cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
660
Views
0
Helpful
1
Replies

WRVS4400N vpn several connections issue

support
Level 1
Level 1

Hi everybody,

My router is a WRVS4400N v2, firmware V2.0.1.3-ETSI.

I created 5 VPN accounts (asystems1/2/3/4/5) for use with QuickVPN.

When I'm alone (asystems2), everything is fine, I can connect to my VPN.

But, when a second person (asystems3) trying connect, it eject my connection.

Error message for me : "The remote gateway is not responding - Do you want to wait".

Yes -> same error.

No -> it disconnect the second connection too !

I don't understand what's the problem.

Thanks for any help.

Here is the log

an 24 17:13:44 - [VPN Log]: added connection description "asystems2_rw_rw"

Jan 24 17:13:44 - [VPN Log]: listening for IKE messages

Jan 24 17:13:44 - [VPN Log]: forgetting secrets

Jan 24 17:13:44 - [VPN Log]: loading secrets from "/etc/ipsec.secrets"

Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]

Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]

Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]

Jan 24 17:13:55 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: responding to Main Mode from unknown peer 201.124.0.179

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: STATE_MAIN_R1: sent MR1, expecting MI2

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: STATE_MAIN_R2: sent MR2, expecting MI3

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[1] 201.124.0.179 #54: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.65'

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: deleting connection "asystems2_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: I did not send a certificate because I do not have one.

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3

Jan 24 17:13:55 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #54: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}

Jan 24 17:13:56 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: responding to Quick Mode {msgid:01000000}

Jan 24 17:13:56 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1

Jan 24 17:13:56 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2

Jan 24 17:13:57 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: route-client output: 0

Jan 24 17:13:57 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2

Jan 24 17:13:57 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179 #55: STATE_QUICK_R2: IPsec SA established {ESP=>0x0dc23806 <0xd79d75ed xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}

Jan 24 17:14:57 - [VPN Log]: added connection description "asystems3_rw_rw"

Jan 24 17:14:57 - [VPN Log]: listening for IKE messages

Jan 24 17:14:57 - [VPN Log]: forgetting secrets

Jan 24 17:14:57 - [VPN Log]: loading secrets from "/etc/ipsec.secrets"

Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]

Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]

Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]

Jan 24 17:15:07 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179: terminating SAs using this connection

Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw" #55: deleting state (STATE_QUICK_R2)

Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw" #54: deleting state (STATE_MAIN_R3)

Jan 24 17:15:07 - [VPN Log]: "asystems2_rw_rw"[2] 201.124.0.179: deleting connection "asystems2_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}

Jan 24 17:15:08 - [VPN Log]: "asystems2_rw_rw": unroute-client output: 0

Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]

Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]

Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]

Jan 24 17:15:09 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: responding to Main Mode from unknown peer 201.124.0.179

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: STATE_MAIN_R1: sent MR1, expecting MI2

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: STATE_MAIN_R2: sent MR2, expecting MI3

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[1] 201.124.0.179 #56: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.66'

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: deleting connection "asystems3_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: I did not send a certificate because I do not have one.

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3

Jan 24 17:15:09 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #56: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}

Jan 24 17:15:10 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: responding to Quick Mode {msgid:01000000}

Jan 24 17:15:10 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1

Jan 24 17:15:10 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2

Jan 24 17:15:11 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: route-client output: 0

Jan 24 17:15:11 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2

Jan 24 17:15:11 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179 #57: STATE_QUICK_R2: IPsec SA established {ESP=>0xbe18815e <0xd79d75ee xfrm=3DES_0-HMAC_MD5 NATD=none DPD=none}

Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]

Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]

Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]

Jan 24 17:15:14 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179: terminating SAs using this connection

Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw" #57: deleting state (STATE_QUICK_R2)

Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw" #56: deleting state (STATE_MAIN_R3)

Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw"[2] 201.124.0.179: deleting connection "asystems3_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}

Jan 24 17:15:14 - [VPN Log]: "asystems3_rw_rw": unroute-client output: 0

Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]

Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]

Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [FRAGMENTATION]

Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]

Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [Vid-Initial-Contact]

Jan 24 17:15:15 - [VPN Log]: packet from 201.124.0.179:500: ignoring unknown Vendor ID payload [e3a5966a76379fe707228231e5ce8652]

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: responding to Main Mode from unknown peer 201.124.0.179

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: STATE_MAIN_R1: sent MR1, expecting MI2

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: STATE_MAIN_R2: sent MR2, expecting MI3

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[3] 201.124.0.179 #58: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.65'

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: deleting connection "asystems3_rw_rw" instance with peer 201.124.0.179 {isakmp=#0/ipsec=#0}

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: I did not send a certificate because I do not have one.

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3

Jan 24 17:15:15 - [VPN Log]: "asystems3_rw_rw"[4] 201.124.0.179 #58: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}

Jan 24 17:15:16 - [VPN Log]: "asystems2_rw_rw"[3] 201.124.0.179 #59: responding to Quick Mode {msgid:01000000}

Jan 24 17:15:16 - [VPN Log]: "asystems2_rw_rw"[3] 201.124.0.179 #59: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1

Jan 24 17:15:16 - [VPN Log]: "asystems2_rw_rw"[3] 201.124.0.179 #59: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2

Jan 24 17:15:16 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]

Jan 24 17:15:16 - [VPN Log]: packet from 201.124.0.179:500: ignoring Vendor ID payload [RFC 3947]


1 Reply 1

cgocmatts
Level 1
Level 1

I also am having the same problem with both this version of firmware and hte older one 2.0.1.2