IpSec Site to Site - received AUTHENTICATION_FAILED error notify


  • Segui esse vídeo. https://www.youtube.com/watch?v=iNzJGI5hv-Q

    E no final acabei não conseguindo fazer funcionar.
    Alguem conseguiu fazer o IpSec rodar certinho?

    Segue Log de erros.

    :31:46	charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (200 bytes)
    Apr 26 11:31:46	charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (156 bytes)
    Apr 26 11:31:46	charon: 15[ENC] <con1000|237> parsed ID_PROT response 0 [ SA V V V V ]
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received XAuth vendor ID
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received XAuth vendor ID
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received DPD vendor ID
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received DPD vendor ID
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received Cisco Unity vendor ID
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received Cisco Unity vendor ID
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received NAT-T (RFC 3947) vendor ID
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received NAT-T (RFC 3947) vendor ID
    Apr 26 11:31:46	charon: 15[ENC] <con1000|237> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
    Apr 26 11:31:46	charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (244 bytes)
    Apr 26 11:31:46	charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (244 bytes)
    Apr 26 11:31:46	charon: 15[ENC] <con1000|237> parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> local host is behind NAT, sending keep alives
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> local host is behind NAT, sending keep alives
    Apr 26 11:31:46	charon: 15[ENC] <con1000|237> generating ID_PROT request 0 [ ID HASH ]
    Apr 26 11:31:46	charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[4500] to 187.87.214.122[4500] (76 bytes)
    Apr 26 11:31:46	charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[4500] to 192.168.2.3[4500] (92 bytes)
    Apr 26 11:31:46	charon: 15[ENC] <con1000|237> parsed INFORMATIONAL_V1 request 2517148752 [ HASH N(AUTH_FAILED) ]
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received AUTHENTICATION_FAILED error notify
    Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received AUTHENTICATION_FAILED error notify
    Apr 26 11:31:53	charon: 15[KNL] creating acquire job for policy 192.168.2.3/32|/0 === 187.87.214.122/32|/0 with reqid {1}
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> initiating Main Mode IKE_SA con1000[238] to 187.87.214.122
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> initiating Main Mode IKE_SA con1000[238] to 187.87.214.122
    Apr 26 11:31:53	charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ SA V V V V V V ]
    Apr 26 11:31:53	charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (200 bytes)
    Apr 26 11:31:53	charon: 07[NET] <con1000|238> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (156 bytes)
    Apr 26 11:31:53	charon: 07[ENC] <con1000|238> parsed ID_PROT response 0 [ SA V V V V ]
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received XAuth vendor ID
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received XAuth vendor ID
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received DPD vendor ID
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received DPD vendor ID
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received Cisco Unity vendor ID
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received Cisco Unity vendor ID
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received NAT-T (RFC 3947) vendor ID
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received NAT-T (RFC 3947) vendor ID
    Apr 26 11:31:53	charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
    Apr 26 11:31:53	charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (244 bytes)
    Apr 26 11:31:53	charon: 07[NET] <con1000|238> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (244 bytes)
    Apr 26 11:31:53	charon: 07[ENC] <con1000|238> parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> local host is behind NAT, sending keep alives
    Apr 26 11:31:53	charon: 07[IKE] <con1000|238> local host is behind NAT, sending keep alives
    Apr 26 11:31:53	charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ ID HASH ]
    Apr 26 11:31:53	charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[4500] to 187.87.214.122[4500] (76 bytes)
    Apr 26 11:31:53	charon: 15[NET] <con1000|238> received packet: from 187.87.214.122[4500] to 192.168.2.3[4500] (92 bytes)
    Apr 26 11:31:53	charon: 15[ENC] <con1000|238> parsed INFORMATIONAL_V1 request 1058161261 [ HASH N(AUTH_FAILED) ]
    Apr 26 11:31:53	charon: 15[IKE] <con1000|238> received AUTHENTICATION_FAILED error notify
    Apr 26 11:31:53	charon: 15[IKE] <con1000|238> received AUTHENTICATION_FAILED error notify</con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237>