11-28-2012 11:38 AM - edited 03-11-2019 05:29 PM
I don't know if this is in the right section, but I cannot set up a vpn tunnel between an asa 5510 and a cisco rv042 router. I believe the problem is because i need to set up a nat exempt rule on the rv042 route but don't know how. Can someone tell me how to do this? Thanks in advance!
Solved! Go to Solution.
11-28-2012 02:07 PM
Have a look at this link under Cisco RV042 Dual WAN VPN Router
http://www.cisco.com/en/US/partner/products/ps9923/prod_technical_reference_list.html
on the ASA side
http://www.cisco.com/en/US/partner/products/ps6120/prod_configuration_examples_list.html
Regards
11-28-2012 02:07 PM
Have a look at this link under Cisco RV042 Dual WAN VPN Router
http://www.cisco.com/en/US/partner/products/ps9923/prod_technical_reference_list.html
on the ASA side
http://www.cisco.com/en/US/partner/products/ps6120/prod_configuration_examples_list.html
Regards
09-30-2013 03:58 PM
Thanks so much sir, but I was denied access to both documents:
http://www.cisco.com/msgs/403.html
Forbidden File or Application
The file or application you are trying to access may require additional entitlement or you are trying to access a file with an invalid name. Additional entitlement levels are granted based on a users relationship with Cisco on a per-application basis.
I do have more information, however. One side could ping the router on the other, but not vice versa, so I reconfigured the VPN's to use subnet as opposed to IP, and now neitehr side can ping the other's gateway although the tunnel remains up. I've attached some of teh log files in hopes they may be of assistance.
Please let me know if I can provide any more info. I really appreciate the help!!!!!!!!!!!
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0xdef3577d) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0xdef3577d) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc0bc76e1) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc0bc76e1) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x3e25987f) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x3e25987f) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: received Delete SA(0x26c58412) payload: deleting IPSEC State #86 |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: received Delete SA(0x26c58412) payload: deleting IPSEC State #86 |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x59aa328c) not found (maybe expired) |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x59aa328c) not found (maybe expired) |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xed0c900c) not found (maybe expired) |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xed0c900c) not found (maybe expired) |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: sent QI2, IPsec SA established {ESP=>0xa2800e03 <0x6c983e30 AH=>0x01f47906 <0x4854928c IPCOMP=>0x00003d00 <0x00004025 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: Dead Peer Detection (RFC 3706) enabled |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = a2800e03 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = a2800e03 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 6c983e30 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 6c983e30 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = 1f47906 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = 1f47906 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 4854928c |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 4854928c |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: sent QI2, IPsec SA established {ESP=>0x26c58412 <0x06fbf532 AH=>0x3e25987f <0xf3e507a2 IPCOMP=>0x00003260 <0x0000b5fa |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: Dead Peer Detection (RFC 3706) enabled |
and a bit more, just in case:
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0xdef3577d) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0xdef3577d) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc0bc76e1) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc0bc76e1) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x3e25987f) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x3e25987f) not found (maybe expired) |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: received Delete SA(0x26c58412) payload: deleting IPSEC State #86 |
Sep 30 12:03:19 2013 | VPN Log | (g2gips0) #83: received Delete SA(0x26c58412) payload: deleting IPSEC State #86 |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x59aa328c) not found (maybe expired) |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_AH SA(0x59aa328c) not found (maybe expired) |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xed0c900c) not found (maybe expired) |
