On 11/22/2012 09:41 PM, Robert Hough wrote:
I am having trouble connecting to my VPN on a Linksys BEFSX41 which was flashed
to latest firmware version.  I keep getting a "negotiation timeout occurred"
when trying to bring up the tunnel.   Logs on the BEFSX41 indicate the VPN
client is trying to connect.  Logs on the vpn client indicate that resend limit
exceeded for phase1.
Not sure what I have configed wrong so all details are below.
Settings on router:
IPSEC Passthrough > Enabled
PPOE Passthough > Enabled
PPTP Passthrough > Enabled
Local Secure Group > Subnet x.x.x.x.
Remote Secure Group > Any
Remote Security Gateway >  Any
Encryption > DES
Authentication > MD5
Key Management > Auto (IKE)
ADVANCED SETTINGS >

Phase 1: > Mode: Main mode

Encryption: DES

Authentication: MD5

Group 768 Bit

Key Lifetime: 3600 seconds



Phase 2: > Encryption: DES

Authentication: MD5

PFS: On

Group: 768 Bit

Key Lifetime: 3600 seconds

Other Setting

Netbios broadcast box checked
Shrew Soft Client
NAT Transversal: enable
NAT Transversal: port 4500
IKE Fragmentation: enable
Maximum packet size: 540 bytes
Other Options
Enable Dead Peer Detection
Enable ISAKMP Failure Notifications
Enable Client Login Banner
Name Resolution
All boxes checked
Authentication Method: MutualPSK
Identification Type: IP Address
Remote Identity: IP Address
Credentials: Pre shared key
Phase 1
Exchange Type: main
DH Exchange: group1
Cipher Algorithm: des
Hash Algorithm: md5
key life time limit: 3600 secs
key life data limit 0 kb
Phase 2
Transform Algorithm: esp-des
HMAC Algorith: md5
PFS Exchange: group 1
key life time limit: 3600 secs
key life data limit 0 kb
Policy
policy generation level: unique
obtain topology automatically or tunnel all checked

Hi Rob,

Was the VPN was working before the firmware was upgraded?

Based on your description that the Linksys sees the client connection (and presumably does not give an error) but that the VPN client does not see the Linksys' responses (resend limit exceeded), I would suggest using a packet sniffer (like Wireshark) on your VPN client machine to see if the machine itself is receiving any packets back from the Linksys.

I do note that you're using Main Mode, IP Addresses and PSK to identify the VPN connection. I would check to make sure that the PSK did not somehow get changed during the firmware update. Re-enter the PSK just to be sure.

Most of the VPNs we see here are configured in Aggressive Mode. I could be wrong on this too, but I think using Aggressive Mode instead of Main Mode works better in situations where the connecting clients have dynamic IP addresses, so you could try that too.
_______________________________________________
vpn-help mailing list
[email protected]
http://lists.shrew.net/mailman/listinfo/vpn-help

Reply via email to