Cisco VPN Client + WRVS4400N

I have a new LinkSys / Cisco WRVS4400N that for the most part is working flawlessly... BUT I can not establish a VPN tunnel. The client work perfectly everywhere else...

These are the logs from the client when behind the WRVS

Cisco Systems VPN Client Version 4.8.02.0010 Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\Cisco Systems\VPN Client

1 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash.

2 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash.

3 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash.

4 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash.

5 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash.

6 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash.

7 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash.

8 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash.

9 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash.

10 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash.

11 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash.

12 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash.

13 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash.

14 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash.

15 12:33:57.390 07/17/07 Sev=Info/6 GUI/0x63B00011 Reloaded the Certificates in all Certificate Stores successfully.

16 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100002 Begin connection process

17 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection

18 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "nnn.nnn.nnn.nnn"

19 12:34:07.093 07/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with nnn.nnn.nnn.nnn.

20 12:34:07.109 07/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to nnn.nnn.nnn.nnn

21 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started

22 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

23 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

24 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

25 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

26 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

27 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

28 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

29 12:34:27.109 07/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=689E7DFDFDCE29C6 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

30 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=689E7DFDFDCE29C6 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

31 12:34:27.609 07/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "nnn.nnn.nnn.nnn" because of "DEL_REASON_PEER_NOT_RESPONDING"

32 12:34:27.609 07/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv

33 12:34:27.609 07/17/07 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0.

34 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection

35 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

36 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

37 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

38 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped

Reply to
AF
Loading thread data ...

Some routers and network devices do not permit the bi-directional communication as nicely as others. A true Cisco router does permit this with basic NAT configuration. Just because Cisco bought Linksys does not mean that the Linksys products are now as good as the actual Cisco devices.

Attempt to connect using your Cisco VPN client with the profile using TCP and then with UDP. See if the results are different either way. We do not know what your VPN server is configured to allow for its connections - TCP or UDP or both. Your Cisco VPN client will be probably be transmitting in the UDP configuration to destination UDP port 500 and 62515.

Reply to
Scott Perry

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.