cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
919
Views
0
Helpful
1
Replies

RV042 - invalid remote peer id

closed001
Level 1
Level 1

Hi all,

I don't have much experience with VPN and would really appriciate if somebody could give me advise on the issue below.

Here's a portion of VPN log from my RV042 router:

Jan 4 15:17:46 2014VPN Log(g2gips0) #22258: [Tunnel Negotiation Info] >>> Initiator Receive Main Mode 6th packet
Jan 4 15:17:46 2014VPN Log(g2gips0) #22258: [Tunnel Negotiation Info] >>> Initiator Receive Main Mode 6th packet
Jan 4 15:17:46 2014VPN Log(g2gips0) #22258: Peer ID is ID_IPV4_ADDR: '192.168.210.178'
Jan 4 15:17:46 2014VPN Log(g2gips0) #22258: we require peer to have ID '193.253.x.x', but peer declares '192.168.210.178'
Jan 4 15:17:46 2014VPN Log(g2gips0) #22258: we require peer to have ID '193.253.x.x', but peer declares '192.168.210.178'
Jan 4 15:17:46 2014VPN Log(g2gips0) #22258: sending encrypted notification INVALID_ID_INFORMATION to 193.253.x.x:500

As you can see, VPN channel can't be established due to invalid peer id sent by our customer's router (as I know it's a Juniper).

My RV042 has public ip and is not behind NAT but the customer's router is. The customer's tech guy have verified the RV042's settings and said they're correct. He also said that he can't change settings on their side and have suggested me to try other router's model.

So, basically I have two questions:

1) Is it possible to do something with RV042 (somehow configure it to ignore remote peer id, etc.)?

2) What hardware would you recommend as replacement of RV042 (for ~300-500 euro)? It's not necessary to be a high performance hardware, just simple and reliable one which can handle 1-3 VPN channels with low load and can support DMZ. What about Cisco 881-SEC-K9 and ASA5505-50-BUN-K9?

Thanks in advance,

Vitali

1 Reply 1

Tom Watts
VIP Alumni
VIP Alumni

Hi Vitali, I don't think the problem is the RV042, the problem is probably the configuration. If the Juniper end point is behind a NAT then you should build your VPN tunnel to the gateway address that is NAT'ing the Juniper and then that device should be forwarding the requests to the Juniper to handle. Otherwise, your Juniper should have NAT-T enabled.

-Tom
Please mark answered for helpful posts

-Tom Please mark answered for helpful posts http://blogs.cisco.com/smallbusiness/