IpSec Site to Site - received AUTHENTICATION_FAILED error notify
-
Segui esse vídeo. https://www.youtube.com/watch?v=iNzJGI5hv-Q
E no final acabei não conseguindo fazer funcionar.
Alguem conseguiu fazer o IpSec rodar certinho?Segue Log de erros.
:31:46 charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (200 bytes) Apr 26 11:31:46 charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (156 bytes) Apr 26 11:31:46 charon: 15[ENC] <con1000|237> parsed ID_PROT response 0 [ SA V V V V ] Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received XAuth vendor ID Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received XAuth vendor ID Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received DPD vendor ID Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received DPD vendor ID Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received Cisco Unity vendor ID Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received Cisco Unity vendor ID Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received NAT-T (RFC 3947) vendor ID Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received NAT-T (RFC 3947) vendor ID Apr 26 11:31:46 charon: 15[ENC] <con1000|237> generating ID_PROT request 0 [ KE No NAT-D NAT-D ] Apr 26 11:31:46 charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (244 bytes) Apr 26 11:31:46 charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (244 bytes) Apr 26 11:31:46 charon: 15[ENC] <con1000|237> parsed ID_PROT response 0 [ KE No NAT-D NAT-D ] Apr 26 11:31:46 charon: 15[IKE] <con1000|237> local host is behind NAT, sending keep alives Apr 26 11:31:46 charon: 15[IKE] <con1000|237> local host is behind NAT, sending keep alives Apr 26 11:31:46 charon: 15[ENC] <con1000|237> generating ID_PROT request 0 [ ID HASH ] Apr 26 11:31:46 charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[4500] to 187.87.214.122[4500] (76 bytes) Apr 26 11:31:46 charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[4500] to 192.168.2.3[4500] (92 bytes) Apr 26 11:31:46 charon: 15[ENC] <con1000|237> parsed INFORMATIONAL_V1 request 2517148752 [ HASH N(AUTH_FAILED) ] Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received AUTHENTICATION_FAILED error notify Apr 26 11:31:46 charon: 15[IKE] <con1000|237> received AUTHENTICATION_FAILED error notify Apr 26 11:31:53 charon: 15[KNL] creating acquire job for policy 192.168.2.3/32|/0 === 187.87.214.122/32|/0 with reqid {1} Apr 26 11:31:53 charon: 07[IKE] <con1000|238> initiating Main Mode IKE_SA con1000[238] to 187.87.214.122 Apr 26 11:31:53 charon: 07[IKE] <con1000|238> initiating Main Mode IKE_SA con1000[238] to 187.87.214.122 Apr 26 11:31:53 charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ SA V V V V V V ] Apr 26 11:31:53 charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (200 bytes) Apr 26 11:31:53 charon: 07[NET] <con1000|238> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (156 bytes) Apr 26 11:31:53 charon: 07[ENC] <con1000|238> parsed ID_PROT response 0 [ SA V V V V ] Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received XAuth vendor ID Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received XAuth vendor ID Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received DPD vendor ID Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received DPD vendor ID Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received Cisco Unity vendor ID Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received Cisco Unity vendor ID Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received NAT-T (RFC 3947) vendor ID Apr 26 11:31:53 charon: 07[IKE] <con1000|238> received NAT-T (RFC 3947) vendor ID Apr 26 11:31:53 charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ KE No NAT-D NAT-D ] Apr 26 11:31:53 charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (244 bytes) Apr 26 11:31:53 charon: 07[NET] <con1000|238> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (244 bytes) Apr 26 11:31:53 charon: 07[ENC] <con1000|238> parsed ID_PROT response 0 [ KE No NAT-D NAT-D ] Apr 26 11:31:53 charon: 07[IKE] <con1000|238> local host is behind NAT, sending keep alives Apr 26 11:31:53 charon: 07[IKE] <con1000|238> local host is behind NAT, sending keep alives Apr 26 11:31:53 charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ ID HASH ] Apr 26 11:31:53 charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[4500] to 187.87.214.122[4500] (76 bytes) Apr 26 11:31:53 charon: 15[NET] <con1000|238> received packet: from 187.87.214.122[4500] to 192.168.2.3[4500] (92 bytes) Apr 26 11:31:53 charon: 15[ENC] <con1000|238> parsed INFORMATIONAL_V1 request 1058161261 [ HASH N(AUTH_FAILED) ] Apr 26 11:31:53 charon: 15[IKE] <con1000|238> received AUTHENTICATION_FAILED error notify Apr 26 11:31:53 charon: 15[IKE] <con1000|238> received AUTHENTICATION_FAILED error notify</con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237>
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.