Prior to my arrival, the VPN Policy on the organization's main SonicWALL NSA 250M gateway had XAUTH disabled, and all our remote Avaya 9620 phones connected with a single preshared key.
I wasn't a fan of this and opted to enforce XAUTH on our gateway for security reasons. However, ever since we enforced XAUTH both on the SonicWALL gateway and the Avaya 9620 handsets, we've been experiencing countless remote connectivity issues. These issues include:
1. Dropped calls and poor call audio
2. Phones suddenly resetting and having to reinitialize the VPN connection
3. Our SonicWALL log is full of "User logged out" and "User logged in" events (1-5 minutes apart of each other).
This is the VPN policy I am pushing to the 9620 handsets:
SET NVVPNMODE 1
SET NVVPNSVENDOR 4
SET NVSGIP 184.75.26.130
SET NVVPNENCAPS 0
SET NVVPNCOPYTOS 2
SET NVVPNAUTHTYPE 4
SET NVVPNUSERTYPE 1
SET NVVPNUSER vpnphone
SET NVVPNPSWDTYPE 1
SET NVVPNPSWD vpnphone
SET NVIKEID GroupVPN
SET NVIKEPSK **********
SET NVIKEIDTYPE 2
SET NVIKEXCHGMODE 1
SET NVIKEDHGRP 1
SET NVIKEP1ENCALG 3
SET NVIKEP1AUTHALG 2
SET NVIKECONFIGMODE 2
SET NVPFSDHGRP 1
SET NVIKEP2ENCALG 3
SET NVIKEP2AUTHALG 2
SET NVIPSECSUBNET 10.0.1.0/24
SET NVIKEOVERTCP 1
SET MCIPADD 10.0.1.29
SET HTTPSRVR 10.0.1.29
And this is the VPN Policy on our SonicWALL Gateway:
Authentication Method: IKE using Preshared Secret
Name: WAN GroupVPN
Shared Secret: **********
IKE (Phase 1) Proposal - DH Group: 1
IKE (Phase 1) Proposal - Encryption: DES
IKE (Phase 1) Proposal - Authentication: SHA1
IKE (Phase 1) Proposal - Lifetime (Sec): 28800
Ipsec (Phase 2) Proposal - Protocol: ESP
Ipsec (Phase 2) Proposal - Encryption: DES
Ipsec (Phase 2) Proposal - Authentication: SHA1
Ipsec (Phase 2) Proposal - Perfect Forward Secrecy: Yes
Ipsec (Phase 2) Proposal - DH Group: 1
Ipsec (Phase 2) Proposal - Lifetime (Sec): 28800
Require Authentication of VPN Clients by XAUTH: Yes
User Group for XAUTH Users: Trusted Users
Virtual Adapter Settings: DHCP Lease or Manual Configuration
Allow Connections To: Split Tunnels
Important Notes:
- XAUTH is configured to use RADIUS to our Network Policy Service running on on one of our Windows Server 2008 R2 servers.
- Originally, I had planned to move the encryption to AES-128 (from DES), but I was advised by the original company managing the phones that we would experience connectivity issues with our handsets. When I brought up Avaya's Global Tech Tip document regarding SonicWALL VPN connectivity and how it said 3DES (http://www.usedphonesonline.com/Avay...ch_Tip_190.pdf), I was also told to stick to DES.
I wasn't a fan of this and opted to enforce XAUTH on our gateway for security reasons. However, ever since we enforced XAUTH both on the SonicWALL gateway and the Avaya 9620 handsets, we've been experiencing countless remote connectivity issues. These issues include:
1. Dropped calls and poor call audio
2. Phones suddenly resetting and having to reinitialize the VPN connection
3. Our SonicWALL log is full of "User logged out" and "User logged in" events (1-5 minutes apart of each other).
This is the VPN policy I am pushing to the 9620 handsets:
SET NVVPNMODE 1
SET NVVPNSVENDOR 4
SET NVSGIP 184.75.26.130
SET NVVPNENCAPS 0
SET NVVPNCOPYTOS 2
SET NVVPNAUTHTYPE 4
SET NVVPNUSERTYPE 1
SET NVVPNUSER vpnphone
SET NVVPNPSWDTYPE 1
SET NVVPNPSWD vpnphone
SET NVIKEID GroupVPN
SET NVIKEPSK **********
SET NVIKEIDTYPE 2
SET NVIKEXCHGMODE 1
SET NVIKEDHGRP 1
SET NVIKEP1ENCALG 3
SET NVIKEP1AUTHALG 2
SET NVIKECONFIGMODE 2
SET NVPFSDHGRP 1
SET NVIKEP2ENCALG 3
SET NVIKEP2AUTHALG 2
SET NVIPSECSUBNET 10.0.1.0/24
SET NVIKEOVERTCP 1
SET MCIPADD 10.0.1.29
SET HTTPSRVR 10.0.1.29
And this is the VPN Policy on our SonicWALL Gateway:
Authentication Method: IKE using Preshared Secret
Name: WAN GroupVPN
Shared Secret: **********
IKE (Phase 1) Proposal - DH Group: 1
IKE (Phase 1) Proposal - Encryption: DES
IKE (Phase 1) Proposal - Authentication: SHA1
IKE (Phase 1) Proposal - Lifetime (Sec): 28800
Ipsec (Phase 2) Proposal - Protocol: ESP
Ipsec (Phase 2) Proposal - Encryption: DES
Ipsec (Phase 2) Proposal - Authentication: SHA1
Ipsec (Phase 2) Proposal - Perfect Forward Secrecy: Yes
Ipsec (Phase 2) Proposal - DH Group: 1
Ipsec (Phase 2) Proposal - Lifetime (Sec): 28800
Require Authentication of VPN Clients by XAUTH: Yes
User Group for XAUTH Users: Trusted Users
Virtual Adapter Settings: DHCP Lease or Manual Configuration
Allow Connections To: Split Tunnels
Important Notes:
- XAUTH is configured to use RADIUS to our Network Policy Service running on on one of our Windows Server 2008 R2 servers.
- Originally, I had planned to move the encryption to AES-128 (from DES), but I was advised by the original company managing the phones that we would experience connectivity issues with our handsets. When I brought up Avaya's Global Tech Tip document regarding SonicWALL VPN connectivity and how it said 3DES (http://www.usedphonesonline.com/Avay...ch_Tip_190.pdf), I was also told to stick to DES.
Comment