Hi I did setup the RV082 following your guide (<a href="http://www.shrew.net/support/wiki/HowtoLinksys">http://www.shrew.net/support/wiki/HowtoLinksys</a>)  and it works perfect, however I need to setup the router and the shrew client to use user Authentication and I'm not able to make it work, this is my current config:<br>
<br>RV082 config:<br>Type: Group VPN<br>Tunel name: vpnusers<br>Interface: WAN1<br>Enable: Checked<br>Local Group Setup:<br>  Local Security Type: Subnet<br>  IP Address:  192.168.2.0<br>  Subnet Mask: 255.255.255.0<br>Remote Client Setup:<br>
  Remote Client: Domain Name (FQDN)<br>  Domain Name: <a href="http://shrew.net">shrew.net</a><br>IPSec Setup:<br>  Keying Mode: IKE with Preshared key<br>  Phase 1 DH Group: Group 2 - 1024 bit<br>  Phase 1 Encryption: AES-256<br>
  Phase 1 Authentication: SHA1<br>  Phase 1 SA Life Time: 28800 seconds<br>  Perfect Forward Secrecy: Checked<br>  Phase 2 DH Group: Group 2 - 1024 bit<br>  Phase 2 Encryption: AES-256<br>  Phase 2 Authentication: SHA1<br>
  Phase 2 SA Life Time: 3600<br>  Preshared key: hr5xb84l6aa9r6<br>  Minimum Preshared Key Complexity: Checked<br>Advanced:<br>  Agressive Mode: Checked  (there's no way to uncheck this one)<br>  Compress: Unchecked<br>
  Keep-Alive: Checked<br>  AH Hash Algorithm: Unchecked<br>  NetBIOS Broadcast: Checked<br>  NAT Traversal: Checked<br><br>Then in the RV082 Router, under VPN Menu, VPN Client Access, I have the user: alejandro / xjq123, also I did export the client certificate.<br>
<br>Shrew Vpn Client config:<br>General:<br>  Host Name or IP Address:  myserverIP:500<br>  Auto Configuration: disabled<br>  Address Method: Use and existing adapter and current address<br>Client: <br>  Nat Traversal: enable<br>
  Nat Traversal Port: 4500<br>  Keep-alive packet rate: 15 Secs<br>  IKE Fragmentation: disable<br>  Enable Dead Peer Detection: Checked<br>  Enable ISAKMP Failure Notifications: Checked<br>Name Resolution:<br>  WINS / DNS: Unchecked<br>
  Enable DNS: Unchecked<br>Authentication:<br>  Authentication Method: Mutual PSK + XAuth<br>  Local Identity:<br>    Identification Type: User Fully Qualified Domain Name<br>    UFQDN String: <a href="mailto:alejandro@shrew.net">alejandro@shrew.net</a><br>
  Remote Identity:<br>    Indetification Type: IP Address<br>    Use a discovered remote host address: Checked<br>  Credentials:<br>    Pre Shared Key: hr5xb84l6aa9r6<br>Phase 1:<br>  Exchange Type: agressive<br>  DH Exchange: group 2 <br>
  Cipher Algorithm: aes<br>  Cipher Key Length: 256<br>  Hash Algorithm: sha1<br>  Key Life Time limit: 28800 Secs<br>  Key Life Data limit: 0 Kbytes<br>  Enable Check Point Compatible Vendor ID: Unchecked<br>Phase 2:<br>
  Transform Algorithm: esp-aes<br>  Transform Key Length: 256<br>  HMAC Algorithm: sha1<br>  PFS Exchange: group 2<br>  Compress Algorithm: disabled<br>  Key Life Time limit: 3600 Secs<br>
  Key Life Data limit: 0 Kbytes<br>Policy:<br>  Policy Generation Level: auto<br>  Maintain Persistent Security Associations: Unchecked<br>  Obtain Topology Automatically or Tunnel All: Unchecked<br>  Remote Network Resource:   <br>
     Type: Include<br>     Address: 192.168.2.0<br>     Netmask: 255.255.255.0<br><br>Notes: In the RV082 Group VPN I still have the vpngrop that works following the guide in your website (in case this setup affect the new one with Authentication)<br>
<br>This is the router log:<br>
<table width="100%" align="center" border="0" cellpadding="0" cellspacing="0" height="100%">
<tbody>
<tr>
<td valign="top">
<table class="STtable" width="100%" border="1">
<tbody>
<tr>
<td class="STtable">
<table class="STtable" width="100%" border="0"><tbody>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from 
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:45 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from 
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from 
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:50 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from 
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from 
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:48:55 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from 
186.32.208.21 but no (wildcard) connection has been configured </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [XAUTH] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-00] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[16f6ca16e4a4066d83821a0f0aeaa862] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-02_n] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [RFC 3947] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: received Vendor ID payload [Dead Peer 
Detection] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[f14b94b7bff1fef02773b8c49feded26] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[166f932d55eb64d8e4df4fd37e2313f0d0fd8451] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload 
[8404adf9cda05760b2ca292e4bff537b] </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: ignoring Vendor ID payload [Cisco-Unity] 
</td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popOddRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: [Tunnel Negotiation Info] <<< 
Responder Received Aggressive Mode 1st packet </td></tr>
<tr class="popEvenRow">
<td width="150">Jun 8 07:49:00 2011</td>
<td width="150">VPN Log</td>
<td>packet from <a href="http://186.32.208.21:292">186.32.208.21:292</a>: initial Aggressive Mode message from 
186.32.208.21 but no (wildcard) connection has been configured 
</td></tr></tbody></table></td></tr></tbody></table>

</td></tr></tbody></table><br><br><br>And this the shrew window log:<br>config loaded for site 'ggldevusers'<br>configuring client settings ...<br>attached to key daemon ...<br>peer configured<br>iskamp proposal configured<br>
esp proposal configured<br>client configured<br>local id configured<br>pre-shared key configured<br>bringing up tunnel ...<br>negotiation timout occurred<br>tunnel disabled<br>detached from key daemon ...<br><br>I really appreciate your help, by the way this is the only software that works perfect on Windows 7 64bits.. THANKS<br>