01-24-2013 08:26 AM
Hi everybody,
My router is a WRVS4400N v2, firmware V2.0.1.3-ETSI.
I created 5 VPN accounts (asystems1/2/3/4/5) for use with QuickVPN.
When I'm alone (asystems2), everything is fine, I can connect to my VPN.
But, when a second person (asystems3) trying connect, it eject my connection.
Error message for me : "The remote gateway is not responding - Do you want to wait".
Yes -> same error.
No -> it disconnect the second connection too !
I don't understand what's the problem.
Thanks for any help.
Here is the log
an 24 17:13:44 - [VPN Log]: added connection description "asystems2_rw_rw"
Jan 24 17:13:44 - [VPN Log]: listening for IKE messages
Jan 24 17:13:44 - [VPN Log]: forgetting secrets
Jan 24 17:13:44 - [VPN Log]: loading secrets from "/etc/ipsec.secrets"
Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]
Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]
Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: responding to Main Mode from unknown peer 201.124.0.179
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: STATE_MAIN_R1: sent MR1, expecting MI2
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: STATE_MAIN_R2: sent MR2, expecting MI3
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.65'
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: deleting connection "asystems2_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: I did not send a certificate because I do not have one.
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Jan 24 17:13:56 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: responding to Quick Mode {msgid:01000000}
Jan 24 17:13:56 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Jan 24 17:13:56 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Jan 24 17:13:57 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: route-client output: 0
Jan 24 17:13:57 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Jan 24 17:13:57 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: STATE_QUICK_R2: IPsec SA established {ESP=>0x0dc23806 <0xd79d75ed xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Jan 24 17:14:57 - [VPN Log]: added connection description "asystems3_rw_rw"
Jan 24 17:14:57 - [VPN Log]: listening for IKE messages
Jan 24 17:14:57 - [VPN Log]: forgetting secrets
Jan 24 17:14:57 - [VPN Log]: loading secrets from "/etc/ipsec.secrets"
Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]
Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]
Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179: terminating SAs using this connection
Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw" #55: deleting state (STATE_QUICK_R2)
Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw" #54: deleting state (STATE_MAIN_R3)
Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179: deleting connection "asystems2_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}
Jan 24 17:15:08 - [VPN Log]: "asystems2_rw_rw": unroute-client output: 0
Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]
Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]
Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: responding to Main Mode from unknown peer 201.124.0.179
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: STATE_MAIN_R1: sent MR1, expecting MI2
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: STATE_MAIN_R2: sent MR2, expecting MI3
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.66'
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: deleting connection "asystems3_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: I did not send a certificate because I do not have one.
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Jan 24 17:15:10 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: responding to Quick Mode {msgid:01000000}
Jan 24 17:15:10 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Jan 24 17:15:10 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Jan 24 17:15:11 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: route-client output: 0
Jan 24 17:15:11 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Jan 24 17:15:11 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: STATE_QUICK_R2: IPsec SA established {ESP=>0xbe18815e <0xd79d75ee xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}
Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]
Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]
Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179: terminating SAs using this connection
Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw" #57: deleting state (STATE_QUICK_R2)
Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw" #56: deleting state (STATE_MAIN_R3)
Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179: deleting connection "asystems3_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}
Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw": unroute-client output: 0
Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]
Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]
Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: responding to Main Mode from unknown peer 201.124.0.179
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: STATE_MAIN_R1: sent MR1, expecting MI2
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: STATE_MAIN_R2: sent MR2, expecting MI3
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.65'
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: deleting connection "asystems3_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: I did not send a certificate because I do not have one.
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
Jan 24 17:15:16 - [VPN Log]: "asystems2_rw_rw"[3] 201.124.0.179 #59: responding to Quick Mode {msgid:01000000}
Jan 24 17:15:16 - [VPN Log]: "asystems2_rw_rw"[3] 201.124.0.179 #59: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Jan 24 17:15:16 - [VPN Log]: "asystems2_rw_rw"[3] 201.124.0.179 #59: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Jan 24 17:15:16 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Jan 24 17:15:16 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]
01-28-2013 12:25 PM
I also am having the same problem with both this version of firmware and hte older one 2.0.1.2
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide