1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Calls across VPN dropped on RV042

Discussion in 'Cisco Small Business Routers and VPN Solutions' started by mjahall, Jun 14, 2011.

  1. mjahall

    mjahall Networkin' Nut Member

    Hi, I set up a vpn on a rv042. This VPN goes to a sonicwall tz210. I have some IP phones running accross this VPN. I have received calls the past two days saying calls drop sometimes. (This vpn is 4 days old). I looked at the log from when the calls dropped and pasted the log from when a call dropped below. I'm not quite sure what it means. It looks like the whole tunnel dropped and got reestablished?? Can someone identify what the log says might be wrong?

    Thanks

    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [404bf439522ca3f6]
    Jun 14 12:06:25 2011 Connection Accepted UDP 173.161.64.93:500->70.89.220.5:500 on ixp1
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [5b362bc820f60007]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [4a131c8107035845...]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-03]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-02_n]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-00]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload [da8e937880010000]
    Jun 14 12:06:25 2011 VPN Log Received Vendor ID payload Type = [Dead Peer Detection]
    Jun 14 12:06:25 2011 VPN Log Ignoring Vendor ID payload Type = [XAUTH]
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] <<< Responder Received Aggressive Mode 1st packet
    Jun 14 12:06:25 2011 VPN Log Aggressive mode peer ID is ID_IPV4_ADDR: '173.161.64.93'
    Jun 14 12:06:25 2011 VPN Log Responding to Aggressive Mode from 173.161.64.93
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] >>> Responder Send Aggressive Mode 2nd packet
    Jun 14 12:06:25 2011 VPN Log ignoring Delete SA payload: ISAKMP SA not found (maybe expired)
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] <<< Responder Received Aggressive Mode 3rd packet
    Jun 14 12:06:25 2011 VPN Log Aggressive mode peer ID is ID_IPV4_ADDR: '173.161.64.93'
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] Aggressive Mode Phase 1 SA Established
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] Initiator Cookies = cec4 b68c df88 bcc4
    Jun 14 12:06:25 2011 VPN Log [Tunnel Negotiation Info] Responder Cookies = 7f56 6ef8 4b30 dee6
    Jun 14 12:07:31 2011 VPN Log Received informational payload, type INVALID_COOKIE
     

Share This Page