Hi I did setup the RV082 following your guide (<a href="http://www.shrew.net/support/wiki/HowtoLinksys">http://www.shrew.net/support/wiki/HowtoLinksys</a>) and it works perfect, however I need to setup the router and the shrew client to use user Authentication and I'm not able to make it work, this is my current config:<br>
<br>RV082 config:<br>Type: Group VPN<br>Tunel name: vpnusers<br>Interface: WAN1<br>Enable: Checked<br>Local Group Setup:<br> Local Security Type: Subnet<br> IP Address: 192.168.2.0<br> Subnet Mask: 255.255.255.0<br>Remote Client Setup:<br>
Remote Client: Domain Name (FQDN)<br> Domain Name: <a href="http://shrew.net">shrew.net</a><br>IPSec Setup:<br> Keying Mode: IKE with Preshared key<br> Phase 1 DH Group: Group 2 - 1024 bit<br> Phase 1 Encryption: AES-256<br>
Phase 1 Authentication: SHA1<br> Phase 1 SA Life Time: 28800 seconds<br> Perfect Forward Secrecy: Checked<br> Phase 2 DH Group: Group 2 - 1024 bit<br> Phase 2 Encryption: AES-256<br> Phase 2 Authentication: SHA1<br>
Phase 2 SA Life Time: 3600<br> Preshared key: hr5xb84l6aa9r6<br> Minimum Preshared Key Complexity: Checked<br>Advanced:<br> Agressive Mode: Checked (there's no way to uncheck this one)<br> Compress: Unchecked<br>
Keep-Alive: Checked<br> AH Hash Algorithm: Unchecked<br> NetBIOS Broadcast: Checked<br> NAT Traversal: Checked<br><br>Then in the RV082 Router, under VPN Menu, VPN Client Access, I have the user: alejandro / xjq123, also I did export the client certificate.<br>
<br>Shrew Vpn Client config:<br>General:<br> Host Name or IP Address: myserverIP:500<br> Auto Configuration: disabled<br> Address Method: Use and existing adapter and current address<br>Client: <br> Nat Traversal: enable<br>
Nat Traversal Port: 4500<br> Keep-alive packet rate: 15 Secs<br> IKE Fragmentation: disable<br> Enable Dead Peer Detection: Checked<br> Enable ISAKMP Failure Notifications: Checked<br>Name Resolution:<br> WINS / DNS: Unchecked<br>
Enable DNS: Unchecked<br>Authentication:<br> Authentication Method: Mutual PSK + XAuth<br> Local Identity:<br> Identification Type: User Fully Qualified Domain Name<br> UFQDN String: <a href="mailto:alejandro@shrew.net">alejandro@shrew.net</a><br>
Remote Identity:<br> Indetification Type: IP Address<br> Use a discovered remote host address: Checked<br> Credentials:<br> Pre Shared Key: hr5xb84l6aa9r6<br>Phase 1:<br> Exchange Type: agressive<br> DH Exchange: group 2 <br>
Cipher Algorithm: aes<br> Cipher Key Length: 256<br> Hash Algorithm: sha1<br> Key Life Time limit: 28800 Secs<br> Key Life Data limit: 0 Kbytes<br> Enable Check Point Compatible Vendor ID: Unchecked<br>Phase 2:<br>
Transform Algorithm: esp-aes<br> Transform Key Length: 256<br> HMAC Algorithm: sha1<br> PFS Exchange: group 2<br> Compress Algorithm: disabled<br> Key Life Time limit: 3600 Secs<br>
Key Life Data limit: 0 Kbytes<br>Policy:<br> Policy Generation Level: auto<br> Maintain Persistent Security Associations: Unchecked<br> Obtain Topology Automatically or Tunnel All: Unchecked<br> Remote Network Resource: <br>
Type: Include<br> Address: 192.168.2.0<br> Netmask: 255.255.255.0<br><br>Notes: In the RV082 Group VPN I still have the vpngrop that works following the guide in your website (in case this setup affect the new one with Authentication)<br>
<br>This is the router log:<br>
<table width="100%" align="center" border="0" cellpadding="0" cellspacing="0" height="100%">
<tbody>
<tr>
<td valign="top">
<table class="STtable" width="100%" border="1">
<tbody>
<tr>
<td class="STtable">
<table class="STtable" width="100%" border="0"><tbody>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity]
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<<
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from
186.32.208.21 but no (wildcard) connection has been configured
</td></tr></tbody></table></td></tr></tbody></table>
</td></tr></tbody></table><br><br><br>And this the shrew window log:<br>config loaded for site 'ggldevusers'<br>configuring client settings ...<br>attached to key daemon ...<br>peer configured<br>iskamp proposal configured<br>
esp proposal configured<br>client configured<br>local id configured<br>pre-shared key configured<br>bringing up tunnel ...<br>negotiation timout occurred<br>tunnel disabled<br>detached from key daemon ...<br><br>I really appreciate your help, by the way this is the only software that works perfect on Windows 7 64bits.. THANKS<br>