04-18-2019 12:41 AM
Hi everyone,
As I say in the title I'm setting up a VPN IPSec client-to-site using a Cisco RV130 configured as a router for my needs.
I have trouble connecting to this VPN using the Windows integrated client which is yet well configured with my pre-shared key and credentials.
Here is the log :
1 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20: deleting connection "shrew" instance with peer 10.0.0.20 {isakmp=#0/ipsec=#0} 2 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: sending notification NO_PROPOSAL_CHOSEN to 10.0.0.20:500 3 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: no acceptable Oakley Transform 4 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD 5 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD 6 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: policy mandates Extended Authentication (XAUTH) with PSK of initiator (we are responder). Attribute OAKLEY_AUTHENTICATION_METHOD 7 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION 8 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION 9 2019-04-18 8:17:06 AM warning pluto[23619]: "shrew"[8] 10.0.0.20 #8: responding to Main Mode from unknown peer 10.0.0.20 10 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: ignoring Vendor ID payload [IKE CGA version 1] 11 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: ignoring Vendor ID payload [Vid-Initial-Contact] 12 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable] 13 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: ignoring Vendor ID payload [FRAGMENTATION] 14 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but port floating is off 15 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: received Vendor ID payload [RFC 3947] meth=109, but port floating is off 16 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009] 17 2019-04-18 8:17:06 AM warning pluto[23619]: packet from 10.0.0.20:500: ignoring unknown Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
As the log says there is a XAUTH problem, but my credentials are well specified on the client side. Is there a king of incompatibility between the Windows client and the Cisco router ? Should I use another VPN client or use PPTP instead ?
Thanks for your replies !
surejam