A and cgw-0ab1734978a22649f","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

2024-01-16T18:38:49.000-05:00 {"event_timestamp":1705448329,"details":"AWS tunnel is sending response (id=1) for IKE_AUTH exchange","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

2024-01-16T18:38:49.000-05:00 {"event_timestamp":1705448329,"details":"sending packet: from A.A.A.A [UDP 4500] to cgw-0ab1734978a22649f [UDP 4500] (80 bytes)","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

2024-01-16T18:38:54.000-05:00 {"event_timestamp":1705448334,"details":"received packet: from cgw-0ab1734978a22649f [UDP 500] to A.A.A.A [UDP 500] (464 bytes)","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

2024-01-16T18:38:54.000-05:00 {"event_timestamp":1705448334,"details":"AWS tunnel processed request (id=0) for IKE_SA_INIT exchange","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

2024-01-16T18:38:54.000-05:00 {"event_timestamp":1705448334,"details":"AWS tunnel detected cgw-0ab1734978a22649f as the IKE_SA initiator","dpd_enabled":true,"nat_t_detected":true,"ike_phase1_state":"negotiating","ike_phase2_state":"down"} Link

To answer some questions:

  • I am not NATing. My GPON Modem is directly connected to my DM which has the public IP.
  • When a VPN is created on DM, firewall rules are automatically setup
  • Same pre shared key on both end
  • DM is using IKEv2, AES256, SHA(2-)256, DH Group 14 (tried other without success).

Any hint appreciated.

  • Did you get this to work in the end?

zeus
已提問 4 個月前檢視次數 227 次
2 個答案
0
已接受的答案

The solution was NOT to create a Customer Gateway using the Certificate ARN. Go directly into creating a site to site VPN Connection, Enter the customer gateway as NEW, and put the remote IP Address. Bypassing the Certificate ARN for some reason works.

zeus
已回答 2 個月前
0

AWS responds to the IKE AUTH request with "[ N(AUTH_FAILED) ]" suggesting that there was a problem in the IKE AUTH request payload. The two likely issues here are:

  • Pre-shared key mismatch -> you mention this matches on both ends
  • DM is presenting incorrect Identity (IP address) / IDi payload. It could be that the DM appliance is using its private IP address as the IDi whereas AWS is expecting the public IP address. You can check DM documentation to see how this is configured and confirm what it is on your device.
profile pictureAWS
專家
已回答 3 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南