Hello
I have created a group tunnel. When I try to connect to it, I finally got QuickConnect to reach the server but I am unable to connect.
The log for QuickConnect is:
2013/11/05 16:58:30 [STATUS]OS Version: Unknown
2013/11/05 16:58:30 [STATUS]One network interface detected with IP address xx.x.xx.xxx
2013/11/05 16:58:30 [STATUS]Connecting...
2013/11/05 16:58:30 [DEBUG]Input VPN Server Address = xxxx.xxxxxx.com
2013/11/05 16:58:30 [STATUS]Connecting to remote gateway with IP address: xx.xx.xxx.x
2013/11/05 16:58:30 [WARNING]Server's certificate doesn't exist on your local computer.
2013/11/05 16:58:32 [STATUS]Remote gateway was reached by https ...
2013/11/05 16:58:32 [WARNING]Failed to connect.
2013/11/05 16:58:32 [WARNING]Failed to connect!
So I went to see the logs in the router itself and this is what I have:
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [5b362bc820f60007]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [5b362bc820f60007]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: received Vendor ID payload [RFC 3947]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: received Vendor ID payload [RFC 3947]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 5 16:59:40 2013 VPN Log packet from xx.xxx.xxx.xxx:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 5 16:59:40 2013 VPN Log (grpips0)[49] 5.5.0.0/24=== ...xx.xxx.xxx.xxx===? #68846: responding to Main Mode from unknown peer xx.xxx.xxx.xxx
Nov 5 16:59:40 2013 VPN Log (grpips0)[49] 5.5.0.0/24=== ...xx.xxx.xxx.xxx===? #68846: OAKLEY_3DES_CBC is not enabled for this connection. Attribute OAKLEY_ENCRYPTION_ALGORITHM
Nov 5 16:59:40 2013 VPN Log (grpips0)[49] 5.5.0.0/24=== ...xx.xxx.xxx.xxx===? #68846: OAKLEY_3DES_CBC is not enabled for this connection. Attribute OAKLEY_ENCRYPTION_ALGORITHM
Nov 5 16:59:40 2013 VPN Log (grpips0)[49] 5.5.0.0/24=== ...xx.xxx.xxx.xxx===? #68846: no acceptable Oakley Transform
Nov 5 16:59:40 2013 VPN Log (grpips0)[49] 5.5.0.0/24=== ...xx.xxx.xxx.xxx===? #68846: no acceptable Oakley Transform
Nov 5 16:59:40 2013 VPN Log (grpips0)[49] 5.5.0.0/24=== ...xx.xxx.xxx.xxx===? #68846: sending notification NO_PROPOSAL_CHOSEN to xx.xxx.xxx.xxx:500
Nov 5 16:59:40 2013 VPN Log (grpips0)[49] 5.5.0.0/24=== ...xx.xxx.xxx.xxx===?: deleting connection (grpips0) instance with peer xx.xxx.xxx.xxx {isakmp=#0/ipsec=#0}
What is going on? What can I do? And why does the certificate I generated not work?
Thank you