Sep 30 12:03:13 2013 | VPN Log | (g2gips0) #83: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xed0c900c) not found (maybe expired) |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: sent QI2, IPsec SA established {ESP=>0xa2800e03 <0x6c983e30 AH=>0x01f47906 <0x4854928c IPCOMP=>0x00003d00 <0x00004025 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: Dead Peer Detection (RFC 3706) enabled |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = a2800e03 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = a2800e03 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 6c983e30 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 6c983e30 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = 1f47906 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Outbound SPI value = 1f47906 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 4854928c |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] Inbound SPI value = 4854928c |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: sent QI2, IPsec SA established {ESP=>0x26c58412 <0x06fbf532 AH=>0x3e25987f <0xf3e507a2 IPCOMP=>0x00003260 <0x0000b5fa |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: Dead Peer Detection (RFC 3706) enabled |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Outbound SPI value = 26c58412 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Outbound SPI value = 26c58412 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Inbound SPI value = 6fbf532 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Inbound SPI value = 6fbf532 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Outbound SPI value = 3e25987f |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Outbound SPI value = 3e25987f |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Inbound SPI value = f3e507a2 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] Inbound SPI value = f3e507a2 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #87: initiating Quick Mode PSK+ENCRYPT+AUTHENTICATE+COMPRESS+TUNNEL+PFS+AGGRESSIVE+NATTRAVERSAL to replace #81 {using isakmp#83} |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #81: starting keying attempt 2 of an unlimited number |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #81: max number of retransmissions (2) reached STATE_QUICK_I1 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #81: max number of retransmissions (2) reached STATE_QUICK_I1 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #86: initiating Quick Mode PSK+ENCRYPT+AUTHENTICATE+COMPRESS+TUNNEL+PFS+AGGRESSIVE+NATTRAVERSAL to replace #82 {using isakmp#83} |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #82: starting keying attempt 2 of an unlimited number |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #82: max number of retransmissions (2) reached STATE_QUICK_I1 |
Sep 30 12:03:09 2013 | VPN Log | (g2gips0) #82: max number of retransmissions (2) reached STATE_QUICK_I1 |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: sent QI2, IPsec SA established {ESP=>0xc0bc76e1 <0xc7519aca AH=>0xdef3577d <0x1add207d IPCOMP=>0x000019d1 <0x00005a59 |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: Dead Peer Detection (RFC 3706) enabled |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Outbound SPI value = c0bc76e1 |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Outbound SPI value = c0bc76e1 |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Inbound SPI value = c7519aca |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Inbound SPI value = c7519aca |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Outbound SPI value = def3577d |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Outbound SPI value = def3577d |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Inbound SPI value = 1add207d |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] Inbound SPI value = 1add207d |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #85: initiating Quick Mode PSK+ENCRYPT+AUTHENTICATE+COMPRESS+TUNNEL+PFS+AGGRESSIVE+NATTRAVERSAL to replace #78 {using isakmp#83} |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #78: starting keying attempt 2 of an unlimited number |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #78: max number of retransmissions (2) reached STATE_QUICK_I1 |
Sep 30 12:03:03 2013 | VPN Log | (g2gips0) #78: max number of retransmissions (2) reached STATE_QUICK_I1 |
Sep 30 12:02:00 2013 | VPN Log | (g2gips0) #84: IPsec SA established {ESP=>0xed0c900c <0x370391e7 AH=>0x59aa328c <0x2437ecdf IPCOMP=>0x00008258 <0x00003467 |
Sep 30 12:02:00 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:02:00 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected |
Sep 30 12:02:00 2013 | VPN Log | (g2gips0) #84: Dead Peer Detection (RFC 3706) enabled |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Outbound SPI value = ed0c900c |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Outbound SPI value = ed0c900c |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Inbound SPI value = 370391e7 |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Inbound SPI value = 370391e7 |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Outbound SPI value = 59aa328c |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Outbound SPI value = 59aa328c |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Inbound SPI value = 2437ecdf |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: [Tunnel Negotiation Info] Inbound SPI value = 2437ecdf |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: responding to Quick Mode |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: You should NOT use insecure ESP algorithms [ESP_DES (64)]! |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #84: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1. |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #83: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #83: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #83: ISAKMP SA established |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #83: [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established |
Sep 30 12:01:59 2013 | VPN Log | (g2gips0) #83: [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established |
Sep 30 12:01:59 2013 |
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide