cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4988
Views
0
Helpful
6
Replies

2 RV042 Internet up but VPN down suddenly

gvelasquez1970
Level 1
Level 1

Dear colleague,

I have 2 RV042 working in Mode gateway to gateway (VPN configures Mode: Aggresive).

The link is working perfect during 3 or more days, suddenly  VPN´s connection go down, and the only way to go up VPN connection is restarting one of the RV042 routers.

I have the following logs Side by Side

SIDE Sta Marta

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #394: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #394: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: responding to Quick Mode

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] Inbound SPI value = 583de6af

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] Inbound SPI value = 583de6af

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] Outbound SPI value = fedc07ec

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] Outbound SPI value = fedc07ec

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: Dead Peer Detection (RFC 3706) enabled

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #396: IPsec SA established {ESP=>0xfedc07ec <0x583de6af

Aug 9 11:04:21 2013                      VPN Log     (g2gips0) #394: received Delete SA(0x90ff2e1f) payload: deleting IPSEC State #395

Aug 9 11:04:21 2013                      VPN Log     (g2gips0) #394: received Delete SA(0x90ff2e1f) payload: deleting IPSEC State #395

Aug 9 11:26:26 2013                      VPN Log     ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:26:46 2013                      Kernel        last message repeated 2 times

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #394: DPD: No response from peer - declaring peer dead

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #394: DPD: No response from peer - declaring peer dead

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #394: DPD: Terminating all SAs using this connection

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #396: deleting state (STATE_QUICK_R2)

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #394: deleting state (STATE_AGGR_I2)

Aug 9 11:26:56 2013                      VPN Log     ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:26:56 2013                      VPN Log     ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:26:56 2013                      VPN Log     DPD: Clearing connection

Aug 9 11:26:56 2013                      VPN Log     DPD: Clearing connection

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #397: initiating Aggressive Mode #397, connection 'g2gips0'

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #397: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #397: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 9 11:26:56 2013                      VPN Log     ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:26:56 2013                      VPN Log     (g2gips0) #397: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:27:26 2013                      Kernel        last message repeated 2 times

Aug 9 11:28:06 2013                      VPN Log     (g2gips0) #397: max number of retransmissions (2) reached STATE_AGGR_I1

Aug 9 11:28:06 2013                      VPN Log     (g2gips0) #397: max number of retransmissions (2) reached STATE_AGGR_I1

Aug 9 11:28:06 2013                      VPN Log     (g2gips0) #397: starting keying attempt 2 of an unlimited number

Aug 9 11:28:06 2013                      VPN Log     (g2gips0) #398: initiating Aggressive Mode #398 to replace #397, connection 'g2gips0'

Aug 9 11:28:06 2013                      VPN Log     (g2gips0) #398: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 9 11:28:06 2013                      VPN Log     (g2gips0) #398: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 9 11:28:06 2013                      VPN Log     (g2gips0) #398: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:28:36 2013                      VPN Log     (g2gips0) #398: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:29:16 2013                      VPN Log     (g2gips0) #398: max number of retransmissions (2) reached STATE_AGGR_I1

Aug 9 11:29:16 2013                      VPN Log     (g2gips0) #398: max number of retransmissions (2) reached STATE_AGGR_I1

Aug 9 11:29:16 2013                      VPN Log     (g2gips0) #398: starting keying attempt 3 of an unlimited number

Aug 9 11:29:16 2013                      VPN Log     (g2gips0) #399: initiating Aggressive Mode #399 to replace #398, connection 'g2gips0'

Aug 9 11:29:16 2013                      VPN Log     (g2gips0) #399: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 9 11:29:16 2013                      VPN Log     (g2gips0) #399: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 9 11:29:16 2013                      VPN Log     (g2gips0) #399: ERROR: asynchronous network error report on eth1 for message to 200.35.60.100 port 500, complainant 200.35.60.100: Connection refused [errno 146, origin ICMP type 3 code 3 (not authenticated)]

Aug 9 11:29:46 2013                      Kernel        last message repeated 2 times

Aug 9 11:30:26 2013                      VPN Log     (g2gips0) #399: max number of retransmissions (2) reached STATE_AGGR_I1

Aug 9 11:30:26 2013                      VPN Log     (g2gips0) #399: max number of retransmissions (2) reached STATE_AGGR_I1

Aug 9 11:30:26 2013                      VPN Log     (g2gips0) #399: starting keying attempt 4 of an unlimited number

