Quantcast
Channel: Sophos User Bulletin Board
Viewing all articles
Browse latest Browse all 14361

VPN IP Sec - Remote Access

$
0
0
Hallo together,

I configured the ipsec remote access as follows:

Interface: WAN
Local Network: LAN (Network)
Virtual Pool: VPN Pool (IPSec)
Policy: AES-256
Authentication Type: X509 certificate
Automatique firewall: active


I tried to connect with several IP SEC Client (Greenbow and NCP) and I get always the same error mgs:

2012:09:08-20:29:30 homesite Pluto[3594]: packet from 77.156.222.155:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2012:09:08-20:29:30 homesite pluto[3594]: packet from 77.156.222.155:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2012:09:08-20:29:30 homesite pluto[3594]: packet from 77.156.222.155:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
2012:09:08-20:29:30 homesite pluto[3594]: packet from 77.156.222.155:500: ignoring Vendor ID payload [RFC 3947]
2012:09:08-20:29:30 homesite pluto[3594]: packet from 77.156.222.155:500: received Vendor ID payload [Dead Peer Detection]
2012:09:08-20:29:30 homesite pluto[3594]: packet from 77.156.222.155:500: initial Main Mode message received on 21.12.18.145:500 but no connection has been authorized with policy=PUBKEY


Do you know this error msg? How can I solve this probleme?

Thank for your help.

Best regards

Viewing all articles
Browse latest Browse all 14361

Trending Articles