08-09-2013 12:03 PM
Dear colleague,
I have 2 RV042 working in Mode gateway to gateway (VPN configures Mode: Aggresive).
The link is working perfect during 3 or more days, suddenly VPN´s connection go down, and the only way to go up VPN connection is restarting one of the RV042 routers.
I have the following logs Side by Side
SIDE Sta Marta
Aug 9 11:04:11 2013 VPN Log (g2gips0) #394: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #394: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: responding to Quick Mode
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] Inbound SPI value = 583de6af
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] Inbound SPI value = 583de6af
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] Outbound SPI value = fedc07ec
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] Outbound SPI value = fedc07ec
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: Dead Peer Detection (RFC 3706) enabled
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 11:04:11 2013 VPN Log (g2gips0) #396: IPsec SA established {ESP=>0xfedc07ec <0x583de6af
Aug 9 11:04:21 2013 VPN Log (g2gips0) #394: received Delete SA(0x90ff2e1f) payload: deleting IPSEC State #395
Aug 9 11:04:21 2013 VPN Log (g2gips0) #394: received Delete SA(0x90ff2e1f) payload: deleting IPSEC State #395
Aug 9 11:26:26 2013 VPN Log ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:26:46 2013 Kernel last message repeated 2 times
Aug 9 11:26:56 2013 VPN Log (g2gips0) #394: DPD: No response from peer - declaring peer dead
Aug 9 11:26:56 2013 VPN Log (g2gips0) #394: DPD: No response from peer - declaring peer dead
Aug 9 11:26:56 2013 VPN Log (g2gips0) #394: DPD: Terminating all SAs using this connection
Aug 9 11:26:56 2013 VPN Log (g2gips0) #396: deleting state (STATE_QUICK_R2)
Aug 9 11:26:56 2013 VPN Log (g2gips0) #394: deleting state (STATE_AGGR_I2)
Aug 9 11:26:56 2013 VPN Log ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:26:56 2013 VPN Log ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:26:56 2013 VPN Log DPD: Clearing connection
Aug 9 11:26:56 2013 VPN Log DPD: Clearing connection
Aug 9 11:26:56 2013 VPN Log (g2gips0) #397: initiating Aggressive Mode #397, connection 'g2gips0'
Aug 9 11:26:56 2013 VPN Log (g2gips0) #397: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 9 11:26:56 2013 VPN Log (g2gips0) #397: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 9 11:26:56 2013 VPN Log ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:26:56 2013 VPN Log (g2gips0) #397: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:27:26 2013 Kernel last message repeated 2 times
Aug 9 11:28:06 2013 VPN Log (g2gips0) #397: max number of retransmissions (2) reached STATE_AGGR_I1
Aug 9 11:28:06 2013 VPN Log (g2gips0) #397: max number of retransmissions (2) reached STATE_AGGR_I1
Aug 9 11:28:06 2013 VPN Log (g2gips0) #397: starting keying attempt 2 of an unlimited number
Aug 9 11:28:06 2013 VPN Log (g2gips0) #398: initiating Aggressive Mode #398 to replace #397, connection 'g2gips0'
Aug 9 11:28:06 2013 VPN Log (g2gips0) #398: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 9 11:28:06 2013 VPN Log (g2gips0) #398: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 9 11:28:06 2013 VPN Log (g2gips0) #398: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:28:36 2013 VPN Log (g2gips0) #398: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:29:16 2013 VPN Log (g2gips0) #398: max number of retransmissions (2) reached STATE_AGGR_I1
Aug 9 11:29:16 2013 VPN Log (g2gips0) #398: max number of retransmissions (2) reached STATE_AGGR_I1
Aug 9 11:29:16 2013 VPN Log (g2gips0) #398: starting keying attempt 3 of an unlimited number
Aug 9 11:29:16 2013 VPN Log (g2gips0) #399: initiating Aggressive Mode #399 to replace #398, connection 'g2gips0'
Aug 9 11:29:16 2013 VPN Log (g2gips0) #399: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 9 11:29:16 2013 VPN Log (g2gips0) #399: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 9 11:29:16 2013 VPN Log (g2gips0) #399: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]
Aug 9 11:29:46 2013 Kernel last message repeated 2 times
Aug 9 11:30:26 2013 VPN Log (g2gips0) #399: max number of retransmissions (2) reached STATE_AGGR_I1
Aug 9 11:30:26 2013 VPN Log (g2gips0) #399: max number of retransmissions (2) reached STATE_AGGR_I1
Aug 9 11:30:26 2013 VPN Log (g2gips0) #399: starting keying attempt 4 of an unlimited number
Aug 9 11:30:26 2013 VPN Log (g2gips0) #400: initiating Aggressive Mode #400 to replace #399, connection 'g2gips0'
Aug 9 11:30:26 2013 VPN Log (g2gips0) #400: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 9 11:30:26 2013 VPN Log (g2gips0) #400: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
SIDE Valledupar
Aug 9 09:24:07 2013 VPN Log (qknips2) #252: IPsec SA established {ESP=>0x6737c489 <0xb161b874
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #243 {using isakmp#250}
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] Inbound SPI value = 90ff2e1f
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] Inbound SPI value = 90ff2e1f
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] Outbound SPI value = 7668119c
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] Outbound SPI value = 7668119c
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: Dead Peer Detection (RFC 3706) enabled
Aug 9 10:05:25 2013 VPN Log (g2gips0) #253: sent QI2, IPsec SA established {ESP=>0x7668119c <0x90ff2e1f
Aug 9 10:05:35 2013 VPN Log (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x901ef7d9) not found (maybe expired)
Aug 9 10:05:35 2013 VPN Log (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x901ef7d9) not found (maybe expired)
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: received Vendor ID payload [RFC 3947]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: received Vendor ID payload [RFC 3947]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 9 10:22:52 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 9 10:22:53 2013 VPN Log packet from 186.116.16.186:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 9 10:22:53 2013 VPN Log packet from 186.116.16.186:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 9 10:22:53 2013 VPN Log packet from 186.116.16.186:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: responding to Main Mode
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: Peer ID is ID_IPV4_ADDR: '192.168.1.10'
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: sent MR3, ISAKMP SA established
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: responding to Quick Mode
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] Inbound SPI value = 5bd8066
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] Inbound SPI value = 5bd8066
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] Outbound SPI value = 83492640
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] Outbound SPI value = 83492640
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 10:22:53 2013 VPN Log (qknips2) #255: IPsec SA established {ESP=>0x83492640 <0x05bd8066
Aug 9 10:22:53 2013 VPN Log (qknips2) #251: received Delete SA(0x6737c489) payload: deleting IPSEC State #252
Aug 9 10:22:53 2013 VPN Log (qknips2) #251: received Delete SA(0x6737c489) payload: deleting IPSEC State #252
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #253 {using isakmp#250}
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] Inbound SPI value = fedc07ec
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] Inbound SPI value = fedc07ec
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] Outbound SPI value = 583de6af
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] Outbound SPI value = 583de6af
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: Dead Peer Detection (RFC 3706) enabled
Aug 9 11:04:11 2013 VPN Log (g2gips0) #256: sent QI2, IPsec SA established {ESP=>0x583de6af <0xfedc07ec
Aug 9 11:04:21 2013 VPN Log (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x7668119c) not found (maybe expired)
Aug 9 11:04:21 2013 VPN Log (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x7668119c) not found (maybe expired)
Aug 9 11:23:35 2013 VPN Log (qknips2) #257: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #255 {using isakmp#254}
Aug 9 11:23:35 2013 VPN Log (qknips2) #257: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 11:23:35 2013 VPN Log (qknips2) #257: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 11:24:00 2013 VPN Log (qknips2) #255: IPsec SA expired (LATEST!)
Aug 9 11:24:45 2013 VPN Log (qknips2) #257: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 9 11:24:45 2013 VPN Log (qknips2) #257: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 9 11:24:45 2013 VPN Log (qknips2) #257: starting keying attempt 2 of an unlimited number
Aug 9 11:24:45 2013 VPN Log (qknips2) #258: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #257 {using isakmp#254}
Aug 9 11:24:45 2013 VPN Log (qknips2) #258: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 11:24:45 2013 VPN Log (qknips2) #258: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 9 11:25:55 2013 VPN Log (qknips2) #258: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 9 11:25:55 2013 VPN Log (qknips2) #258: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 9 11:25:55 2013 VPN Log (qknips2) #258: starting keying attempt 3 of an unlimited number
Aug 9 11:25:55 2013 VPN Log (qknips2) #258: [Tunnel Negotiation Info] ipsecdoi_initiate: (qknips2) has retry 3 times [policy:65; serial no:102], so reset this connection!
attached find screenshop IPSec configuration.
