dslreports logo
site
 
    All Forums Hot Topics Gallery
spc

spacer




how-to block ads


Search Topic:
uniqs
1275
share rss forum feed

PeaB0dy62

join:2012-02-21
North York, ON

[Extreme] Rogers & VPN

Hi!

I am having an issue with VPN's on Rogers. I called them and they are no help.

I have a client, who has an remote office with DSL, and a Cisco WRV210, and another connection with rogers, and a WRVS4400N v 1.1.13.

I created a tunnel successfully. All was working well, until 2 weeks ago. I went down, and replaced the WRVS4400N with another WRV210. Setup the VPN,

and it wouldn't connect. Fortunately, there is a bell connection there too, I connected it to that, and it worked, no problems. The WRVS4400N also

worked, flawless on Bell.

I reset the modem to factory (it's the Cisco DPC3825) and put it back in bridge mode, and it work flawlessly again. Now it has stopped working. I

can't tunnel in with clients, and I can not create a tunnel. Rogers will not help, all they are concerned with is if you can surf the net.

This is also happening in my home, with a RVS4000, where I try to tunnel with a client, and I can not connect, it times out, and I am using the SMC

Modem/Router.

Here is a log of what I am getting on the WRVS4400N.

Feb 21 22:45:54 - [VPN Log]: Starting Pluto (Openswan Version cvs2006Jan12_11:29:56 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID

OE@ECqImzhFD)
Feb 21 22:45:55 - [VPN Log]: @(#) built on Nov 17 2008:09:38:57:
Feb 21 22:45:55 - [VPN Log]: Setting NAT-Traversal port-4500 floating to on
Feb 21 22:45:55 - [VPN Log]: port floating activation criteria nat_t=1/port_fload=1
Feb 21 22:45:55 - [VPN Log]: including NAT-Traversal patch (Version 0.6c)
Feb 21 22:45:55 - [VPN Log]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
Feb 21 22:45:55 - [VPN Log]: starting up 1 cryptographic helpers
Feb 21 22:45:55 - [VPN Log]: started helper pid=670 (fd:5)
Feb 21 22:45:55 - [VPN Log]: Using KLIPS IPsec interface code on 2.4.27-star
Feb 21 22:45:55 - [VPN Log]: Changing to directory '/etc/ipsec.d/cacerts'
Feb 21 22:45:55 - [VPN Log]: Changing to directory '/etc/ipsec.d/aacerts'
Feb 21 22:45:55 - [VPN Log]: Changing to directory '/etc/ipsec.d/ocspcerts'
Feb 21 22:45:55 - [VPN Log]: Changing to directory '/etc/ipsec.d/crls'
Feb 21 22:45:55 - [VPN Log]: Warning: empty directory
Feb 21 22:45:55 - [VPN Log]: added connection description "k"
Feb 21 22:45:55 - [VPN Log]: listening for IKE messages
Feb 21 22:45:55 - [VPN Log]: adding interface ipsec0/eth1 xxx.xxx.xxx.xxx:500
Feb 21 22:45:55 - [VPN Log]: adding interface ipsec0/eth1 xxx.xxx.xxx.xxx:4500
Feb 21 22:45:55 - [VPN Log]: loading secrets from "/etc/ipsec.secrets"
Feb 21 22:45:59 - [VPN Log]: "k": route-client output: 0
Feb 21 22:45:59 - [VPN Log]: "k" #1: initiating Aggressive Mode #1, connection "k"
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring unknown Vendor ID payload [4f45725c5b754061666c425f]
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [Dead Peer Detection]
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [RFC 3947] method set to=109
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using

method 109
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using

method 109
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
Feb 21 22:46:54 - [VPN Log]: "k" #2: responding to Main Mode
Feb 21 22:46:54 - [VPN Log]: "k" #2: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Feb 21 22:46:54 - [VPN Log]: "k" #2: STATE_MAIN_R1: sent MR1, expecting MI2
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Feb 21 22:46:54 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received and ignored informational message
Feb 21 22:47:04 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Feb 21 22:47:04 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received and ignored informational message
Feb 21 22:47:09 - [VPN Log]: "k" #1: max number of retransmissions (2) reached STATE_AGGR_I1
Feb 21 22:47:24 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Feb 21 22:47:24 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received and ignored informational message
Feb 21 22:48:04 - [VPN Log]: "k" #2: max number of retransmissions (2) reached STATE_MAIN_R1
Feb 21 22:48:17 - [VPN Log]: initiate on demand from 192.168.1.50:0 to 192.168.3.5:0 proto=0 state: fos_start because: acquire
Feb 21 22:48:17 - [VPN Log]: "k" #3: initiating Aggressive Mode #3, connection "k"
Feb 21 22:48:17 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Feb 21 22:48:17 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received and ignored informational message
Feb 21 22:48:27 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Feb 21 22:48:27 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received and ignored informational message
Feb 21 22:48:47 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Feb 21 22:48:47 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received and ignored informational message
Feb 21 22:49:27 - [VPN Log]: "k" #3: max number of retransmissions (2) reached STATE_AGGR_I1
Feb 21 22:50:26 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: ignoring unknown Vendor ID payload [4f45725c5b754061666c425f]
Feb 21 22:50:26 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [Dead Peer Detection]
Feb 21 22:50:26 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [RFC 3947] method set to=109
Feb 21 22:50:26 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using

method 109
Feb 21 22:50:26 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using

method 109
Feb 21 22:50:26 - [VPN Log]: packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]

