Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Community Member

VPN wrv210 and rv042

Hola señores, estoy queriendo levantar una vpn entre un rv042 y un wrv210 con ipsec, ya tengo configurado los 2 routers, igualmente no me deja conectarme los tengo configurado en modo agresivo, cuando el wrv042 se quiere conectar me la el siguiente log,

Hello Gentlemen, I am trying to raise a vpn between a RV042 and a WRV210 with ipsec, I have configured the 2 routers, also will not let me connect the way I have set aggressive when you want to connect wrv042 me the following log

000   [Thu 08:46:53]  added connection description "TunnelA"
001   [Thu 08:46:55]  "TunnelA" #1: ASSERTION FAILED at spdb_struct.c:1233: trans->attr_cnt == 4
002   "TunnelA" #1: interface ipsec0/eth0 190.xx.xx.171
003   "TunnelA" #1: interface ipsec0/eth0 190.xx.xx.171
004   "TunnelA" #1: %myid = (none)
005   "TunnelA" #1: debug none
006   "TunnelA" #1: 
007   "TunnelA" #1: algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=64, keysizemin=192, keysizemax=192
008   "TunnelA" #1: algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=128, keysizemin=128, keysizemax=256
009   "TunnelA" #1: algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128
010   "TunnelA" #1: algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160
011   "TunnelA" #1: algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_AES_CBC, keysizemin=128, keysizemax=128
012   "TunnelA" #1: 
013   "TunnelA" #1: algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192
014   "TunnelA" #1: algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128
015   "TunnelA" #1: algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16
016   "TunnelA" #1: algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20
017   "TunnelA" #1: algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024
018   "TunnelA" #1: algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536
019   "TunnelA" #1: algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048
020   "TunnelA" #1: algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072
021   "TunnelA" #1: algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096
022   "TunnelA" #1: algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144
023   "TunnelA" #1: algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192
024   "TunnelA" #1: 
025   "TunnelA" #1: stats db_ops.c: {curr_cnt, total_cnt, maxsz} :context={0,1,36} trans={0,1,108} attrs={0,1,72}
026   "TunnelA" #1: 
027   "TunnelA" #1: "TunnelA": 192.168.1.0/24===190.xx.xx.171---190.xx.xx.129...190.xx.xx.108===192.168.2.0/24; prospective erouted; eroute owner: #0
028   "TunnelA" #1: "TunnelA":     srcip=unset; dstip=unset; srcup=ipsec _updown; dstup=ipsec _updown;
029   "TunnelA" #1: "TunnelA":   ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 3
030   "TunnelA" #1: "TunnelA":   policy: PSK+ENCRYPT+TUNNEL+PFS+UP+AGGRESSIVE; prio: 24,24; interface: eth0;
031   "TunnelA" #1: "TunnelA":   newest ISAKMP SA: #0; newest IPsec SA: #0;
032   "TunnelA" #1: "TunnelA":   IKE algorithms wanted: 7_128-1-2, flags=strict
033   "TunnelA" #1: "TunnelA":   IKE algorithms found:  7_128-1_096-2,
034   "TunnelA" #1: "TunnelA":   ESP algorithms wanted: 12_128-1, flags=strict
035   "TunnelA" #1: "TunnelA":   ESP algorithms loaded: 12_128-1, flags=strict
036   "TunnelA" #1: 
037   "TunnelA" #1: #1: "TunnelA":500 STATE_AGGR_I1 (sent AI1, expecting AR1); EVENT_SO_DISCARD in 0s; nodpd
038   "TunnelA" #1:

Acadejo una imagen de la configuracion del rv042

rv042.JPG

Everyone's tags (4)
1217
Views
0
Helpful
0
Replies
CreatePlease to create content