Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IpSec Site to Site - received AUTHENTICATION_FAILED error notify

    Scheduled Pinned Locked Moved Portuguese
    1 Posts 1 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      m4kin
      last edited by

      Segui esse vídeo. https://www.youtube.com/watch?v=iNzJGI5hv-Q

      E no final acabei não conseguindo fazer funcionar.
      Alguem conseguiu fazer o IpSec rodar certinho?

      Segue Log de erros.

      :31:46	charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (200 bytes)
      Apr 26 11:31:46	charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (156 bytes)
      Apr 26 11:31:46	charon: 15[ENC] <con1000|237> parsed ID_PROT response 0 [ SA V V V V ]
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received XAuth vendor ID
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received XAuth vendor ID
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received DPD vendor ID
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received DPD vendor ID
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received Cisco Unity vendor ID
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received Cisco Unity vendor ID
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received NAT-T (RFC 3947) vendor ID
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received NAT-T (RFC 3947) vendor ID
      Apr 26 11:31:46	charon: 15[ENC] <con1000|237> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
      Apr 26 11:31:46	charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (244 bytes)
      Apr 26 11:31:46	charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (244 bytes)
      Apr 26 11:31:46	charon: 15[ENC] <con1000|237> parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> local host is behind NAT, sending keep alives
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> local host is behind NAT, sending keep alives
      Apr 26 11:31:46	charon: 15[ENC] <con1000|237> generating ID_PROT request 0 [ ID HASH ]
      Apr 26 11:31:46	charon: 15[NET] <con1000|237> sending packet: from 192.168.2.3[4500] to 187.87.214.122[4500] (76 bytes)
      Apr 26 11:31:46	charon: 15[NET] <con1000|237> received packet: from 187.87.214.122[4500] to 192.168.2.3[4500] (92 bytes)
      Apr 26 11:31:46	charon: 15[ENC] <con1000|237> parsed INFORMATIONAL_V1 request 2517148752 [ HASH N(AUTH_FAILED) ]
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received AUTHENTICATION_FAILED error notify
      Apr 26 11:31:46	charon: 15[IKE] <con1000|237> received AUTHENTICATION_FAILED error notify
      Apr 26 11:31:53	charon: 15[KNL] creating acquire job for policy 192.168.2.3/32|/0 === 187.87.214.122/32|/0 with reqid {1}
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> initiating Main Mode IKE_SA con1000[238] to 187.87.214.122
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> initiating Main Mode IKE_SA con1000[238] to 187.87.214.122
      Apr 26 11:31:53	charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ SA V V V V V V ]
      Apr 26 11:31:53	charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (200 bytes)
      Apr 26 11:31:53	charon: 07[NET] <con1000|238> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (156 bytes)
      Apr 26 11:31:53	charon: 07[ENC] <con1000|238> parsed ID_PROT response 0 [ SA V V V V ]
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received XAuth vendor ID
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received XAuth vendor ID
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received DPD vendor ID
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received DPD vendor ID
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received Cisco Unity vendor ID
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received Cisco Unity vendor ID
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received NAT-T (RFC 3947) vendor ID
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> received NAT-T (RFC 3947) vendor ID
      Apr 26 11:31:53	charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
      Apr 26 11:31:53	charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[500] to 187.87.214.122[500] (244 bytes)
      Apr 26 11:31:53	charon: 07[NET] <con1000|238> received packet: from 187.87.214.122[500] to 192.168.2.3[500] (244 bytes)
      Apr 26 11:31:53	charon: 07[ENC] <con1000|238> parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> local host is behind NAT, sending keep alives
      Apr 26 11:31:53	charon: 07[IKE] <con1000|238> local host is behind NAT, sending keep alives
      Apr 26 11:31:53	charon: 07[ENC] <con1000|238> generating ID_PROT request 0 [ ID HASH ]
      Apr 26 11:31:53	charon: 07[NET] <con1000|238> sending packet: from 192.168.2.3[4500] to 187.87.214.122[4500] (76 bytes)
      Apr 26 11:31:53	charon: 15[NET] <con1000|238> received packet: from 187.87.214.122[4500] to 192.168.2.3[4500] (92 bytes)
      Apr 26 11:31:53	charon: 15[ENC] <con1000|238> parsed INFORMATIONAL_V1 request 1058161261 [ HASH N(AUTH_FAILED) ]
      Apr 26 11:31:53	charon: 15[IKE] <con1000|238> received AUTHENTICATION_FAILED error notify
      Apr 26 11:31:53	charon: 15[IKE] <con1000|238> received AUTHENTICATION_FAILED error notify</con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|238></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237></con1000|237>
      
      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.