cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
763
Views
0
Helpful
0
Replies

VPN on RV042G not working and crashing

akismpariamis
Level 1
Level 1

I have tried every possible combination and solution for creating a Client to Gateway Group VPN to my RV042G even with quickvpn and shrew vpn .

There is no in between firewall between the 2 connection points . My latest config for the RV042G is

1.jpg

The config for the phase1 and phase2 for the Shrew client is exactly the same , and the preshared key and tunnel name properly configured . Even Tried it with FQDN .

The log file of the cisco is :

packet from 79.131.159.79:500: ignoring Vendor ID payload [XAUTH]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [XAUTH]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [RFC 3947]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [RFC 3947]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [Dead Peer Detection]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: received Vendor ID payload [Dead Peer Detection]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [3b9031dce4fcf88b489a923963dd0c49]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [3b9031dce4fcf88b489a923963dd0c49]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [f14b94b7bff1fef02773b8c49feded26]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [f14b94b7bff1fef02773b8c49feded26]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [166f932d55eb64d8e4df4fd37e2313f0d0fd8451]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [166f932d55eb64d8e4df4fd37e2313f0d0fd8451]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [8404adf9cda05760b2ca292e4bff537b]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [8404adf9cda05760b2ca292e4bff537b]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [Cisco-Unity]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: ignoring Vendor ID payload [Cisco-Unity]
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: [Tunnel Negotiation Info] <<< Responder Received Aggressive Mode 1st packet
Oct 31 11:49:17 2013VPN Logpacket from 79.131.159.79:500: [Tunnel Negotiation Info] <<< Responder Received Aggressive Mode 1st packet

The log of the IKE service on Shrew VPN is :

peer config add message

13/10/31 11:51:22 <A : proposal config message

13/10/31 11:51:22 <A : proposal config message

13/10/31 11:51:22 <A : client config message

13/10/31 11:51:22 <A : xauth username message

13/10/31 11:51:22 <A : xauth password message

13/10/31 11:51:22 <A : local id 'akis.local' message

13/10/31 11:51:22 <A : preshared key message

13/10/31 11:51:22 <A : remote resource message

13/10/31 11:51:22 <A : peer tunnel enable message

13/10/31 11:51:22 ii : local supports XAUTH

13/10/31 11:51:22 ii : local supports nat-t ( draft v00 )

13/10/31 11:51:22 ii : local supports nat-t ( draft v01 )

13/10/31 11:51:22 ii : local supports nat-t ( draft v02 )

13/10/31 11:51:22 ii : local supports nat-t ( draft v03 )

13/10/31 11:51:22 ii : local supports nat-t ( rfc )

13/10/31 11:51:22 ii : local supports DPDv1

13/10/31 11:51:22 ii : local is SHREW SOFT compatible

13/10/31 11:51:22 ii : local is NETSCREEN compatible

13/10/31 11:51:22 ii : local is SIDEWINDER compatible

13/10/31 11:51:22 ii : local is CISCO UNITY compatible

13/10/31 11:51:22 >= : cookies 4f157ff4e4e793b6:0000000000000000

13/10/31 11:51:22 >= : message 00000000

13/10/31 11:51:27 -> : resend 1 phase1 packet(s) [0/2] 192.168.1.153:500 -> XXXXXXX:500

13/10/31 11:51:32 -> : resend 1 phase1 packet(s) [1/2] 192.168.1.153:500 -> XXXXXXX:500

13/10/31 11:51:37 -> : resend 1 phase1 packet(s) [2/2] 192.168.1.153:500 -> XXXXXXX:500

13/10/31 11:51:42 ii : resend limit exceeded for phase1 exchange

After every attempt either the tunnel or the vpn daemon on the cisco collapses and cannot even connect to it .

This matter is driving me crazy , any help would be much appreciated .

Connect machine windows 7 64bit , icmp ports allowed through firewall and shrew vpn application allowed .

Thank you in advance .

0 Replies 0