08-12-2013 07:10 AM
Dear Guillermo,
Thank you for reaching Small Business Support Community.
I'd fist suggest you to make sure you run the latest firmware release version for RV42 routers, v.4.2.2.08;
I then suggest you to uncheck the "Dead Peer Detection" advanced VPN setting on both the RV042 and test it out. If the problem persists then uncheck the "keep alive", then monitor, if the problem still persists then uncheck the 'Aggressive mode" to turn it into "Normal mode" which is the recommended setting for security purposes.
The above steps should fix up the problem but please do not hesitate to reach me back if anything comes up and/or if there is any further assistance I may help you with.
Kind regards,
Jeffrey Rodriguez S. .:|:.:|:.
Cisco Customer Support Engineer
*Please rate the Post so other will know when an answer has been found.
08-13-2013 04:09 AM
Jeffrey:
Thanks for reply.
I have the last version mentioned in both Routers.
I will do the others steps, first uncheck
"Dead Peer Detection"
"keep alive"
'Aggressive mode"
and monitor for each unselection.
Guillermo.
08-13-2013 04:26 AM
Jeffrey:
Yesterday, Monday August 12th, VPN go down again,
There is something curious....the only way in order to up VPN, it was restart RV042 Valledupar side.
Additionally, in Valledupar side, I have a new RV042; before I had a RV082 with the same behavior 2 week ago, I contacted Small business support with the ticket SR 626766425 - [LATAM]RV082 VPN, and RV082 it is in process of replacement.
“Valledupar side” a Wan connection thru PPoE.
“SantaMarta side” a Wan connection thru Static IP.
Thanks,
Guillermo.
08-15-2013 06:42 PM
Jeffrey:
Still the problem, today went down VPN.
this is the log
“Valledupar side”
Valledupar
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] Inbound SPI value = 22c4e86d
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] Inbound SPI value = 22c4e86d
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] Outbound SPI value = cc08ce8b
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] Outbound SPI value = cc08ce8b
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 03:45:25 2013 VPN Log (g2gips0) #67: sent QI2, IPsec SA established {ESP=>0xcc08ce8b <0x22c4e86d
Aug 15 03:45:35 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xfd65082d) not found (maybe expired)
Aug 15 03:45:35 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xfd65082d) not found (maybe expired)
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #67 {using isakmp#63}
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] Inbound SPI value = 6578278
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] Inbound SPI value = 6578278
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] Outbound SPI value = 84cfcc4b
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] Outbound SPI value = 84cfcc4b
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 04:44:11 2013 VPN Log (g2gips0) #68: sent QI2, IPsec SA established {ESP=>0x84cfcc4b <0x06578278
Aug 15 04:44:21 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcc08ce8b) not found (maybe expired)
Aug 15 04:44:21 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcc08ce8b) not found (maybe expired)
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #68 {using isakmp#63}
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] Inbound SPI value = 9d88d3bc
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] Inbound SPI value = 9d88d3bc
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] Outbound SPI value = 45a779d1
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] Outbound SPI value = 45a779d1
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 05:42:56 2013 VPN Log (g2gips0) #69: sent QI2, IPsec SA established {ESP=>0x45a779d1 <0x9d88d3bc
Aug 15 05:43:06 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x84cfcc4b) not found (maybe expired)
Aug 15 05:43:06 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x84cfcc4b) not found (maybe expired)
Aug 15 06:41:43 2013 VPN Log (g2gips0) #70: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #69 {using isakmp#63}
Aug 15 06:41:43 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 06:41:43 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] Inbound SPI value = 792868ac
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] Inbound SPI value = 792868ac
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] Outbound SPI value = 62e42dc7
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] Outbound SPI value = 62e42dc7
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 06:41:44 2013 VPN Log (g2gips0) #70: sent QI2, IPsec SA established {ESP=>0x62e42dc7 <0x792868ac
Aug 15 06:41:54 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x45a779d1) not found (maybe expired)
Aug 15 06:41:54 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x45a779d1) not found (maybe expired)
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #70 {using isakmp#63}
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] Inbound SPI value = 25c476af
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] Inbound SPI value = 25c476af
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] Outbound SPI value = c62c56bb
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] Outbound SPI value = c62c56bb
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 07:40:32 2013 VPN Log (g2gips0) #71: sent QI2, IPsec SA established {ESP=>0xc62c56bb <0x25c476af
Aug 15 07:40:42 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x62e42dc7) not found (maybe expired)
Aug 15 07:40:42 2013 VPN Log (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x62e42dc7) not found (maybe expired)
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: initiating Aggressive Mode #72 to replace #63, connection 'g2gips0'
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] <<< Initiator Received Aggressive Mode 2nd packet
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] <<< Initiator Received Aggressive Mode 2nd packet
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: You should NOT use insecure IKE algorithms (OAKLEY_DES_CBC)!
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: You should NOT use insecure IKE algorithms (OAKLEY_DES_CBC)!
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: Peer ID is ID_IPV4_ADDR: '190.90.66.254'
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: Peer ID is ID_IPV4_ADDR: '190.90.66.254'
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator send Aggressive Mode 3rd packet
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator send Aggressive Mode 3rd packet
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established
Aug 15 08:06:38 2013 VPN Log (g2gips0) #72: sent AI2, ISAKMP SA established
Aug 15 08:06:38 2013 VPN Log packet from 190.90.66.254:500: Informational Exchange is for an unknown (expired?) SA
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #71 {using isakmp#72}
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] Inbound SPI value = 49716454
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] Inbound SPI value = 49716454
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] Outbound SPI value = 3ab8c44
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] Outbound SPI value = 3ab8c44
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 08:39:20 2013 VPN Log (g2gips0) #73: sent QI2, IPsec SA established {ESP=>0x03ab8c44 <0x49716454
Aug 15 08:39:30 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc62c56bb) not found (maybe expired)
Aug 15 08:39:30 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc62c56bb) not found (maybe expired)
Aug 15 09:09:57 2013 VPN Log added connection description (qknips1)
Aug 15 09:09:57 2013 VPN Log listening for IKE messages
Aug 15 09:09:57 2013 VPN Log forgetting secrets
Aug 15 09:09:57 2013 VPN Log loading secrets from '/etc/ipsec.d/ipsec.secrets'
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 15 09:10:21 2013 VPN Log packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: responding to Main Mode
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: Peer ID is ID_IPV4_ADDR: '192.168.1.3'
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: sent MR3, ISAKMP SA established
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: responding to Quick Mode
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] Inbound SPI value = f3899bfb
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] Inbound SPI value = f3899bfb
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] Outbound SPI value = 9e1a872c
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] Outbound SPI value = 9e1a872c
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 09:10:21 2013 VPN Log (qknips1) #75: IPsec SA established {ESP=>0x9e1a872c <0xf3899bfb
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #73 {using isakmp#72}
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] Inbound SPI value = 100e406c
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] Inbound SPI value = 100e406c
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] Outbound SPI value = 549050f3
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] Outbound SPI value = 549050f3
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 09:38:09 2013 VPN Log (g2gips0) #76: sent QI2, IPsec SA established {ESP=>0x549050f3 <0x100e406c
Aug 15 09:38:19 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x03ab8c44) not found (maybe expired)
Aug 15 09:38:19 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x03ab8c44) not found (maybe expired)
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 15 10:09:12 2013 VPN Log packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: responding to Main Mode
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: Peer ID is ID_IPV4_ADDR: '192.168.1.3'
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 15 10:09:12 2013 VPN Log (qknips1) #77: sent MR3, ISAKMP SA established
Aug 15 10:09:13 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 15 10:09:13 2013 VPN Log (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: responding to Quick Mode
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] Inbound SPI value = 2929d96d
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] Inbound SPI value = 2929d96d
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] Outbound SPI value = a9ea764
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] Outbound SPI value = a9ea764
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 10:09:13 2013 VPN Log (qknips1) #78: IPsec SA established {ESP=>0x0a9ea764 <0x2929d96d
Aug 15 10:09:13 2013 VPN Log (qknips1) #74: received Delete SA(0x9e1a872c) payload: deleting IPSEC State #75
Aug 15 10:09:13 2013 VPN Log (qknips1) #74: received Delete SA(0x9e1a872c) payload: deleting IPSEC State #75
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #76 {using isakmp#72}
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] Inbound SPI value = 5c36a4f6
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] Inbound SPI value = 5c36a4f6
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] Outbound SPI value = df0c137e
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] Outbound SPI value = df0c137e
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 10:36:55 2013 VPN Log (g2gips0) #79: sent QI2, IPsec SA established {ESP=>0xdf0c137e <0x5c36a4f6
Aug 15 10:37:05 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x549050f3) not found (maybe expired)
Aug 15 10:37:05 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x549050f3) not found (maybe expired)
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 15 11:07:58 2013 VPN Log packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Aug 15 11:07:58 2013 VPN Log (qknips1) #80: responding to Main Mode
Aug 15 11:07:58 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 15 11:07:58 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: Peer ID is ID_IPV4_ADDR: '192.168.1.3'
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: sent MR3, ISAKMP SA established
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: responding to Quick Mode
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] Inbound SPI value = 701780a6
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] Inbound SPI value = 701780a6
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] Outbound SPI value = c28fcb3e
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] Outbound SPI value = c28fcb3e
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 11:07:59 2013 VPN Log (qknips1) #81: IPsec SA established {ESP=>0xc28fcb3e <0x701780a6
Aug 15 11:07:59 2013 VPN Log (qknips1) #77: received Delete SA(0x0a9ea764) payload: deleting IPSEC State #78
Aug 15 11:07:59 2013 VPN Log (qknips1) #77: received Delete SA(0x0a9ea764) payload: deleting IPSEC State #78
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #79 {using isakmp#72}
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: You should NOT use insecure ESP algorithms [ESP_DES (64)]!
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] Inbound SPI value = abd90602
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] Inbound SPI value = abd90602
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] Outbound SPI value = e4f18769
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] Outbound SPI value = e4f18769
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Aug 15 11:35:44 2013 VPN Log (g2gips0) #82: sent QI2, IPsec SA established {ESP=>0xe4f18769 <0xabd90602
Aug 15 11:35:54 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xdf0c137e) not found (maybe expired)
Aug 15 11:35:54 2013 VPN Log (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xdf0c137e) not found (maybe expired)
Aug 15 12:08:41 2013 VPN Log (qknips1) #83: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #81 {using isakmp#80}
Aug 15 12:08:41 2013 VPN Log (qknips1) #83: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 12:08:41 2013 VPN Log (qknips1) #83: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 12:09:06 2013 VPN Log (qknips1) #81: IPsec SA expired (LATEST!)
Aug 15 12:09:51 2013 VPN Log (qknips1) #83: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 15 12:09:51 2013 VPN Log (qknips1) #83: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 15 12:09:51 2013 VPN Log (qknips1) #83: starting keying attempt 2 of an unlimited number
Aug 15 12:09:52 2013 VPN Log (qknips1) #84: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #83 {using isakmp#80}
Aug 15 12:09:52 2013 VPN Log (qknips1) #84: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 12:09:52 2013 VPN Log (qknips1) #84: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 12:10:23 2013 VPN Log (qknips1) #85: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS {using isakmp#80}
Aug 15 12:10:23 2013 VPN Log (qknips1) #85: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 12:10:23 2013 VPN Log (qknips1) #85: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 12:11:02 2013 VPN Log (qknips1) #84: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 15 12:11:02 2013 VPN Log (qknips1) #84: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 15 12:11:02 2013 VPN Log (qknips1) #84: starting keying attempt 3 of an unlimited number
Aug 15 12:11:02 2013 VPN Log (qknips1) #84: [Tunnel Negotiation Info] ipsecdoi_initiate: (qknips1) has retry 3 times [policy:65; serial no:54], so reset this connection!
Aug 15 12:11:02 2013 VPN Log (qknips1) #84: [Tunnel Negotiation Info] ipsecdoi_initiate: (qknips1) has retry 3 times [policy:65; serial no:54], so reset this connection!