And here is from the WRV210

000 [Tue 19:50:21] "TunnelA": deleting connection
001 [Tue 19:50:21] "TunnelA" #1: deleting state (STATE_MAIN_I1)
002 [Tue 19:50:26] added connection description "TunnelA"
003 [Tue 19:50:26] "TunnelA" #5: initiating Main Mode
004 [Tue 19:50:26] "TunnelA" #5: [WRV210 Response:] ISAKMP SA (Main Mode) Initiation
005 [Tue 19:50:26] "TunnelA" #5: ignoring unknown Vendor ID payload [4f4540454371496d7a684644]
006 [Tue 19:50:26] "TunnelA" #5: received Vendor ID payload [Dead Peer Detection]
007 [Tue 19:50:26] "TunnelA" #5: received Vendor ID payload [RFC 3947] method set to=109
008 [Tue 19:50:26] "TunnelA" #5: Can't authenticate: no preshared key found for `xxx.xxx.xxx.xxx' and `xxx.xxx.xxx.xxx'. Attribute

OAKLEY_AUTHENTICATION_METHOD
009 [Tue 19:50:26] "TunnelA" #5: no acceptable Oakley Transform
010 [Tue 19:50:26] "TunnelA" #5: sending notification NO_PROPOSAL_CHOSEN to xxx.xxx.xxx.xxx:500
011 [Tue 19:50:36] "TunnelA" #5: ignoring unknown Vendor ID payload [4f4540454371496d7a684644]
012 [Tue 19:50:36] "TunnelA" #5: received Vendor ID payload [Dead Peer Detection]
013 [Tue 19:50:36] "TunnelA" #5: received Vendor ID payload [RFC 3947] method set to=109
014 [Tue 19:50:36] "TunnelA" #5: Can't authenticate: no preshared key found for `xxx.xxx.xxx.xxx' and `xxx.xxx.xxx.xxx'. Attribute

OAKLEY_AUTHENTICATION_METHOD
015 [Tue 19:50:36] "TunnelA" #5: no acceptable Oakley Transform
016 [Tue 19:50:36] "TunnelA" #5: sending notification NO_PROPOSAL_CHOSEN to xxx.xxx.xxx.xxx:500
017 [Tue 19:50:56] "TunnelA" #5: ignoring unknown Vendor ID payload [4f4540454371496d7a684644]
018 [Tue 19:50:56] "TunnelA" #5: received Vendor ID payload [Dead Peer Detection]
019 [Tue 19:50:56] "TunnelA" #5: received Vendor ID payload [RFC 3947] method set to=109
020 [Tue 19:50:56] "TunnelA" #5: Can't authenticate: no preshared key found for `xxx.xxx.xxx.xxx' and `xxx.xxx.xxx.xxx'. Attribute

OAKLEY_AUTHENTICATION_METHOD
021 [Tue 19:50:56] "TunnelA" #5: no acceptable Oakley Transform
022 [Tue 19:50:56] "TunnelA" #5: sending notification NO_PROPOSAL_CHOSEN to xxx.xxx.xxx.xxx:500
023 [Tue 19:54:04] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [Dead Peer Detection]
024 [Tue 19:54:04] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [RFC 3947] method set to=109
025 [Tue 19:54:04] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
026 [Tue 19:54:04] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
027 [Tue 19:54:04] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
028 [Tue 19:54:04] "TunnelA" #6: Aggressive mode peer ID is ID_IPV4_ADDR: 'xxx.xxx.xxx.xxx'
029 [Tue 19:54:04] "TunnelA" #6: responding to Aggressive Mode, state #6, connection "TunnelA" from xxx.xxx.xxx.xxx
030 [Tue 19:54:04] "TunnelA" #6: Can't authenticate: no preshared key found for `xxx.xxx.xxx.xxx' and `xxx.xxx.xxx.xxx'. Attribute

OAKLEY_AUTHENTICATION_METHOD
031 [Tue 19:54:04] "TunnelA" #6: no acceptable Oakley Transform
032 [Tue 19:54:04] "TunnelA" #6: sending notification NO_PROPOSAL_CHOSEN to xxx.xxx.xxx.xxx:500
033 [Tue 19:54:15] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [Dead Peer Detection]
034 [Tue 19:54:15] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [RFC 3947] method set to=109
035 [Tue 19:54:15] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109
036 [Tue 19:54:15] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
037 [Tue 19:54:15] packet from xxx.xxx.xxx.xxx:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
038 [Tue 19:54:15] "TunnelA" #7: Aggressive mode peer ID is ID_IPV4_ADDR: 'xxx.xxx.xxx.xxx'
039 [Tue 19:54:15] "TunnelA" #7: responding to Aggressive Mode, state #7, connection "TunnelA" from xxx.xxx.xxx.xxx
040 [Tue 19:54:15] "TunnelA" #7: Can't authenticate: no preshared key found for `xxx.xxx.xxx.xxx' and `xxx.xxx.xxx.xxx'. Attribute

OAKLEY_AUTHENTICATION_METHOD
041 [Tue 19:54:15] "TunnelA" #7: no acceptable Oakley Transform
042 [Tue 19:54:15] "TunnelA" #7: sending notification NO_PROPOSAL_CHOSEN to xxx.xxx.xxx.xxx:500