Aug 9 11:30:26 2013                      VPN Log     (g2gips0) #400: initiating Aggressive Mode #400 to replace #399, connection 'g2gips0'

Aug 9 11:30:26 2013                      VPN Log     (g2gips0) #400: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 9 11:30:26 2013                      VPN Log     (g2gips0) #400: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

SIDE Valledupar

Aug 9 09:24:07 2013                      VPN Log     (qknips2) #252: IPsec SA established {ESP=>0x6737c489 <0xb161b874

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #243 {using isakmp#250}

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] Inbound SPI value = 90ff2e1f

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] Inbound SPI value = 90ff2e1f

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] Outbound SPI value = 7668119c

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] Outbound SPI value = 7668119c

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: Dead Peer Detection (RFC 3706) enabled

Aug 9 10:05:25 2013                      VPN Log     (g2gips0) #253: sent QI2, IPsec SA established {ESP=>0x7668119c <0x90ff2e1f

Aug 9 10:05:35 2013                      VPN Log     (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x901ef7d9) not found (maybe expired)

Aug 9 10:05:35 2013                      VPN Log     (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x901ef7d9) not found (maybe expired)

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: received Vendor ID payload [RFC 3947]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: received Vendor ID payload [RFC 3947]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 9 10:22:52 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 9 10:22:53 2013                      VPN Log     packet from 186.116.16.186:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 9 10:22:53 2013                      VPN Log     packet from 186.116.16.186:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 9 10:22:53 2013                      VPN Log     packet from 186.116.16.186:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: responding to Main Mode

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: Peer ID is ID_IPV4_ADDR: '192.168.1.10'

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: sent MR3, ISAKMP SA established

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #254: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: responding to Quick Mode

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] Inbound SPI value = 5bd8066

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] Inbound SPI value = 5bd8066

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] Outbound SPI value = 83492640

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] Outbound SPI value = 83492640

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #255: IPsec SA established {ESP=>0x83492640 <0x05bd8066

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #251: received Delete SA(0x6737c489) payload: deleting IPSEC State #252

Aug 9 10:22:53 2013                      VPN Log     (qknips2) #251: received Delete SA(0x6737c489) payload: deleting IPSEC State #252

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #253 {using isakmp#250}

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] Inbound SPI value = fedc07ec

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] Inbound SPI value = fedc07ec

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] Outbound SPI value = 583de6af

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] Outbound SPI value = 583de6af

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: Dead Peer Detection (RFC 3706) enabled

Aug 9 11:04:11 2013                      VPN Log     (g2gips0) #256: sent QI2, IPsec SA established {ESP=>0x583de6af <0xfedc07ec

Aug 9 11:04:21 2013                      VPN Log     (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x7668119c) not found (maybe expired)

Aug 9 11:04:21 2013                      VPN Log     (g2gips0) #250: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x7668119c) not found (maybe expired)

Aug 9 11:23:35 2013                      VPN Log     (qknips2) #257: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #255 {using isakmp#254}

Aug 9 11:23:35 2013                      VPN Log     (qknips2) #257: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 11:23:35 2013                      VPN Log     (qknips2) #257: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 11:24:00 2013                      VPN Log     (qknips2) #255: IPsec SA expired (LATEST!)

Aug 9 11:24:45 2013                      VPN Log     (qknips2) #257: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 9 11:24:45 2013                      VPN Log     (qknips2) #257: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 9 11:24:45 2013                      VPN Log     (qknips2) #257: starting keying attempt 2 of an unlimited number

Aug 9 11:24:45 2013                      VPN Log     (qknips2) #258: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #257 {using isakmp#254}

Aug 9 11:24:45 2013                      VPN Log     (qknips2) #258: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 11:24:45 2013                      VPN Log     (qknips2) #258: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 9 11:25:55 2013                      VPN Log     (qknips2) #258: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 9 11:25:55 2013                      VPN Log     (qknips2) #258: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 9 11:25:55 2013                      VPN Log     (qknips2) #258: starting keying attempt 3 of an unlimited number

Aug 9 11:25:55 2013                      VPN Log     (qknips2) #258: [Tunnel Negotiation Info] ipsecdoi_initiate: (qknips2) has retry 3 times [policy:65; serial no:102], so reset this connection!

attached find screenshop IPSec configuration.

6 Replies 6

jeffrrod
Level 4
Level 4

Dear Guillermo,

Thank you for reaching Small Business Support Community.

I'd fist suggest you to make sure you run the latest firmware release version for RV42 routers, v.4.2.2.08;

http://software.cisco.com/download/release.html?mdfid=282414010&flowid=784&softwareid=282465789&release=4.2.2.08&relind=AVAILABLE&rellifecycle=&reltype=latest

I then suggest you to uncheck the "Dead Peer Detection" advanced VPN setting on both the RV042 and test it out.  If the problem persists then uncheck the "keep alive",  then monitor, if the problem still persists then uncheck the 'Aggressive mode" to turn it into "Normal mode" which is the recommended setting for security purposes.

The above steps should fix up the problem but please do not hesitate to reach me back if anything comes up and/or if there is any further assistance I may help you with.

Kind regards,

Jeffrey Rodriguez S. .:|:.:|:.
Cisco Customer Support Engineer

*Please rate the Post so other will know when an answer has been found.

Jeffrey Rodriguez S. .:|:.:|:. Cisco Customer Support Engineer *Please rate the Post so other will know when an answer has been found.

Jeffrey:

Thanks for reply.

I have the last version mentioned in both Routers.

I will do the others steps, first uncheck

"Dead Peer Detection"

"keep alive"

'Aggressive mode"

and monitor for each unselection.

Guillermo.

Jeffrey:

Yesterday, Monday August 12th, VPN go down again,

There is something curious....the only way in order to up VPN, it was restart RV042 Valledupar side.

Additionally, in Valledupar side, I have a new RV042; before I had a RV082 with the same behavior 2 week ago, I contacted Small business support with the ticket SR 626766425 - [LATAM]RV082 VPN, and RV082 it is in process of replacement.

“Valledupar side” a Wan connection thru PPoE.

“SantaMarta side” a Wan connection thru Static IP.

Thanks,

Guillermo.

Jeffrey:

Still the problem, today went down VPN.

this is the log

“Valledupar side”

Valledupar

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] Inbound SPI value = 22c4e86d

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] Inbound SPI value = 22c4e86d

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] Outbound SPI value = cc08ce8b

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] Outbound SPI value = cc08ce8b

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 03:45:25 2013    VPN Log    (g2gips0) #67: sent QI2, IPsec SA established {ESP=>0xcc08ce8b <0x22c4e86d

Aug 15 03:45:35 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xfd65082d) not found (maybe expired)

Aug 15 03:45:35 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xfd65082d) not found (maybe expired)

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #67 {using isakmp#63}

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] Inbound SPI value = 6578278

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] Inbound SPI value = 6578278

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] Outbound SPI value = 84cfcc4b

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] Outbound SPI value = 84cfcc4b

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 04:44:11 2013    VPN Log    (g2gips0) #68: sent QI2, IPsec SA established {ESP=>0x84cfcc4b <0x06578278

Aug 15 04:44:21 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcc08ce8b) not found (maybe expired)

Aug 15 04:44:21 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcc08ce8b) not found (maybe expired)

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #68 {using isakmp#63}

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] Inbound SPI value = 9d88d3bc

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] Inbound SPI value = 9d88d3bc

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] Outbound SPI value = 45a779d1

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] Outbound SPI value = 45a779d1

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 05:42:56 2013    VPN Log    (g2gips0) #69: sent QI2, IPsec SA established {ESP=>0x45a779d1 <0x9d88d3bc

Aug 15 05:43:06 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x84cfcc4b) not found (maybe expired)

Aug 15 05:43:06 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x84cfcc4b) not found (maybe expired)

Aug 15 06:41:43 2013    VPN Log    (g2gips0) #70: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #69 {using isakmp#63}

Aug 15 06:41:43 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 06:41:43 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] Inbound SPI value = 792868ac

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] Inbound SPI value = 792868ac

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] Outbound SPI value = 62e42dc7

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] Outbound SPI value = 62e42dc7

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 06:41:44 2013    VPN Log    (g2gips0) #70: sent QI2, IPsec SA established {ESP=>0x62e42dc7 <0x792868ac

Aug 15 06:41:54 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x45a779d1) not found (maybe expired)

Aug 15 06:41:54 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x45a779d1) not found (maybe expired)

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #70 {using isakmp#63}

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] Inbound SPI value = 25c476af

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] Inbound SPI value = 25c476af

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] Outbound SPI value = c62c56bb

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] Outbound SPI value = c62c56bb

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 07:40:32 2013    VPN Log    (g2gips0) #71: sent QI2, IPsec SA established {ESP=>0xc62c56bb <0x25c476af

Aug 15 07:40:42 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x62e42dc7) not found (maybe expired)

Aug 15 07:40:42 2013    VPN Log    (g2gips0) #63: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x62e42dc7) not found (maybe expired)

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: initiating Aggressive Mode #72 to replace #63, connection 'g2gips0'

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator Send Aggressive Mode 1st packet

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] <<< Initiator Received Aggressive Mode 2nd packet

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] <<< Initiator Received Aggressive Mode 2nd packet

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: You should NOT use insecure IKE algorithms (OAKLEY_DES_CBC)!

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: You should NOT use insecure IKE algorithms (OAKLEY_DES_CBC)!

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: Peer ID is ID_IPV4_ADDR: '190.90.66.254'

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: Peer ID is ID_IPV4_ADDR: '190.90.66.254'

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator send Aggressive Mode 3rd packet

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] >>> Initiator send Aggressive Mode 3rd packet

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established

Aug 15 08:06:38 2013    VPN Log    (g2gips0) #72: sent AI2, ISAKMP SA established

Aug 15 08:06:38 2013    VPN Log    packet from 190.90.66.254:500: Informational Exchange is for an unknown (expired?) SA

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #71 {using isakmp#72}

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] Inbound SPI value = 49716454

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] Inbound SPI value = 49716454

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] Outbound SPI value = 3ab8c44

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] Outbound SPI value = 3ab8c44

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 08:39:20 2013    VPN Log    (g2gips0) #73: sent QI2, IPsec SA established {ESP=>0x03ab8c44 <0x49716454

Aug 15 08:39:30 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc62c56bb) not found (maybe expired)

Aug 15 08:39:30 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc62c56bb) not found (maybe expired)

Aug 15 09:09:57 2013    VPN Log    added connection description (qknips1)

Aug 15 09:09:57 2013    VPN Log    listening for IKE messages

Aug 15 09:09:57 2013    VPN Log    forgetting secrets

Aug 15 09:09:57 2013    VPN Log    loading secrets from '/etc/ipsec.d/ipsec.secrets'

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [Vid-Initial-Contact]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [Vid-Initial-Contact]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 15 09:10:21 2013    VPN Log    packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: responding to Main Mode

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: Peer ID is ID_IPV4_ADDR: '192.168.1.3'

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: sent MR3, ISAKMP SA established

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #74: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: responding to Quick Mode

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] Inbound SPI value = f3899bfb

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] Inbound SPI value = f3899bfb

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] Outbound SPI value = 9e1a872c

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] Outbound SPI value = 9e1a872c

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 09:10:21 2013    VPN Log    (qknips1) #75: IPsec SA established {ESP=>0x9e1a872c <0xf3899bfb

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #73 {using isakmp#72}

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] Inbound SPI value = 100e406c

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] Inbound SPI value = 100e406c

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] Outbound SPI value = 549050f3

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] Outbound SPI value = 549050f3

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 09:38:09 2013    VPN Log    (g2gips0) #76: sent QI2, IPsec SA established {ESP=>0x549050f3 <0x100e406c

Aug 15 09:38:19 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x03ab8c44) not found (maybe expired)

Aug 15 09:38:19 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x03ab8c44) not found (maybe expired)

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 15 10:09:12 2013    VPN Log    packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: responding to Main Mode

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: Peer ID is ID_IPV4_ADDR: '192.168.1.3'

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 15 10:09:12 2013    VPN Log    (qknips1) #77: sent MR3, ISAKMP SA established

Aug 15 10:09:13 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 15 10:09:13 2013    VPN Log    (qknips1) #77: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: responding to Quick Mode

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] Inbound SPI value = 2929d96d

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] Inbound SPI value = 2929d96d

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] Outbound SPI value = a9ea764

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] Outbound SPI value = a9ea764

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 10:09:13 2013    VPN Log    (qknips1) #78: IPsec SA established {ESP=>0x0a9ea764 <0x2929d96d

Aug 15 10:09:13 2013    VPN Log    (qknips1) #74: received Delete SA(0x9e1a872c) payload: deleting IPSEC State #75

Aug 15 10:09:13 2013    VPN Log    (qknips1) #74: received Delete SA(0x9e1a872c) payload: deleting IPSEC State #75

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #76 {using isakmp#72}

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] Inbound SPI value = 5c36a4f6

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] Inbound SPI value = 5c36a4f6

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] Outbound SPI value = df0c137e

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] Outbound SPI value = df0c137e

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 10:36:55 2013    VPN Log    (g2gips0) #79: sent QI2, IPsec SA established {ESP=>0xdf0c137e <0x5c36a4f6

Aug 15 10:37:05 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x549050f3) not found (maybe expired)

Aug 15 10:37:05 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x549050f3) not found (maybe expired)

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: received Vendor ID payload [RFC 3947]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [FRAGMENTATION]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 15 11:07:58 2013    VPN Log    packet from 186.112.204.105:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet

Aug 15 11:07:58 2013    VPN Log    (qknips1) #80: responding to Main Mode

Aug 15 11:07:58 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 15 11:07:58 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: Peer ID is ID_IPV4_ADDR: '192.168.1.3'

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: sent MR3, ISAKMP SA established

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #80: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: esp_ealg_id=3-3,esp_ealg_keylen=0, key_len=192,esp_aalg_id=1-1.

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: responding to Quick Mode

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] Inbound SPI value = 701780a6

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] Inbound SPI value = 701780a6

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] Outbound SPI value = c28fcb3e

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] Outbound SPI value = c28fcb3e

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 11:07:59 2013    VPN Log    (qknips1) #81: IPsec SA established {ESP=>0xc28fcb3e <0x701780a6

Aug 15 11:07:59 2013    VPN Log    (qknips1) #77: received Delete SA(0x0a9ea764) payload: deleting IPSEC State #78

Aug 15 11:07:59 2013    VPN Log    (qknips1) #77: received Delete SA(0x0a9ea764) payload: deleting IPSEC State #78

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+AGGRESSIVE to replace #79 {using isakmp#72}

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: esp_ealg_id=2-2,esp_ealg_keylen=0, key_len=64,esp_aalg_id=1-1.

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: You should NOT use insecure ESP algorithms [ESP_DES (64)]!

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] Inbound SPI value = abd90602

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] Inbound SPI value = abd90602

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] Outbound SPI value = e4f18769

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] Outbound SPI value = e4f18769

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: [Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected

Aug 15 11:35:44 2013    VPN Log    (g2gips0) #82: sent QI2, IPsec SA established {ESP=>0xe4f18769 <0xabd90602

Aug 15 11:35:54 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xdf0c137e) not found (maybe expired)

Aug 15 11:35:54 2013    VPN Log    (g2gips0) #72: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xdf0c137e) not found (maybe expired)

Aug 15 12:08:41 2013    VPN Log    (qknips1) #83: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #81 {using isakmp#80}

Aug 15 12:08:41 2013    VPN Log    (qknips1) #83: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 12:08:41 2013    VPN Log    (qknips1) #83: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 12:09:06 2013    VPN Log    (qknips1) #81: IPsec SA expired (LATEST!)

Aug 15 12:09:51 2013    VPN Log    (qknips1) #83: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 15 12:09:51 2013    VPN Log    (qknips1) #83: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 15 12:09:51 2013    VPN Log    (qknips1) #83: starting keying attempt 2 of an unlimited number

Aug 15 12:09:52 2013    VPN Log    (qknips1) #84: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #83 {using isakmp#80}

Aug 15 12:09:52 2013    VPN Log    (qknips1) #84: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 12:09:52 2013    VPN Log    (qknips1) #84: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 12:10:23 2013    VPN Log    (qknips1) #85: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS {using isakmp#80}

Aug 15 12:10:23 2013    VPN Log    (qknips1) #85: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 12:10:23 2013    VPN Log    (qknips1) #85: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 12:11:02 2013    VPN Log    (qknips1) #84: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 15 12:11:02 2013    VPN Log    (qknips1) #84: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 15 12:11:02 2013    VPN Log    (qknips1) #84: starting keying attempt 3 of an unlimited number

Aug 15 12:11:02 2013    VPN Log    (qknips1) #84: [Tunnel Negotiation Info] ipsecdoi_initiate: (qknips1) has retry 3 times [policy:65; serial no:54], so reset this connection!

Aug 15 12:11:02 2013    VPN Log    (qknips1) #84: [Tunnel Negotiation Info] ipsecdoi_initiate: (qknips1) has retry 3 times [policy:65; serial no:54], so reset this connection!

Aug 15 12:11:33 2013    VPN Log    (qknips1) #85: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 15 12:11:33 2013    VPN Log    (qknips1) #85: max number of retransmissions (2) reached STATE_QUICK_I1. No acceptable response to our first Quick Mode message: perhaps peer likes no proposal

Aug 15 12:11:33 2013    VPN Log    (qknips1) #85: starting keying attempt 2 of an unlimited number

Aug 15 12:11:33 2013    VPN Log    (qknips1) #87: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS to replace #85 {using isakmp#80}

Aug 15 12:11:33 2013    VPN Log    (qknips1) #87: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

Aug 15 12:11:33 2013    VPN Log    (qknips1) #87: [Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet

_______________________________

Now I had changed

'Aggressive mode" to Normal Mode and I will monitor the link.

Thanks.

I have the same problem with a site-to-site VPN between one RV130 and one RV130W.

The link is working for some hours or days, suddenly goes down, even if the status is Connected and the led is green. The only way to go up VPN connection is restarting one of the routers.

I have latest Firmware version 1.0.3.28, I have unchecked "Dead Peer Detection" , exchange mode is "Main" (not aggressive), i can't find "Keep alive" maybe is a different model.
I have also tryed to increase SA lifetime to max value 86400 but nothing changed.

SIDE RV130:

2018-03-07 00:10:38 RV130 daemon.info udhcpd[1446]: received REQUEST from 10:40:F3:D0:83:54
2018-03-07 00:10:38 RV130 daemon.info udhcpd[1446]: sending ACK to 10.20.20.106
2018-03-07 00:29:40 RV130 authpriv.warning pluto[1942]: "VPN-A" #4: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW+SAREFTRACK to replace #3 {using isakmp#1 msgid:499abe71 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP768}
2018-03-07 00:29:40 RV130 authpriv.warning pluto[1942]: "VPN-A" #4: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
2018-03-07 00:29:40 RV130 authpriv.warning pluto[1942]: "VPN-A" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x4e1353fb <0xbba83c17 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=79.xxx.xxx.xxx:4500 DPD=none}
2018-03-07 00:29:45 RV130 authpriv.warning pluto[1942]: "VPN-A" #1: ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x235267a6) not found (maybe expired)
2018-03-07 00:29:45 RV130 authpriv.warning pluto[1942]: "VPN-A" #1: received and ignored informational message
2018-03-07 00:32:30 RV130 daemon.info udhcpd[1446]: received REQUEST from 10:40:F3:D0:83:54
2018-03-07 00:32:30 RV130 daemon.info udhcpd[1446]: sending ACK to 10.20.20.106

 

SIDE RV130W:

2018-03-07 00:09:54 RV130W daemon.info dhclient: RCV: Advertise message on vlan2 from fe80::1.
2018-03-07 00:09:54 RV130W daemon.info dhclient: message status code NoAddrsAvail.
2018-03-07 00:11:55 RV130W daemon.info dhclient: RCV: Advertise message on vlan2 from fe80::1.
2018-03-07 00:11:55 RV130W daemon.info dhclient: message status code NoAddrsAvail.
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: the peer proposed: 10.10.10.0/24:0/0 -> 10.20.20.0/24:0/0
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: new NAT mapping for #10, was 79.yyy.yyy.yyy:4500, now 79.yyy.yyy.yyy:56554
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #9: new NAT mapping for #9, was 79.yyy.yyy.yyy:4500, now 79.yyy.yyy.yyy:56554
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: new NAT mapping for #7, was 79.yyy.yyy.yyy:4500, now 79.yyy.yyy.yyy:56554
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: responding to Quick Mode proposal {msgid:499abe71}
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10:     us: 10.10.10.0/24===192.168.1.2<192.168.1.2>[+S=C]---192.168.1.1
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10:   them: 79.yyy.yyy.yyy<79.yyy.yyy.yyy>[192.168.1.2,+S=C]===10.20.20.0/24
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: keeping refhim=4294901761 during rekey
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
2018-03-07 00:29:40 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
2018-03-07 00:29:41 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
2018-03-07 00:29:41 RV130W authpriv.warning pluto[17655]: "VPN-A" #10: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0xbba83c17 <0x4e1353fb xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=79.yyy.yyy.yyy:56554 DPD=none}
2018-03-07 00:29:45 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: received Delete SA(0x87dc399c) payload: deleting IPSEC State #9
2018-03-07 00:29:45 RV130W authpriv.warning pluto[17655]: "VPN-A" #7: received and ignored informational message
2018-03-07 00:29:54 RV130W daemon.info dhclient: RCV: Advertise message on vlan2 from fe80::1.
2018-03-07 00:29:54 RV130W daemon.info dhclient: message status code NoAddrsAvail.