I setup the RV320 and am using the USB1 interface until I get my permanent WAN interface ordered. I can get to the internet with no issues. I setup EasyVPN and PPTP but cannot get access remotely into the VPN. I setup an access rule to allow ALL traffic from USB1 into the network. I also created a user in the User management page.
When trying to connect with the Cisco VPN Client I get the following in the router log file:
Aug 1 13:42:04 2013
packet from 126.96.36.199:22520: [Tunnel Authorize Fail] no connection has been authorized with policy=PSK+AGGRESSIVE+XAUTHPSK+XAUTHSERVER
The only place I can find anything related to Aggressive Mode is under the Advanced Settings for IKE w/ Preshared Key. This advanced settings button is on the Gateway to Gateway configuration page. That's not what I want to configure. The documentation seems to show that a button should also exist in the Client to Gateway screen but I don't see anything.
How do you change the policies at the client? Doesn't look like much to mess with to me in the Cisco Client software.
I've got the manual. I'm upgrading firmware now. It's been 45 minutes already and not done yet. Me thinks there's a problem. Do I just reboot or wait longer.
I finally rebooted and got reconnected. It showed the firmware version but some of the GUI interface was showing correctly. So I decided to reflash again, this time using USB instead of PC. Went real fast this time. Gave me a message to wait 45 seconds and if nothing happens hit login button. Waited, hit login. -Nothing. I've tried to reset it to factory default. Now I can ping 192.168.1.1 but can't get to the GUI. Very frustrated now. Wasted a whole day. I guess I need to call Cisco now.
Just an update. Finally on my 3rd RV320 I was able to get the current firmware loaded w/o the unit locking up. I used XP instead of Win7 this time just in case that was the problem.
I did get the SSL VPN to function over the USB1 modem. No luck still with EasyVPN or PPTP.
My SSL VPN drops me into VLAN4 with address of 192.168.4.x. I can PCAnywhere to a PC on that VLAN and from there get to devices on VLAN3 (192.168.3.x) which is my mgmt VLAN by creating some access rules for that one PC we connect remotely into.
I've tried various rules to let me get directly to the mgmt VLAN direct from the remote PC but have not had any luck. Any thoughts on what to try? I have InterVLAN routing turned on for VLAN3 and VLAN4. I need access to devices on both VLANs so it's not just a matter of changing the SSL remote users ip to 192.168.3.x.
Hi every one!!!When you are configuring a remote VPN connection, there
are some steps that are lost on the path. Here you can see those steps.
A) In your Cisco device: 1. Ensure you don´t have any rule denying the
traffic between the device and the remote...
** Update **These and a number of other issues have been addressed in
SRP520 MR3. Please see https://supportforums.cisco.com/docs/DOC-13853
for details on how to access this code.There have been a number of
reports of the SRP500 becoming unresponsive afte...
STANDARDSOURCECOMMENTSEthernet RJ-45 connector pin number12345678IEEE
802.3afusing data pairsRXDC+RXDC+TXDC-sparespareTXDC-sparespareIndustry
Standard for Embedded POE(used by Cisco Catalyst Switches)IEEE
802.3afusing spare pairs RXRXTXDC+DC+TXDC-DC-Indus...