I have a firewall/router (not doing NAT).
I've googled and seen conflicting answers. It seems UDP 500 is the common one. But the others are confusing. 1701, 4500.
And some say I need to also allow gre 50, or 47, or 50 & 51.
Ok, which ports are the correct ones for IPSec/L2TP to work in a routed environment without NAT? i.e. I want to use the built in windows client to connect to a VPN behind this router/firewall.
Perhaps a good answer here is to specify which ports to open for different situations. I think this would be useful for many people.
Here are the ports and protocols:
Also, Port 1701 is used by the L2TP Server, but connections should not be allowed inbound to it from outside. There is a special firewall rule to allow only IPSEC secured traffic inbound on this port.
If using IPTABLES, and your L2TP server sits directly on the internet, then the rules you need are:
Where
$EXT_NIC
is your external network interface card name, e.g. ppp0.Ipsec needs UDP port 500 + ip protocol 50 and 51 - but you can use NAt-T instead, which needs UDP port 4500. On the other hand L2TP uses udp port 1701. If you trying to pass ipsec traffic through a "regular" Wi-Fi router and there is no such option as IPSec pass-through, I recommend opening port 500 and 4500. At least that is how it works on mine. Hope this helps.
Okay.
Actually - It depends.
I have Ubuntu L2TP\IPSEC server behind NAT.
if your L2TP\ipsec server sits behind NAT , in this case on your gateway (with NAT) you need to make port forward for the following ports and protocols:
the point in this case - there is no need to forward ESP or AH.
Also when the server sits behind NAT , windows os clients by default can NOT connect to such server, you need to add to registry
If the server sits directly on the internet
only need to be opened on WAN interface. thats it.
windows os clients do not need to do any regsitry editings in this case.
the information is checked by practice.
===
update(2021.04.23):
if you use ipsec for dynamic vpn then enabling ESP\AH protocls on firewall is NOT needed.
However if you use ipsec for site-to-site tunnels (between two routers with Internet ipaddresses) ---> then you need also enable on firewall