Aug 15 12:11:33 2013 VPN Log (qknips1) #85: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 15 12:11:33 2013 VPN Log (qknips1) #85: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal
Aug 15 12:11:33 2013 VPN Log (qknips1) #85: starting keying attempt 2 of an unlimited number
Aug 15 12:11:33 2013 VPN Log (qknips1) #87: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #85 {using isakmp#80}
Aug 15 12:11:33 2013 VPN Log (qknips1) #87: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Aug 15 12:11:33 2013 VPN Log (qknips1) #87: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
_______________________________
08-15-2013 06:44 PM
Now I had changed
'Aggressive mode" to Normal Mode and I will monitor the link.
Thanks.
03-07-2018 12:47 AM - edited 03-07-2018 12:52 AM
I have the same problem with a site-to-site VPN between one RV130 and one RV130W.
The link is working for some hours or days, suddenly goes down, even if the status is Connected and the led is green. The only way to go up VPN connection is restarting one of the routers.
I have latest Firmware version 1.0.3.28, I have unchecked "Dead Peer Detection" , exchange mode is "Main" (not aggressive), i can't find "Keep alive" maybe is a different model.
I have also tryed to increase SA lifetime to max value 86400 but nothing changed.
SIDE RV130:
2018-03-07 00:10:38 RV130 daemon.info udhcpd[1446]: received REQUEST from 10:40:F3:D0:83:54
2018-03-07 00:10:38 RV130 daemon.info udhcpd[1446]: sending ACK to 10.20.20.106
2018-03-07 00:29:40 RV130 authpriv.warning pluto[1942]: "VPN-A" #4: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #3 {using isakmp#1 msgid:499abe71 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP768}
2018-03-07 00:29:40 RV130 authpriv.warning pluto[1942]: "VPN-A" #4: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
2018-03-07 00:29:40 RV130 authpriv.warning pluto[1942]: "VPN-A" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x4e1353fb <0xbba83c17 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=79.xxx.xxx.xxx:4500 DPD=none}
2018-03-07 00:29:45 RV130 authpriv.warning pluto[1942]: "VPN-A" #1: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x235267a6) not found (maybe expired)
2018-03-07 00:29:45 RV130 authpriv.warning pluto[1942]: "VPN-A" #1: received and ignored informational message
2018-03-07 00:32:30 RV130 daemon.info udhcpd[1446]: received REQUEST from 10:40:F3:D0:83:54
2018-03-07 00:32:30 RV130 daemon.info udhcpd[1446]: sending ACK to 10.20.20.106
SIDE RV130W:
2018-03-07 00:09:54 RV130W daemon.info dhclient: RCV: Advertise message on vlan2 from fe80::1.
2018-03-07 00:09:54 RV130W daemon.info dhclient: message status code NoAddrsAvail.
2018-03-07 00:11:55 RV130W daemon.info dhclient: RCV: Advertise message on vlan2 from fe80::1.
2018-03-07 00:11:55 RV130W daemon.info dhclient: message status code NoAddrsAvail.
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: the peer proposed: 10.10.10.0/24:0/0 -> 10.20.20.0/24:0/0
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: new NAT mapping for #10, was 79.yyy.yyy.yyy:4500, now 79.yyy.yyy.yyy:56554
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #9: new NAT mapping for #9, was 79.yyy.yyy.yyy:4500, now 79.yyy.yyy.yyy:56554
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: new NAT mapping for #7, was 79.yyy.yyy.yyy:4500, now 79.yyy.yyy.yyy:56554
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: responding to Quick Mode proposal {msgid:499abe71}
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: us: 10.10.10.0/24===192.168.1.2<192.168.1.2>[+S=C]---192.168.1.1
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: them: 79.yyy.yyy.yyy<79.yyy.yyy.yyy>[192.168.1.2,+S=C]===10.20.20.0/24
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: keeping refhim=4294901761 during rekey
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
2018-03-07 00:29:41 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
2018-03-07 00:29:41 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0xbba83c17 <0x4e1353fb xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=79.yyy.yyy.yyy:56554 DPD=none}
2018-03-07 00:29:45 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: received Delete SA(0x87dc399c) payload: deleting IPSEC State #9
2018-03-07 00:29:45 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: received and ignored informational message
2018-03-07 00:29:54 RV130W daemon.info dhclient: RCV: Advertise message on vlan2 from fe80::1.
2018-03-07 00:29:54 RV130W daemon.info dhclient: message status code NoAddrsAvail.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide